Traceability in RFID Systems
|
|
- Patrick Lynch
- 6 years ago
- Views:
Transcription
1 JCC 2005, Aussois, France Traceability in RFID Systems Gildas Avoine EPFL, Lausanne, Switzerland ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 1 / 27
2 Outline Introduction and Motivation gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 2 / 27
3 Introduction and Motivation gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 3 / 27
4 Goals Radio Frequency Identification Identify objects remotely by embedding tiny devices capable of transmitting data into these objects. gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 4 / 27
5 RFID Systems database reader reader gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 5 / 27
6 Emergence of the RFID Technology The RFID technology is not new, e.g., contactless smartcards were already RFID devices (public transport, tollways). The current trend is to design and establish standards on small and cheap RFID s. gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 6 / 27
7 RFID Characteristics Extremely limited storage and computation capabilities Not tamper-resistant No battery Reader-to-Tag channel: up to 100 meters Tag-to-Reader channel: up to a few meters gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 7 / 27
8 RFID vs Bar-Code RFID s could replace the bar-codes in the near future. Tags can be remotely read without optical access. Tags can be read en masse. Tags can be re-writable. Tags have unique identifiers. gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 8 / 27
9 Applications Management of stocks (Wal-Mart, Gillette, Benetton, etc.) Speed up the checkouts in the shops Libraries (Santa Clara Library, University of Nevada, etc.) Recycling Pets identification Anti-counterfeiting Sensor networks (Michelin, etc.) Localization gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 9 / 27
10 Threats on the Tag s Bearers Privacy Information Traceability leakage Information leakage: The reveals some information related to the object holder. Traceability: An adversary could track the, and therefore its bearer. gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 10 / 27
11 Privacy Compagnies suffer from boycott campaigns Easier to track with RFID than other technologies e.g. video, credit cards, GSM. Tags cannot be switched-off Tags can be almost invisible gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 11 / 27
12 Information Leakage The idea is to send an information which is indistinguishable by an adversary from a random value s.t. only the database is able to link the object with this information. database reader reader gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 12 / 27
13 Traceability The idea is to refresh the information sent by the each time it is queried by a reader s.t. only the database is able to link the object with these different answers. database reader reader 34938, 54452, 76826, , 89453, , 19203, , 85676, 31444,... gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 13 / 27
14 gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 14 / 27
15 The goal is to design an RFID protocol such that an authorized party only is able to identify a while an adversary is not able to track it. Reader request information Tag 2-rounds protocol gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 15 / 27
16 Example: Henrici and Müller Reader ID TID LST request h(id), h(tid ID), TID:=TID-LST RND, h(rnd TID ID) TID++ LST TID Tag ID TID LST ID RND ID ID: Current identity, TID: Current session number, LST: Last successful session number gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 16 / 27
17 Example: Symmetric Encryption Reader ID K request E K (r, ID), r Tag ID K ID: Static identity, K: Key shared by the and the database, E: Symmetric encryption function This protocol requires O(n) operations to identify one, where n is the number of s managed by the database, and requires O(n 2 ) operations to identify n s. gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 17 / 27
18 gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 18 / 27
19 Modelling the System data processing reader reader Studying the communication channel between the database and the readers is not relevant. Readers and database are considered as a single and unique entity in the analysis of security. gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 19 / 27
20 Information Channels Reader Adversary Tag Forward Channel Backward Channel Memory Channel gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 20 / 27
21 Means of the Adversary Query(πT i, m): A requests T through the forward channel and sending him the message m after having received its answer. Send(π j R, m): A sends the message m to R through the backward channel and receiving its answer. Execute(πT i, πj R ): A executes an instance of P between T and R, obtaining so the messages exchanged on both the forward and the backward channels. Reveal(πT i ): A obtains the content of T s memory channel. Reader request information Tag data to refresh the information gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 21 / 27
