SlideShare a Scribd company logo
Enviar búsqueda
Cargar
Ijarcet vol-2-issue-3-867-869
Denunciar
Compartir
E
Editor IJARCET
Seguir
•
0 recomendaciones
•
172 vistas
Empresariales
Tecnología
Ijarcet vol-2-issue-3-867-869
•
0 recomendaciones
•
172 vistas
E
Editor IJARCET
Seguir
Denunciar
Compartir
Empresariales
Tecnología
Ijarcet vol-2-issue-3-867-869
1 de 3
Descargar ahora
Recomendados
RFID tag - technology and scenarios por
RFID tag - technology and scenarios
Davide Del Monte
37.9K vistas
•
42 diapositivas
11. rfid security using mini des algorithm in deployment of bike renting system por
11. rfid security using mini des algorithm in deployment of bike renting system
Alexander Decker
335 vistas
•
11 diapositivas
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
316 vistas
•
10 diapositivas
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module por
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
IJERA Editor
341 vistas
•
5 diapositivas
Radio Frequency Identification (RFID) Security issues and possible solutions por
Radio Frequency Identification (RFID) Security issues and possible solutions
Ahmad Sharifi
317 vistas
•
3 diapositivas
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy... por
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Onyebuchi nosiri
125 vistas
•
12 diapositivas
Más contenido relacionado
La actualidad más candente
A research survey rfid security & privacy issue por
A research survey rfid security & privacy issue
csandit
648 vistas
•
7 diapositivas
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica... por
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
36 vistas
•
4 diapositivas
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID... por
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
Manos Theocharopoulos
56.9K vistas
•
40 diapositivas
Rfid presentation por
Rfid presentation
Kalpna Saharan
35.7K vistas
•
28 diapositivas
Rfid ppt por
Rfid ppt
Sikihnamnagamani
488 vistas
•
85 diapositivas
RFID Technology and Internet of Things por
RFID Technology and Internet of Things
Dmitri Shiryaev
23.1K vistas
•
22 diapositivas
La actualidad más candente
(17)
A research survey rfid security & privacy issue por csandit
A research survey rfid security & privacy issue
csandit
•
648 vistas
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica... por IRJET Journal
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
•
36 vistas
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID... por Manos Theocharopoulos
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
Manos Theocharopoulos
•
56.9K vistas
Rfid presentation por Kalpna Saharan
Rfid presentation
Kalpna Saharan
•
35.7K vistas
Rfid ppt por Sikihnamnagamani
Rfid ppt
Sikihnamnagamani
•
488 vistas
RFID Technology and Internet of Things por Dmitri Shiryaev
RFID Technology and Internet of Things
Dmitri Shiryaev
•
23.1K vistas
3.[13 21]framework of smart mobile rfid networks por Alexander Decker
3.[13 21]framework of smart mobile rfid networks
Alexander Decker
•
1.5K vistas
Iot intro por mohamed drahem
Iot intro
mohamed drahem
•
486 vistas
Rfid security workshop v0.9 -nahuel_grisolia por Positive Hack Days
Rfid security workshop v0.9 -nahuel_grisolia
Positive Hack Days
•
8.5K vistas
RFID and Wireless Sensor Networks por Kartik Kachhadiya
RFID and Wireless Sensor Networks
Kartik Kachhadiya
•
4.2K vistas
Rfid technology por Publicis Sapient
Rfid technology
Publicis Sapient
•
20.1K vistas
Rfi dtechnology.doc por Artechno7
Rfi dtechnology.doc
Artechno7
•
413 vistas
Rfid presentation por BECLIBRARY
Rfid presentation
BECLIBRARY
•
37 vistas
My best effort por sujataray
My best effort
sujataray
•
374 vistas
RFID Protocols and Privacy Models for RFID por Faisal Razzak
RFID Protocols and Privacy Models for RFID
Faisal Razzak
•
2.1K vistas
Rfid seminar (1) por GITAM
Rfid seminar (1)
GITAM
•
6.3K vistas
RFID TECHNOLOGY por sathish sak
RFID TECHNOLOGY
sathish sak
•
287 vistas
Destacado
Volume 2-issue-6-2102-2107 por
Volume 2-issue-6-2102-2107
Editor IJARCET
178 vistas
•
6 diapositivas
Flors I Altres por
Flors I Altres
tomigc
419 vistas
•
5 diapositivas
Volume 2-issue-6-1979-1982 por
Volume 2-issue-6-1979-1982
Editor IJARCET
237 vistas
•
4 diapositivas
The world's happiest cities por
The world's happiest cities
MENSAGENSDOROY
271 vistas
•
55 diapositivas
311 314 por
311 314
Editor IJARCET
269 vistas
•
4 diapositivas
Enormo Entra En La Conversacion! por
Enormo Entra En La Conversacion!
