SlideShare a Scribd company logo
1 of 3
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
867
All Rights Reserved © 2013 IJARCET
Network security protocol with cryptography and RFID
system
P.SWETHA1
R.SUKANYA2
1
Assistant Professor,CSE, Global Institute of Engineering & Technology, Hyderabad
2
Assistant Professor,CSE, Global Institute of Engineering & Technology, Hyderabad
ABSTRACT: Wireless communication is very common
and widely applicable technique in communication field.
In these field new techniques invented that is called RFID
technique, in which object having RFID tags on them are
being accessed in radio frequency region. Cryptography
(method involves the both process “encryption” and
“decryption”) is widely used in network system’s security.
It is also the ancient method of encoding the original
messages for transmission.
On the other side The RFID technology recently
has gained enormous attention in various field like in
database maintenances(in the library management
system), media, industry and as well as in network
security. In the Radio frequency identification (RFID) use
of an object (typically referred to as RFID tag) applied to
or incorporated into a product, animal, or person (user)
for the purpose of identification and tracking using radio
waves. Each member has its unique id or RFID tag.
However security and privacy pose significant challenges
on the system.
This paper will describe about the brief
introduction of the old and dynamic method employed for
network security that is cryptography. Cryptographic
technique is widely applicable in network security field but
still we are suffering from hacking and unauthorized
access. Hence we have introduced a new idea for being
applicable in security field that is RFID technique. Here
we will describe its various applications in various fields
and how it can be implemented in network security. The
security and privacy issues of RFID and their solutions
will also be discussed. And the future possible ideas for the
new technologies will also be discussed.
Keywords: Encryption, decryption, RFID.
I. INTRODUCTION:
In present scenario the no. of subscriber with wireless
access of internet through laptop, personal digital assistants
(PDA’s), cellular phones, pagers and other wireless devices
are increasing rapidly. In 1998, 1.2 million people had
wireless web access. Hence wireless communication is one
of the famous methods of interchanging information.
Network is a group of system or entities which are
connected by a communication medium either it may be
wired or wireless and this whole environment are called
networking.
(1) Data confidentiality
(2) Data integrity
(3) Security
(4) Data identification
(5) Authorized access
In this paper we will discuss one ancient method
for achieving secure communication that is known as
cryptography in which this can be done with the help of two
operations called encryption & decryption. It is very secure
way of communication in a network but still we are
suffering from hacking or unauthorized access hence here
we will introduce another concept which may be applicable
for network security due to its various enormous
applications in secured communication. Here we will just
discuss the justification that RFID technique may be
applicable in security purposes. RFID systems needs two
components that are
RFID transmitter (used to emit radio freq. signal)
RFID tags (works as a receiver)
There are mainly two techniques which we will describe
here, those are as follows:
(1)Cryptography
(2)RFID technique
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
868
All Rights Reserved © 2013 IJARCET
II. CRYPTOGRAPHY:
Before dealing with cryptography we need to explain the
concept of cryptology. The basic classification or stages of
cryptology are given as:
CRYPTOLOGY: It is made up from two GREEK words
that are ―KRYPTOS‖ which means hidden and ―LOGOS‖
mean words hence we can say cryptology is an ancient art of
hiding words for data security.
CRYPTOGRAPHY: It is the branch of cryptology in which
we studied the design of techniques of ensuring
authorization and secrecy of information. So data can be
secured from unauthorized access.
III.RFID Technique
RFID is the acronym for Radio Frequency
Identification. As the name describes itself that in this the
objects are identified by the radio frequency signal. For this
whole operation we need two components of this system
those are RFID transmitter: it is employed for the emission
of radio frequency signal. It also works as a receiver which
receives the signal which is reflected back from the object.
RFID tag: It is employed for assigning a particular identity
to n system so that it can get accessed by radio signal. It
contains a chip which has some memory employed for
storing information about the object.
It also works as reflector which reflects the upcoming radio
frequency signals back to the transmitter but with the
encoded digital information. This can be retained by the
transmitting antenna with the help of decoder employed
with a digital to analog converter.
Radio Frequency Identification (RFID) is a type of
automatic identification system. The purpose of an RFID
system is to enable data to be transmitted by a portable
device, called a tag, which is read by an RFID reader and
processed according to the needs of a particular application.
The data transmitted by the tag may provide identification