22 Goal of the Adversary After having interacted with a target T and possibly some readers and thus obtaining an interaction Ω I (T ), an adversary A needs to find his target among two s T 1 and T 2 which are presented to him. In order to do this, he can query both T 1 and T 2, thus obtaining two interactions Ω I1 (T 1 ) and Ω I2 (T 2 ). T 1 T 2 Ω I1 (T 1 ) Ω I2 (T 2 ) T {Q, E, R} interaction Ω I (T ) A outputs T {T 1, T 2 } {S} R gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 22 / 27
23 Advane The advane of the adversary for a given protocol P is: Adv UNT P (A) = 2 Pr(T = T ) 1 If A s advane is negligible, P is said to be UNT-O secure, where O {Q, S, E, R}. gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 23 / 27
24 Relations One can mix and match the goals {Existential-UNT, Forward-UNT, Universal-UNT} of the adversary and his means O {Q, S, E, R}. ( O, O {Q, S, E, R}, O O) = (UNT-O UNT-O ) Existential-UNT Forward-UNT UNT-QSER UNT-QSE UNT-E UNT-Q Universal-UNT gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 24 / 27
25 Results Protocol is is not Golle et al. Existential-UNT-Q Existential-UNT-E Saito et al. Existential-UNT-Q Saito et al., reloaded Universal-UNT-QS Henrici and Müller Existential-UNT-Q Universal-UNT-QE Weis et al. Existential-UNT-QSE Forward-UNT-QSER Ohkubo et al. Existential-UNT-QSE Forward-UNT-QSER gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 25 / 27
26 Conclusion gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 26 / 27
27 Conclusion Boom enjoyed by the RFID technology Most of the RFID protocols do not ensure privacy Secure protocols imply huge complexity Very low cost asymmetric cryptography, time-memory trade-off Formalization gavoine/rfid/ Traceability in RFID Systems Gildas Avoine 27 / 27
Reassignment Scheme of an RFID Tag s Key for Owner Transfer
Reassignment Scheme of an RFID Tag s Key for Owner Transfer Junichiro Saito 1, Kenji Imamoto 1, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, The Department
More informationPrivacy Challenges in RFID
Privacy Challenges in RFID Gildas Avoine Information Security Group Université catholique de Louvain Belgium SUMMARY Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is
More informationRoot Beer Game in Progress
Root Beer Game in Progress Root Beer Game Completion Schedule Practice session (completed in class) February 4 Complete Round 1 February 11 Team decision (via e-mail to professor) on Round 2 change by
More informationA Secured Mutual Authentication Protocol For RFID System
A Secured Mutual Authentication Protocol For RFID System Rajarshi Roy Chowdhury, Md. Abdul Awal Ansary Abstract: Contactless automatic RFID system is intended to replace existing barcode scheme, since
More informationSecurity issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University
More informationLightweight Cryptography for RFID Systems
Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA G. Gong (University of Waterloo)
More informationIdentity Management. ID management for people and objects
Identity Management ID management for people and objects System accessible assigned tokens Token means something you have. This is separate from something you know or you are. Things you carry and perform
More informationLow-cost RFID identification variation
Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Low-cost RFID identification variation Koong Lin Tzu-Chang Yeh Yao-Yuan Liu Chad Lin Edith Cowan University 10.2991/jcis.2006.14 Originally
More informationManufacturing Insights: RFID: Tool Tracking Solutions
Manufacturing Insights: RFID: Tool Tracking Solutions SCENE 1. RADIO FREQUENCY IDENTIFICATION TECHNOLOGY, OR RFID TECHNOLOGY, IS THE PROCESS AND PHYSICAL INFRASTRUCTURE IN WHICH A UNIQUE IDENTIFIER, AND
More informationRFID FAQs, not Fiction
RFID FAQs, not Fiction The following FAQs were developed by the AIM RFID Privacy Work Group. For more information visit: http://www.rfid.org or email us at rfidfaq@aimglobal.org If you have a question
More informationSmart Brands and Product Protection 2005
Smart Brands and Product Protection 2005 Central London, UK, Europe Mar 9, 2005 Lukas Grunwald DN-Systems Enterprise Internet Solutions GmbH 2005 Agenda What is RF-ID? What is RF-ID and what are Smart-Labels
More informationSecure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems
Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems Kyoung Hyun Kim 1, Eun Young Choi 2,SuMiLee 3, and Dong Hoon Lee 4 Center for Information Security Technologies(CIST), Korea
More informationSeminar: Communication Infrastructure, RFID Security
Seminar: Communication Infrastructure, RFID Security Thomas Thrainer, 0356015, Thomas.Thrainer@students.jku.at Johannes Kepler university Linz FIM Institut für Informationsverarbeitung und Mikroprozessortechnik
More informationPlan, outline / Wireless Networks and Applications Lecture 23: RFID and NFC. How Does It Work? What is RFID? Page 1