Enormo.com
354 vistas
•
8 diapositivas
Destacado
(8)
Volume 2-issue-6-2102-2107 por Editor IJARCET
Volume 2-issue-6-2102-2107
Editor IJARCET
•
178 vistas
Flors I Altres por tomigc
Flors I Altres
tomigc
•
419 vistas
Volume 2-issue-6-1979-1982 por Editor IJARCET
Volume 2-issue-6-1979-1982
Editor IJARCET
•
237 vistas
The world's happiest cities por MENSAGENSDOROY
The world's happiest cities
MENSAGENSDOROY
•
271 vistas
311 314 por Editor IJARCET
311 314
Editor IJARCET
•
269 vistas
Enormo Entra En La Conversacion! por Enormo.com
Enormo Entra En La Conversacion!
Enormo.com
•
354 vistas
Green Hectares Rural Tech Workshop – Social Networking por Green Hectares
Green Hectares Rural Tech Workshop – Social Networking
Green Hectares
•
903 vistas
STC Summit 2013 Speaker Orientation por Paul Mueller
STC Summit 2013 Speaker Orientation
Paul Mueller
•
1.4K vistas
Similar a Ijarcet vol-2-issue-3-867-869
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
248 vistas
•
10 diapositivas
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
151 vistas
•
10 diapositivas
Rfid ( Radio Frequency Identification ) Essay por
Rfid ( Radio Frequency Identification ) Essay
Lindsay Alston
5 vistas
•
43 diapositivas
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method por
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
Luz Martinez
3 vistas
•
6 diapositivas
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE por
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
cscpconf
139 vistas
•
7 diapositivas
RFID Privacy & Security Issues por
RFID Privacy & Security Issues
Brent Muir
17.1K vistas
•
40 diapositivas
Similar a Ijarcet vol-2-issue-3-867-869
(20)
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
•
248 vistas
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin... por Alexander Decker
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
•
151 vistas
Rfid ( Radio Frequency Identification ) Essay por Lindsay Alston
Rfid ( Radio Frequency Identification ) Essay
Lindsay Alston
•
5 vistas
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method por Luz Martinez
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
Luz Martinez
•
3 vistas
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE por cscpconf
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
cscpconf
•
139 vistas
RFID Privacy & Security Issues por Brent Muir
RFID Privacy & Security Issues
Brent Muir
•
17.1K vistas
RFID por Syed Abdul Mutaal
RFID
Syed Abdul Mutaal
•
8.6K vistas
International Journal of Business and Management Invention (IJBMI) por inventionjournals
International Journal of Business and Management Invention (IJBMI)
inventionjournals
•
239 vistas
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy... por Onyebuchi nosiri
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Onyebuchi nosiri
•
595 vistas
RFID Based Security and Access Control System using ARDUINO por IJMTST Journal
RFID Based Security and Access Control System using ARDUINO
IJMTST Journal
•
155 vistas
RFID, a great potential for Operations and SCM por Hristo Borislavov Kolev
RFID, a great potential for Operations and SCM
Hristo Borislavov Kolev
•
643 vistas
Internet of Things and its Enabling Technologies - RFID por Swetha Kogatam
Internet of Things and its Enabling Technologies - RFID
Swetha Kogatam
•
7.1K vistas
IRJET- RFID Based Security Guard System using GSM por IRJET Journal
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
•
16 vistas
IRJET- RFID Based Security Guard System using GSM por IRJET Journal
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
•
22 vistas
Radio Frequency Identification por Gloria Young
Radio Frequency Identification
Gloria Young
•
3 vistas
Nahuel Grisolia. RFID Workshop. por Positive Hack Days
Nahuel Grisolia. RFID Workshop.