or location information, or specifics about the product
tagged, such as price, colour, date of purchase, etc. The use
of RFID in tracking and access applications first appeared
during the 1980s. RFID quickly gained attention because of
its ability to track moving objects. As the technology is
refined, more pervasive-and invasive-uses for RFID tags are
in the works.
In a typical RFID system, individual objects are
equipped with a small, inexpensive tag which contains a
transponder with a digital memory chip that is given a
unique electronic product code. The interrogator, an antenna
packaged with a transceiver and decoder, emits a signal
activating the RFID tag so it can read and write data to it.
When an RFID tag passes through the electromagnetic zone,
it detects the reader's activation signal.
The reader decodes the data encoded in the tag's
integrated circuit (silicon chip) and the data is passed to the
host computer for processing. RFID tags come in a wide
variety of shapes and sizes. Some tags are easy to spot, such
as the hard plastic anti-theft tags attached to merchandise in
stores. Animal tracking tags which are implanted beneath
the skin of family pets or endangered species are no bigger
than a small section of pencil lead. Even smaller tags have
been developed to be embedded within the fibres of a
national currency. While barcodes have historically been the
primary means of tracking products, RFID systems are
rapidly becoming the preferred technology for keeping tabs
on people, pets, products, and even vehicles. One reason for
this is because the read/write capability of an active RFID
system enables the use of interactive applications. Also, the
tags can be read from a distance and through a variety of
substances such as snow, fog, ice, or paint, where barcodes
have proved useless.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, March 2013
869
All Rights Reserved © 2013 IJARCET
Currently, RFID tags are not widely used in
consumer products because the price of the tags is still
prohibitively expensive. However, as companies push for
enhanced means of tracking products and profiling
consumers, the increased demand and production of RFID
technologies will drive down prices. Already, developments
in RFID technology are yielding systems with larger
memory capacities, wider reading ranges, and faster
processing. In response, the market for RFID tags is
growing explosively, projected to reach $10 billion annually
within the decade.
It’s important to have a clear idea of what data
security means right from the start. Only then can you truly
measure whether an RFID implementation is truly secure.
Here are three qualities that define data security in an RFID
context:
 Controlled access to the data—only authorized
entities (people, systems) can read and write
information.
 Control over access to the system—Only
authorized entities can configure and add to the
system, and all devices on the system are authentic
and trustworthy.
 Confidence and trust in the system—Users share
a general perception that the system is safe and
secure. This is a more subjective criteria, but
important.
IV. APPLICATIONS:
a) Animal tracking - RFID technology is very useful in
the tracking of animals especially pets. the RFID tags are
implanted on any of their body parts and by transmitting
radio frequency signals these animals can be tracked and
identified .
(b) Maintaining records of individual - With the help of
RFID records of each individual can be maintained and
accessed when required and soon it is going to be
implemented by the Indian Govt.
(c) Networking – RFID can be used for the purpose of
network security the famous electronics accessories mfg.
company APPLE is going to implement this technique in
network security
(d) Banking security- RFID and Biometric technology is
being used in the locker system in banks and ATM’s for
providing better security.
V. CONCLUSION
As cryptography is an ancient and dynamic method
of achieving network security and is still being used widely
but the idea behind this paper is to make use of RFID
systems parallel with cryptography due to its enormous
property of providing high degree of user and data
authentification and better reliability. Hence a greater extent
of security can be achieved by using RFID
VI. REFERENCES:
(1) Applied cryptography and data security
-- Prof. Christof Paar
(2) www.google.com
(3) Cryptography in network security
-- William Stallings
(4) Network security essentials
-- William Stallings
.Authors Biography:
P.Swetha is from HYDERABAD, ANDHRAPRADESH.
Completed M.TECH in CSE with specialization CSE from
Vidya Vikas Institute of Technology affiliated to JNTUH in
2009 and B.TECH in CSE from VidyaJyothi Institute of
Technology affiliated to JNTUH in 2006. Currently she is
working as an Assistant professor in CSE department at
Global Institute of Engineering & Technology, Hyderabad
from 2010. Her areas of research interests include Data
Mining, Networking, Android & Network security.
R.SUKANYA is from
HYDERABAD, ANDHRAPRADESH. Completed
M.TECH in CSE with specialization (COMPUTER
SCIENCE & ENGINEERING) from P.IndraReddy
Memorial College of engineering affiliated by
JNTUH.Currently working as an Assistant professor in
CSE department in Global Institute of Engineering &
Technology, Hyderabad from 2011. Her
Areas of research interests include Data Mining,
Networking , Android & Network security.