Page 1 Intermec UAP-2100 Plan, outline 18-452/18-750 Wireless Networks and Applications Lecture 23: RFID and NFC Peter Steenkiste CS and ECE, Carnegie Mellon University RFIDs» Concept and applications»
More informationRFID and Privacy Impact Assessment (PIA)
RFID and Privacy Impact Assessment (PIA) JOURNÉES SCIENTIFIQUES URSI 25 ET 26 MARS 2014 1 Agenda Introduction: RFID everywhere? RFID and security issues RFID threats The European Recommendation Privacy
More informationRFID Overview. Outline. Definition. Barcode Replacement. Reading Tags
Outline 1. Introduction 2. Basic RFID Tags 3. Symetric-Key Tags 4. RFID News Written by: Ari Juels Presented by Carlos A. Lopez Definition RFID: Is a technology for automated identification of objetcs
More informationReal World Applications of RFID. Mr. Mike Rogers Bryan Senior High School Omaha, NE
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE RFID= Radio Frequency Identification RFID Overview RFID is based on wireless communication over the air that reads or
More informationEPC Standards: EPC Tag Classes: EPC Class Type Features Tag Type
RFID Standards An RFID system can utilize a few standards. The problem has been that there is no one universally accepted standard. Competing standards have been one of the more difficult issues for RFID,
More informationLaboratory Management Based on Internet of Things. Jianming Huang
Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on
More informationSecurity challenges for RFID key applications
3rd European Workshop on RFID Systems and Technologies 12./13. June 2007, Duisburg Security challenges for RFID key applications Ulrich Waldmann Fraunhofer-Institut SIT Content Discussion of product anti-counterfeiting
More informationResearch and Development. Needs for RFID
Research and Development Needs for RFID Thomas J. Sommer thomas.sommer@ec.europa.eu European Commission DG Information Society and Media Micro/Nanosystems EU RFID Forum Brussels, 13-14 March 2007 Scenarios
More informationBringing Rewriteable Memory to Printed Electronics Launching consumer products Making integrated systems possible
Thin Film Electronics ASA: Bringing Rewriteable Memory to Printed Electronics Launching consumer products Making integrated systems possible Davor Sutija, CEO Annual General Meeting 10 May, 2011 Agenda
More informationNeeds Assessment Report for the A&P Supermarkets
Needs Assessment Report for the A&P Supermarkets Automated Checkout System Using Radio Frequency ID tags By May Ly A & P Needs Assessment Report, 2006-1 - 1. Executive Summary A&P Company sees a future
More informationDimitar Popov Zeina Muallem
Dimitar Popov Zeina Muallem Auto-IDs serve to provide information about people, animals, goods, etc. Used in purchasing, distribution logistics, industry, manufacturing companies. Storage capacity, data
More informationRFID and the Internet of Things
RFID and the Internet of Things ICT Trends and Challenges in a Global Era MSU/INT/BSL Programme, 4 July 2005 Lara Srivastava Strategy and Policy Unit Note: The views expressed in this presentation are
More informationBarcodes or RFID Tags. Key Factors to Consider in Choosing the Data Collection Technology for Your Operation
Barcodes or RFID Tags Key Factors to Consider in Choosing the Data Collection Technology for Your Operation While there are similarities, some noteworthy differences between a barcode system and RFID may
More informationMonitoring and Centering a Remote Discrete Using Rfid through Sim Module
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 4 Issue 5 May 2015 PP.71-79 Monitoring and Centering a Remote Discrete Using Rfid through
More informationIntroduction A lot has been written about the level of detail appropriate for the RFID privacy impact assessment. Here we try to explain the evolution
A guide to determining the required level of RFID Privacy Impact Assessment (PIA). Based on the potential risk to the privacy of nature persons, not all organisations required the same level of RFID privacy
More informationWireless Sensor Network based Automatic Fare Collection for Public Transport System
Wireless Sensor Network based Automatic Fare Collection for Public Transport System Anne Frank Joe.A 1, Celin. S 2, G. Rajalakshmi 3, Ajay kumar 4, Gaurav sharma 5 Assistant Professor, Dept. of EIE, Sathyabama
More informationRFID. Myths, Facts and Reality
RFID Myths, Facts and Reality What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically identify things Happens with a serial number that
More informationRFID Product and Brand Protection Finding the privacy and security settlement for the mass market
RFID Product and Brand Protection Finding the privacy and security settlement for the mass market Dave Birch mailto:dave.birch@chyp.com Consult Hyperion http://www.chyp.com Please note that extract from
More informationPrivacy in RFID. Strong Privacy needs Public-Key Cryptography. Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE.