Positive Hack Days
•
8.6K vistas
RFID security ppt por Sandeep Singh
RFID security ppt
Sandeep Singh
•
10.4K vistas
Rfid Tag Manufacturer | Identis por SMO Clicks
Rfid Tag Manufacturer | Identis
SMO Clicks
•
25 vistas
RFID Whitepaper for Steel Industry por Unni Krishnan (CMILT, IRTS)
RFID Whitepaper for Steel Industry
Unni Krishnan (CMILT, IRTS)
•
4.1K vistas
Implementation of radio frequency identification technology in accessing info... por eSAT Journals
Implementation of radio frequency identification technology in accessing info...
eSAT Journals
•
217 vistas
Más de Editor IJARCET
Electrically small antennas: The art of miniaturization por
Electrically small antennas: The art of miniaturization
Editor IJARCET
879 vistas
•
6 diapositivas
Volume 2-issue-6-2205-2207 por
Volume 2-issue-6-2205-2207
Editor IJARCET
632 vistas
•
3 diapositivas
Volume 2-issue-6-2195-2199 por
Volume 2-issue-6-2195-2199
Editor IJARCET
595 vistas
•
5 diapositivas
Volume 2-issue-6-2200-2204 por
Volume 2-issue-6-2200-2204
Editor IJARCET
655 vistas
•
5 diapositivas
Volume 2-issue-6-2190-2194 por
Volume 2-issue-6-2190-2194
Editor IJARCET
629 vistas
•
5 diapositivas
Volume 2-issue-6-2186-2189 por
Volume 2-issue-6-2186-2189
Editor IJARCET
567 vistas
•
4 diapositivas
Más de Editor IJARCET
(20)
Electrically small antennas: The art of miniaturization por Editor IJARCET
Electrically small antennas: The art of miniaturization
Editor IJARCET
•
879 vistas
Volume 2-issue-6-2205-2207 por Editor IJARCET
Volume 2-issue-6-2205-2207
Editor IJARCET
•
632 vistas
Volume 2-issue-6-2195-2199 por Editor IJARCET
Volume 2-issue-6-2195-2199
Editor IJARCET
•
595 vistas
Volume 2-issue-6-2200-2204 por Editor IJARCET
Volume 2-issue-6-2200-2204
Editor IJARCET
•
655 vistas
Volume 2-issue-6-2190-2194 por Editor IJARCET
Volume 2-issue-6-2190-2194
Editor IJARCET
•
629 vistas
Volume 2-issue-6-2186-2189 por Editor IJARCET
Volume 2-issue-6-2186-2189
Editor IJARCET
•
567 vistas
Volume 2-issue-6-2177-2185 por Editor IJARCET
Volume 2-issue-6-2177-2185
Editor IJARCET
•
495 vistas
Volume 2-issue-6-2173-2176 por Editor IJARCET
Volume 2-issue-6-2173-2176
Editor IJARCET
•
525 vistas
Volume 2-issue-6-2165-2172 por Editor IJARCET
Volume 2-issue-6-2165-2172
Editor IJARCET
•
480 vistas
Volume 2-issue-6-2159-2164 por Editor IJARCET
Volume 2-issue-6-2159-2164
Editor IJARCET
•
548 vistas
Volume 2-issue-6-2155-2158 por Editor IJARCET
Volume 2-issue-6-2155-2158
Editor IJARCET
•
753 vistas
Volume 2-issue-6-2148-2154 por Editor IJARCET
Volume 2-issue-6-2148-2154
Editor IJARCET
•
516 vistas
Volume 2-issue-6-2143-2147 por Editor IJARCET
Volume 2-issue-6-2143-2147
Editor IJARCET
•
480 vistas
Volume 2-issue-6-2119-2124 por Editor IJARCET
Volume 2-issue-6-2119-2124
Editor IJARCET
•
448 vistas
Volume 2-issue-6-2139-2142 por Editor IJARCET
Volume 2-issue-6-2139-2142
Editor IJARCET
•
367 vistas
Volume 2-issue-6-2130-2138 por Editor IJARCET
Volume 2-issue-6-2130-2138
Editor IJARCET
•
404 vistas
Volume 2-issue-6-2125-2129 por Editor IJARCET
Volume 2-issue-6-2125-2129
Editor IJARCET
•
322 vistas
Volume 2-issue-6-2114-2118 por Editor IJARCET
Volume 2-issue-6-2114-2118
Editor IJARCET
•
447 vistas