Privacy in RFID Strong Privacy needs Public-Key Cryptography Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE http://lasecwww.epfl.ch/ SV 2006 Privacy in RFID EPFL 1 / 67 1 The Bluetooth Case 2
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 11 Radio Frequency Identification Objectives Define Radio Frequency Identification (RFID) Explain the need for RFID and how RFID works List the components
More informationRFID Tags and Readers
RFID Tags and Readers RFID Tagging RFID tagging is an ID system for identification and tracking purposes that uses radio frequency identification devices. An RFID tagging system consists of the tag, a
More informationPrivacy Preservation and Mutual Authentication in RFID Systems
Privacy Preservation and Mutual Authentication in RFID Systems Debadatta Meher Roll. No. 710CS2036 under the guidance of Prof. Ashok Kumar Turuk Department of Computer Science and Engineering National
More informationEMV Terminology Guide
To make life easier, TMG has compiled some of the most commonly used EMV terms in this guide. If you have questions about EMV, contact your Director of Client Relations directly or email clientrelations@themebersgroup.com.
More informationA Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007
A Review of RFID ISO Standards & CEN TC225 Developments Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 RFID Standards Types of Standard Technology - air interface
More informationRFID TECHNOLOGY FOR IDENTIFICATION, SECURITY AND DOCUMENT HANDLING IN LIBRARY
RFID TECHNOLOGY FOR IDENTIFICATION, SECURITY AND DOCUMENT HANDLING IN LIBRARY Satish Kumar, Information Scientist, ARIES, Nainital, UK Email sklisc@gmail.com ABSTRACT Radio Frequency Identification (RFID)
More informationRFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas
RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision
More informationFeaturing: From Black Jack to Business: RFID in the enterprise
Featuring: From Black Jack to Business: RFID in the enterprise RFID Research Group (NZ) Unisys Technology Forum 2007 17/05/2007 Page 1 Place your bets please and placed them you have! Unisys Technology
More informationZMC, LLC Distribution. & Technical Services. Library RFID Management System
Library RFID Management System 1 Library RFID Management System (Architecture) 2 Library RFID Management System (Four Phases ) - Library Security System Only, Using RFID Tag replace EM Security Stripe.
More informationSeminars of Software and Services for the Information Society. Introduction to RFId Radio Frequency Identification
DIPARTIMENTO DI INGEGNERIA INFORMATICA AUTOMATICA E GESTIONALE ANTONIO RUBERTI Master of Science in Engineering in Computer Science (MSE-CS) Seminars in Software and Services for the Information Society
More informationThe Use of RFID for Human Identity Verification. Draft Outline for RFID Subcommittee Report Version 3.4a
The Use of RFID for Human Identity Verification Draft Outline for RFID Subcommittee Report Version 3.4a This paper reflects the recommendations provided by the Data Privacy and Integrity Advisory Committee
More informationRFID Technologies. By Francisco J. Carabez
RFID Technologies By Francisco J. Carabez franciscojavier@carabez.com Index 1 What is RFID? RFID History Working principle of RFID Technology? 4 RFID System Basics 5 Why RFID? 2 RFID Components RFID Readers
More informationSMART TROLLEY FOR GUIDING CUSTOMERS IN SUPER MARKETS USING AOT
SMART TROLLEY FOR GUIDING CUSTOMERS IN SUPER MARKETS USING AOT ELAMATHI K 1, SOWMIYA S 2, SREEMATHY R 3, VICHITRA V 4, KEERTHANA P 5 1Assistant Professor, Department of Electronics and 2, 3,4,5 BE, Final
More informationTechnical Review Paper Evaluation Form (attach this form as the cover page for your report)
ECE4011 Culminating Design Project Technical Review Paper Evaluation Form (attach this form as the cover page for your report) Student Name: George Tzintzarov Project Advisor: Manos Tentzeris Team Name:
More informationSecurity of Smartcard Based Payment Protocol
Security of Smartcard Based Payment Protocol Petr Hanáček Department of Computer Science and Engineering, Faculty of Electrical Engineering and Computer Science Technical University of Brno Božetěchova
More informationRFID Based Event/Activity Management System
www.vivatrack.in RFID Based Event/Activity Management System What is RFID Technology RFID is an abbreviation of Radio Frequency IDentification. RFID is an AIDC (Automatic Identification and Data Capture)
More informationRFID & MOBILE FUSION FOR AUTHENTICATED ATM TRANSACTION
RFID & MOBILE FUSION FOR AUTHENTICATED ATM TRANSACTION 1 Nishigandha S. Deshmukh Department of E&TC, M.S.S.C.O.E.T., Jalna, India Email: 1 deshmukh.nishigandha@gmail.com Abstract In this paper we report
More informationWireless Smart Trolley for Shopping Malls usingzigbee
Wireless Smart Trolley for Shopping Malls usingzigbee Anupriya.S.L 1, B.Jyothi 2, NithyaGopal.P.G 3, ShilpaShree.L 4, Prof.S.Sowndeswari 5 1,2,3 Dept of ECE, SaIT, Bangalore-97 4 Dept of ECE, SaIT, Bangalore-97
More informationRadio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches
Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches Overview RFID is an automatic identification technology that uses radio waves to capture data from tags, rather than optically
More informationRFID & Fingerprint Based Vehicle Security System with GSM & GPS Technology
#1.0-2018 RESEARCH ARTICLE OPEN ACCESS RFID & Fingerprint Based Vehicle Security System with GSM & GPS Technology N. KISHORE KUMAR 1, K. IMRAN SHAREEF 2, S. MD. TAYAB 3, P. CHAITHANYA KUMAR 4 1(Assistant
More informationRFID: The Right Frequency for Government. Authored by: Dr. David Wyld Slides Provided by: The IBM Center for the Business of Government
RFID: The Right Frequency for Government Authored by: Dr. David Wyld Slides Provided by: The IBM Center for the Business of Government RFID Overview: Everything you need to know. RFID Definition: Radio
More informationWelcome! NDIA RFID Seminar November 4, Overview of RFID. Productivity by RFID Pete Cipriani. Copyright 2005 Productivity By RFID
Welcome! NDIA RFID Seminar November 4, 2005 Overview of RFID Productivity by RFID Pete Cipriani Introduction ERP Enterprise Resource Planner WMS Warehouse Management System CRM Customer Relationship Management
More informationSmart Ration Card Using RFID and GSM Technique
Smart Ration Card Using RFID and GSM Technique Mohit Agarwal 1 Manish Sharma 2 1 Electronics and Communication Engineering 2 Electronics and Communication Engineering mohitagarwal202@gmail.com msharma14@amity.edu
More informationGuide to Contactless Cards
Guide to Contactless Cards 1 Guide to Contactless Cards Since the introduction of credit cards to the UK over 50 years ago, they have been in a constant state of evolution, as card issuers and retailers
More informationEPC Primer. Erik Sundermann HUG Meeting - Paris 20th Sept 2006
EPC Primer Erik Sundermann HUG Meeting - Paris 20th Sept 2006 Agenda The Fundamentals of RFID The Internet of Things The EPCglobal Organization EPCglobal Network Standards Physical Object Exchange Standards
More informationMobile Agent Code Updating and Authentication Protocol for Code-centric RFID System
Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System 1 Liang Yan, 2 Hongbo Guo, 3 Min Chen, 1 Chunming Rong, 2 Victor Leung 1 Department of Electrical Engineering and Computer
More informationRFID OVERVIEW. by ADC Technologies Group. Introduction to Radio Frequency Identification (RFID) Certified RFID Provider
RFID OVERVIEW by ADC Technologies Group Certified RFID Provider Introduction to Radio Frequency Identification (RFID) Introduction to Radio Frequency (RF) RF technology is used in many different applications,
More informationAnalyzing CRFIDs in Simulation Ting-You Wang and Ting-Yen Wang Advised by Michael Buettner
Analyzing CRFIDs in Simulation Ting-You Wang and Ting-Yen Wang Advised by Michael Buettner Background RFIDs have almost become ubiquitous such that one can find RFID readers installed in almost any location.