Volume 2-issue-6-2108-2113 por Editor IJARCET
Volume 2-issue-6-2108-2113
Editor IJARCET
•
369 vistas
Volume 2-issue-6-2102-2107 por Editor IJARCET
Volume 2-issue-6-2102-2107
Editor IJARCET
•
349 vistas
Último
Learning from Failure_ Lessons from Failed Startups.pptx por
Learning from Failure_ Lessons from Failed Startups.pptx
Codeventures
17 vistas
•
7 diapositivas
The Talent Management Navigator Performance Management por
The Talent Management Navigator Performance Management
Seta Wicaksana
39 vistas
•
36 diapositivas
The Truth About Customer Journey Mapping por
The Truth About Customer Journey Mapping
Aggregage
134 vistas
•
39 diapositivas
December 2023 - Meat on the Bones por
December 2023 - Meat on the Bones
NZSG
32 vistas
•
11 diapositivas
3Q23_EN.pdf por
3Q23_EN.pdf
irhcs
17 vistas
•
75 diapositivas
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen... por
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
morshedislam3
22 vistas
•
5 diapositivas
Último
(20)
Learning from Failure_ Lessons from Failed Startups.pptx por Codeventures
Learning from Failure_ Lessons from Failed Startups.pptx
Codeventures
•
17 vistas
The Talent Management Navigator Performance Management por Seta Wicaksana
The Talent Management Navigator Performance Management
Seta Wicaksana
•
39 vistas
The Truth About Customer Journey Mapping por Aggregage
The Truth About Customer Journey Mapping
Aggregage
•
134 vistas
December 2023 - Meat on the Bones por NZSG
December 2023 - Meat on the Bones
NZSG
•
32 vistas
3Q23_EN.pdf por irhcs
3Q23_EN.pdf
irhcs
•
17 vistas
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen... por morshedislam3
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
morshedislam3
•
22 vistas
Better Appeals and Solicitations - Bloomerang.pdf por Bloomerang
Better Appeals and Solicitations - Bloomerang.pdf
Bloomerang
•
119 vistas
Navigating EUDR Compliance within the Coffee Industry por Peter Horsten
Navigating EUDR Compliance within the Coffee Industry
Peter Horsten
•
68 vistas
Integrating Talent Management Practices por Seta Wicaksana
Integrating Talent Management Practices
Seta Wicaksana
•
161 vistas
DEUTSER-03188 Salt Lake Nov 30 Talk with speaker notes[13].pptx por bradgallagher6
DEUTSER-03188 Salt Lake Nov 30 Talk with speaker notes[13].pptx
bradgallagher6
•
30 vistas
Nevigating Sucess.pdf por TEWMAGAZINE
Nevigating Sucess.pdf
TEWMAGAZINE
•
28 vistas
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf por Bloomerang
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang
•
194 vistas
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re... por Ilia Bider
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
Ilia Bider
•
16 vistas
Imports Next Level.pdf por Bloomerang
Imports Next Level.pdf
Bloomerang
•
179 vistas
VCOSA - VIETNAM COTTON - YARN MARKET REPORT - 11/2023 ISSUE por Vietnam Cotton & Spinning Association
VCOSA - VIETNAM COTTON - YARN MARKET REPORT - 11/2023 ISSUE
Vietnam Cotton & Spinning Association
•
37 vistas
yasin-ppt.pptx por samanolia75
yasin-ppt.pptx
samanolia75
•
21 vistas
Why are KPIs(key performance indicators) important? por Epixel MLM Software
Why are KPIs(key performance indicators) important?
Epixel MLM Software
•
24 vistas
Root Cause Analysis (RCA) por Operational Excellence Consulting (Singapore)
Root Cause Analysis (RCA)
Operational Excellence Consulting (Singapore)
•
78 vistas
Taryn_Stejskal_The 5 Practices of Highly Resilient People 30 Nov 2023 Officer... por bradgallagher6
Taryn_Stejskal_The 5 Practices of Highly Resilient People 30 Nov 2023 Officer...
bradgallagher6
•
25 vistas
Promoting the SEO to the C-Suite por Ash Nallawalla
Promoting the SEO to the C-Suite
Ash Nallawalla
•
14 vistas
Ijarcet vol-2-issue-3-867-869
1.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 867 All Rights Reserved © 2013 IJARCET Network security protocol with cryptography and RFID system P.SWETHA1 R.SUKANYA2 1 Assistant Professor,CSE, Global Institute of Engineering & Technology, Hyderabad 2 Assistant Professor,CSE, Global Institute of Engineering & Technology, Hyderabad ABSTRACT: Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding the original messages for transmission. On the other side The RFID technology recently has gained enormous attention in various field like in database maintenances(in the library management system), media, industry and as well as in network security. In the Radio frequency identification (RFID) use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person (user) for the purpose of identification and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system. This paper will describe about the brief introduction of the old and dynamic method employed for network security that is cryptography. Cryptographic technique is widely applicable in network security field but still we are suffering from hacking and unauthorized access. Hence we have introduced a new idea for being applicable in security field that is RFID technique. Here we will describe its various applications in various fields and how it can be implemented in network security. The security and privacy issues of RFID and their solutions will also be discussed. And the future possible ideas for the new technologies will also be discussed. Keywords: Encryption, decryption, RFID. I. INTRODUCTION: In present scenario the no. of subscriber with wireless access of internet through laptop, personal digital assistants (PDA’s), cellular phones, pagers and other wireless devices are increasing rapidly. In 1998, 1.2 million people had wireless web access. Hence wireless communication is one of the famous methods of interchanging information. Network is a group of system or entities which are connected by a communication medium either it may be wired or wireless and this whole environment are called networking. (1) Data confidentiality (2) Data integrity (3) Security (4) Data identification (5) Authorized access In this paper we will discuss one ancient method for achieving secure communication that is known as cryptography in which this can be done with the help of two operations called encryption & decryption. It is very secure way of communication in a network but still we are suffering from hacking or unauthorized access hence here we will introduce another concept which may be applicable for network security due to its various enormous applications in secured communication. Here we will just discuss the justification that RFID technique may be applicable in security purposes. RFID systems needs two components that are RFID transmitter (used to emit radio freq. signal) RFID tags (works as a receiver) There are mainly two techniques which we will describe here, those are as follows: (1)Cryptography (2)RFID technique
2.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 868 All Rights Reserved © 2013 IJARCET II. CRYPTOGRAPHY: Before dealing with cryptography we need to explain the concept of cryptology. The basic classification or stages of cryptology are given as: CRYPTOLOGY: It is made up from two GREEK words that are ―KRYPTOS‖ which means hidden and ―LOGOS‖ mean words hence we can say cryptology is an ancient art of hiding words for data security. CRYPTOGRAPHY: It is the branch of cryptology in which we studied the design of techniques of ensuring authorization and secrecy of information. So data can be secured from unauthorized access. III.RFID Technique RFID is the acronym for Radio Frequency Identification. As the name describes itself that in this the objects are identified by the radio frequency signal. For this whole operation we need two components of this system those are RFID transmitter: it is employed for the emission of radio frequency signal. It also works as a receiver which receives the signal which is reflected back from the object. RFID tag: It is employed for assigning a particular identity to n system so that it can get accessed by radio signal. It contains a chip which has some memory employed for storing information about the object. It also works as reflector which reflects the upcoming radio frequency signals back to the transmitter but with the encoded digital information. This can be retained by the transmitting antenna with the help of decoder employed with a digital to analog converter. Radio Frequency Identification (RFID) is a type of automatic identification system. The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. The use of RFID in tracking and access applications first appeared during the 1980s. RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive-and invasive-uses for RFID tags are in the works. In a typical RFID system, individual objects are equipped with a small, inexpensive tag which contains a transponder with a digital memory chip that is given a unique electronic product code. The interrogator, an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it can read and write data to it. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. RFID tags come in a wide variety of shapes and sizes. Some tags are easy to spot, such as the hard plastic anti-theft tags attached to merchandise in stores. Animal tracking tags which are implanted beneath the skin of family pets or endangered species are no bigger than a small section of pencil lead. Even smaller tags have been developed to be embedded within the fibres of a national currency. While barcodes have historically been the primary means of tracking products, RFID systems are rapidly becoming the preferred technology for keeping tabs on people, pets, products, and even vehicles. One reason for this is because the read/write capability of an active RFID system enables the use of interactive applications. Also, the tags can be read from a distance and through a variety of substances such as snow, fog, ice, or paint, where barcodes have proved useless.