More informationThe Speed Shopper System
Mark Dunn, Yoon Jae Kim, Barrett Shay CSE 537 Class Project: Wireless Innovation The Speed Shopper System The purpose of technology is to provide a new or better way to perform a task. The technology is
More informationPREPAID WATER METERING SYSTEM
PREPAID WATER METERING SYSTEM Walk in the desert, You will realize the cost of Water Utility Systems has developed the world s first commercially available prepaid water metering system that is approved
More informationRFID Based Electricity Billing and Cut-Off System for Energy Through GSM
RESEARCH ARTICLE OPEN ACCESS RFID Based Electricity Billing and Cut-Off System for Energy Through GSM 1 K.Jansi lakshmi, 2 N.Swetha soundarya, 3 D.Sasi kala, 4 B.Venkatarami reddy, 5 A.Akhil Assistant
More informationAN AUTOMATED TOLL GATE VEHICLE PASSING SYSTEM
AN AUTOMATED TOLL GATE VEHICLE PASSING SYSTEM 1 Logaprakash M, 2 Arunkumar R, 3 Swathy K 1 Assistant Professor, Department of Computer science and Engineering, SVS College of Engineering, Coimbatore. 2
More informationCommission on Marketing and Advertising Task Force on Electronic Product Codes
International Chamber of Commerce The world business organization Department of Policy and Business Practices Commission on Marketing and Advertising Task Force on Electronic Product Codes ICC principles
More informationICT IGCSE Theory Revision Presentation 2.2 Direct data entry and associated devices
Describe direct data entry and associated devices, e.g. magnetic stripe readers, chip and PIN readers, Radio Frequency Identification (RFID) readers, Magnetic Ink Character Reader (MICR), Optical Mark
More informationRFID Loyalty Programs: The Consumer Perspective. Harold Boeck, Professor of marketing Université de Sherbrooke (Canada)
RFID Loyalty Programs: The Consumer Perspective Harold Boeck, Professor of marketing Université de Sherbrooke (Canada) Tagging Consumers (Yes. Let s talk about it) What is it? The consumer carries a tag
More informationIMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD
IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD Shilpa S. Badhiye1,Prof.Rupali S. Khule2 1 student, Electronics and telecommunication Department, MCOERC, Maharashtra, India 2 Professor, Electronics
More informationabhisam RFID Discover the power of e-learning!
RFID Introduction : Radio Frequency Identification Technology (RFID in short) is the hottest new technology today, with applications ranging from car parking systems to hospitals and supply chain management.
More informationEMV - the end of skimming?
EMV - the end of skimming? Formal analysis of the EMV protocol suite Erik Poll Joeri de Ruiter Digital Security group, Radboud University Nijmegen Overview The EMV standard Attacking smartcard chips Some
More informationSL3 ICS General description UCODE EPC G2
SL3 ICS 10 Rev. 3.0 20 September 2006 129430 Product short data sheet 1. General description The EPC global UHF Generation 2 Standard allows the commercialised provision of mass adaption of UHF EPC technology
More informationRFid based Toll Collection System
For more Project details visit: http://www.projectsof8051.com/rfid-based-highway-toll-tax-collection-system/ Code Project Title 1515 RFid Based Highway Toll Tax Collection System Synopsis for RFid based
More informationNew Directions in RFID Security
New Directions in RFID Security Erik-Oliver Blass and Refik Molva EURECOM, Sophia Antipolis, France Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and
More informationCampus Tracking System Based On IoT Yibiao Pi
Applied Mechanics and Materials Online: 2014-08-11 ISS: 1662-7482, Vols. 599-601, pp 1416-1419 doi:10.4028/www.scientific.net/amm.599-601.1416 2014 Trans Tech Publications, Switzerland Campus Tracking
More informationMobile RFID Security Issues
All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to
More informationRFID in Food Traceability and Container Security
RFID in Food Traceability and Container Security Andre Poucet European Commission - Joint Research Centre Institute for Protection and Security of the Citizen Traceability and vulnerability assessment
More informationRFID (Radio Frequency IDentification)
RFID (Radio Frequency IDentification) Kjell Åge Bringsrud (kjellb@ifi.uio.no) inf3190 Kjell Åge Bringsrud Slide 1 Short RFID History inf3190 Kjell Åge Bringsrud Slide 2 RFID EPC Gen 2 architecture EPC
More informationIntroduction to RFID. Greg Grajewski. NAPMM Asheville NC 2006
Introduction to RFID Greg Grajewski NAPMM Asheville NC 2006 Radio Frequency IDentification It is already used in many applications including: Electronic Toll Collection Rail cars identification and tracking
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March-2016 1026 LIFI BASED AUTOMATED SMART TROLLEY USING RFID V.Padmapriya 1, R.Sangeetha 2, R.Suganthi 3, E.Thamaraiselvi
More informationCSE 303 Concepts and Tools for Software Development. Magdalena Balazinska Winter Lecture 25 Impact of Computer Engineering Solutions: RFID
CSE 303 Concepts and Tools for Software Development Magdalena Balazinska Winter 2010 - Lecture 25 Impact of Computer Engineering Solutions: RFID RFID Radio Frequency IDentification (RFID) Using radio frequency
More information3M SelfCheck System V-Series Kiosk. Site Planning Guide
3M SelfCheck System V-Series Kiosk Site Planning Guide 3M, 2015. All rights reserved. 3M SelfCheck System V-Series Kiosk Site Planning Guide, 78-8126-8054-0_D1 3M, Tattle-Tape, and SelfCheck are trademarks
More informationINTRODUCING OUR SELF SERVICE SOLUTIONS FOR TICKETING
INTRODUCING OUR SELF SERVICE SOLUTIONS FOR TICKETING SELF SERVICE TICKETING SOLUTIONS TICKET RESERVATION, PURCHASE & DELIVERY, FOR SEVERAL TICKETING MARKETS Public transportation Cinemas & theaters Stadiums
More informationRADIO FREQUENCY IDENTIFICATION (RFID) Anush Kumar,Chandan Kumar Department of ECE Dhronacharya Engineering College,Gurgaon,India
RADIO FREQUENCY IDENTIFICATION (RFID) Anush Kumar,Chandan Kumar Department of ECE Dhronacharya Engineering College,Gurgaon,India Abstract Initially RFID tags were developed to eventually replace barcodes
More informationRFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) The Business Benefit of RFID Radio Frequency Identification (RFID) is a data collection system based on tiny microchips in combination with radio antennas, which make
More informationRFID Applications in Railway Industry
RFID Applications in Railway Industry G.Sucharitha P.G. Scholar (M. Tech), Department of ECE, Modugula Kalavathamma Institute of Technology for Women, Rajampet, Kadapa District. Abstract: The increased
More informationINTRODUCING OUR SELF SERVICE REDEMPTION SOLUTIONS