3.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 869 All Rights Reserved © 2013 IJARCET Currently, RFID tags are not widely used in consumer products because the price of the tags is still prohibitively expensive. However, as companies push for enhanced means of tracking products and profiling consumers, the increased demand and production of RFID technologies will drive down prices. Already, developments in RFID technology are yielding systems with larger memory capacities, wider reading ranges, and faster processing. In response, the market for RFID tags is growing explosively, projected to reach $10 billion annually within the decade. It’s important to have a clear idea of what data security means right from the start. Only then can you truly measure whether an RFID implementation is truly secure. Here are three qualities that define data security in an RFID context: Controlled access to the data—only authorized entities (people, systems) can read and write information. Control over access to the system—Only authorized entities can configure and add to the system, and all devices on the system are authentic and trustworthy. Confidence and trust in the system—Users share a general perception that the system is safe and secure. This is a more subjective criteria, but important. IV. APPLICATIONS: a) Animal tracking - RFID technology is very useful in the tracking of animals especially pets. the RFID tags are implanted on any of their body parts and by transmitting radio frequency signals these animals can be tracked and identified . (b) Maintaining records of individual - With the help of RFID records of each individual can be maintained and accessed when required and soon it is going to be implemented by the Indian Govt. (c) Networking – RFID can be used for the purpose of network security the famous electronics accessories mfg. company APPLE is going to implement this technique in network security (d) Banking security- RFID and Biometric technology is being used in the locker system in banks and ATM’s for providing better security. V. CONCLUSION As cryptography is an ancient and dynamic method of achieving network security and is still being used widely but the idea behind this paper is to make use of RFID systems parallel with cryptography due to its enormous property of providing high degree of user and data authentification and better reliability. Hence a greater extent of security can be achieved by using RFID VI. REFERENCES: (1) Applied cryptography and data security -- Prof. Christof Paar (2) www.google.com (3) Cryptography in network security -- William Stallings (4) Network security essentials -- William Stallings .Authors Biography: P.Swetha is from HYDERABAD, ANDHRAPRADESH. Completed M.TECH in CSE with specialization CSE from Vidya Vikas Institute of Technology affiliated to JNTUH in 2009 and B.TECH in CSE from VidyaJyothi Institute of Technology affiliated to JNTUH in 2006. Currently she is working as an Assistant professor in CSE department at Global Institute of Engineering & Technology, Hyderabad from 2010. Her areas of research interests include Data Mining, Networking, Android & Network security. R.SUKANYA is from HYDERABAD, ANDHRAPRADESH. Completed M.TECH in CSE with specialization (COMPUTER SCIENCE & ENGINEERING) from P.IndraReddy Memorial College of engineering affiliated by JNTUH.Currently working as an Assistant professor in CSE department in Global Institute of Engineering & Technology, Hyderabad from 2011. Her Areas of research interests include Data Mining, Networking , Android & Network security.
Descargar ahora