INTRODUCING OUR SELF SERVICE REDEMPTION SOLUTIONS SELF SERVICE AT THE GAMING HALL Developing a self service channel (complementary to cages or cashier desks) capable of supporting the full lifecycle of
More informationIOT & RFID Technology
International Journal of Scientific Research in Computer Science, Engineering and Information Technology IOT & RFID Technology Laxmi Gupta *1, Anushree Goud* 2 2018 IJSRCSEIT Volume 3 Issue 5 ISSN : 2456-3307
More informationNew Directions in RFID Security
New Directions in RFID Security Erik-Oliver Blass and Refik Molva EURECOM, Sophia Antipolis, France Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and
More informationINNOV-6: "RFID Vapor, Fiction and Truths"
INNOV-6: "RFID Vapor, Fiction and Truths" Bob Brennan Technical Evangelist Integrated Manufacturing Systems, Inc. Agenda Quick Definitions and Level Setting How to Read and Write tags? Integration with
More informationRFID, ZigBee and GSM Based Automatic Billing Trolley For Shopping Mall
RFID, ZigBee and GSM Based Automatic Billing Trolley For Shopping Mall Prof. P.C. Warule 1, Gavhane Pratiksha S. 2, Ghorpade Rutuja V. 3, Joshi Prasad V. 4, Department of E&TC, Pravara Rural Engineering
More informationTourism Informatization Research under the Mode of Internet of Things. Gangzhi Guo
6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Tourism Informatization Research under the Mode of Internet of Things Gangzhi Guo School of Culture
More informationClient Alert. Radio Frequency Identification RFID Technology Implications for Privacy in Europe. Privacy & Data Protection.
Radio Frequency Identification RFID Technology Implications for Privacy in Europe by Tim Wright, Ashley P. Winton, Cynthia Fairweather Privacy & Data Protection While radio frequency identification ( RFID
More informationRFID AND INFORMATION SYSTEMS IN COMMERCE
RFID AND INFORMATION SYSTEMS IN COMMERCE Prof. Valentin Litoiu Ph. D University of Craiova Faculty of Economics and Business Administration Craiova, Romania Student Vlad Litoiu ESADE Business School Master
More informationProduct Specific Security Features Based on RFID Technology
Product Specific Security Features Based on RFID Technology Zoltán Nochta, Thorsten Staake, Elgar Fleisch Auto-ID Labs White Paper WP-BIZAPP-028 Zoltán Nochta Project Manager SAP AG Contact: Thorsten Staake
More informationIBM Research Report. Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced
RC23710 (W0508-164) August 31, 2005 Computer Science IBM Research Report Disabling RFID Tags with Visible Confirmation: Clipped Tags Are Silenced Günter Karjoth IBM Research Division Zurich Research Laboratory
More informationCARDEA: Service platform for monitoring patients and medicines based on SIP OSGi and RFID technologies in hospital environment
CARDEA: Service platform for monitoring patients and medicines based on SIP OSGi and RFID technologies in hospital environment Saúl Navarro, Ramón Alcarria, Juan A. Botía, Silvia Platas and Tomás Robles,
More informationImplementing RFID in Europe: Privacy and Security Standards Guidelines. Stephane Pique - RFID Business Consultant
1 Implementing RFID in Europe: Privacy and Security Standards Guidelines - RFID Business Consultant 2 Europe and RFID COMMUNICATION from the commission to the European parliament, the council, the European
More informationApplications. Editor: Vince Stanford Pervasive Computing Goes the Last Hundred Feet with RFID Systems
Applications Editor: Vince Stanford vince-stanford@users.sourceforge.net Pervasive Computing Goes the Last Hundred Feet with RFID Systems Vince Stanford EDITOR S INTRODUCTION Previously, I have discussed
More informationA Prevention and Automation of Public Distribution System using RFID and Facial Recognition Camera
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 02 (February. 2014), V6 PP 09-13 www.iosrjen.org A Prevention and Automation of Public Distribution System
More informationImplementation and Application of RFID EPC Information Service for Forward and Reverse Logistics
Implementation and Application of RFID EPC Information Service for Forward and Reverse Logistics Shih-Chih Chen, Ph.D. Student, Tatung University, Taiwan Huei-Huang Chen, Professor, Tatung University,
More information