More Related Content

What's hot

A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issuecsandit
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
 
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...Manos Theocharopoulos
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of ThingsDmitri Shiryaev
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksKartik Kachhadiya
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.docArtechno7
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationBECLIBRARY
 
My best effort
My best effortMy best effort
My best effortsujataray
 
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDFaisal Razzak
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)GITAM
 

What's hot (17)

A research survey rfid security & privacy issue
A research survey rfid security & privacy issueA research survey rfid security & privacy issue
A research survey rfid security & privacy issue
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
RFID Technology and Internet of Things
RFID Technology and Internet of ThingsRFID Technology and Internet of Things
RFID Technology and Internet of Things
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
Iot intro
Iot introIot intro
Iot intro
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
RFID and Wireless Sensor Networks
RFID and Wireless Sensor NetworksRFID and Wireless Sensor Networks
RFID and Wireless Sensor Networks
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.doc
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
My best effort
My best effortMy best effort
My best effort
 
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFID
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
 

Viewers also liked

Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Flors I Altres
Flors I AltresFlors I Altres
Flors I Altrestomigc
 
Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Editor IJARCET
 
The world's happiest cities
The world's happiest citiesThe world's happiest cities
The world's happiest citiesMENSAGENSDOROY
 
Enormo Entra En La Conversacion!
Enormo Entra En La Conversacion!Enormo Entra En La Conversacion!
Enormo Entra En La Conversacion!Enormo.com
 
Green Hectares Rural Tech Workshop – Social Networking
Green Hectares Rural Tech Workshop – Social NetworkingGreen Hectares Rural Tech Workshop – Social Networking
Green Hectares Rural Tech Workshop – Social NetworkingGreen Hectares
 
STC Summit 2013 Speaker Orientation
STC Summit 2013 Speaker OrientationSTC Summit 2013 Speaker Orientation
STC Summit 2013 Speaker OrientationPaul Mueller
 

Viewers also liked (8)

Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Flors I Altres
Flors I AltresFlors I Altres
Flors I Altres
 
Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982
 
The world's happiest cities
The world's happiest citiesThe world's happiest cities
The world's happiest cities
 
311 314
311 314311 314
311 314
 
Enormo Entra En La Conversacion!
Enormo Entra En La Conversacion!Enormo Entra En La Conversacion!
Enormo Entra En La Conversacion!
 
Green Hectares Rural Tech Workshop – Social Networking
Green Hectares Rural Tech Workshop – Social NetworkingGreen Hectares Rural Tech Workshop – Social Networking
Green Hectares Rural Tech Workshop – Social Networking
 
STC Summit 2013 Speaker Orientation
STC Summit 2013 Speaker OrientationSTC Summit 2013 Speaker Orientation
STC Summit 2013 Speaker Orientation
 

Similar to Ijarcet vol-2-issue-3-867-869

5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEcscpconf
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) inventionjournals
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINOIJMTST Journal
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMHristo Borislavov Kolev
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfarchiesgallery
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisSMO Clicks
 

Similar to Ijarcet vol-2-issue-3-867-869 (20)

5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUEA RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
RFID
RFIDRFID
RFID
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI) International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
RFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINORFID Based Security and Access Control System using ARDUINO
RFID Based Security and Access Control System using ARDUINO
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdf
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
RFID Whitepaper for Steel Industry
RFID Whitepaper for Steel IndustryRFID Whitepaper for Steel Industry
RFID Whitepaper for Steel Industry
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Recently uploaded (20)

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 

Ijarcet vol-2-issue-3-867-869

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 867 All Rights Reserved © 2013 IJARCET Network security protocol with cryptography and RFID system P.SWETHA1 R.SUKANYA2 1 Assistant Professor,CSE, Global Institute of Engineering & Technology, Hyderabad 2 Assistant Professor,CSE, Global Institute of Engineering & Technology, Hyderabad ABSTRACT: Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding the original messages for transmission. On the other side The RFID technology recently has gained enormous attention in various field like in database maintenances(in the library management system), media, industry and as well as in network security. In the Radio frequency identification (RFID) use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person (user) for the purpose of identification and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system. This paper will describe about the brief introduction of the old and dynamic method employed for network security that is cryptography. Cryptographic technique is widely applicable in network security field but still we are suffering from hacking and unauthorized access. Hence we have introduced a new idea for being applicable in security field that is RFID technique. Here we will describe its various applications in various fields and how it can be implemented in network security. The security and privacy issues of RFID and their solutions will also be discussed. And the future possible ideas for the new technologies will also be discussed. Keywords: Encryption, decryption, RFID. I. INTRODUCTION: In present scenario the no. of subscriber with wireless access of internet through laptop, personal digital assistants (PDA’s), cellular phones, pagers and other wireless devices are increasing rapidly. In 1998, 1.2 million people had wireless web access. Hence wireless communication is one of the famous methods of interchanging information. Network is a group of system or entities which are connected by a communication medium either it may be wired or wireless and this whole environment are called networking. (1) Data confidentiality (2) Data integrity (3) Security (4) Data identification (5) Authorized access In this paper we will discuss one ancient method for achieving secure communication that is known as cryptography in which this can be done with the help of two operations called encryption & decryption. It is very secure way of communication in a network but still we are suffering from hacking or unauthorized access hence here we will introduce another concept which may be applicable for network security due to its various enormous applications in secured communication. Here we will just discuss the justification that RFID technique may be applicable in security purposes. RFID systems needs two components that are RFID transmitter (used to emit radio freq. signal) RFID tags (works as a receiver) There are mainly two techniques which we will describe here, those are as follows: (1)Cryptography (2)RFID technique
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 868 All Rights Reserved © 2013 IJARCET II. CRYPTOGRAPHY: Before dealing with cryptography we need to explain the concept of cryptology. The basic classification or stages of cryptology are given as: CRYPTOLOGY: It is made up from two GREEK words that are ―KRYPTOS‖ which means hidden and ―LOGOS‖ mean words hence we can say cryptology is an ancient art of hiding words for data security. CRYPTOGRAPHY: It is the branch of cryptology in which we studied the design of techniques of ensuring authorization and secrecy of information. So data can be secured from unauthorized access. III.RFID Technique RFID is the acronym for Radio Frequency Identification. As the name describes itself that in this the objects are identified by the radio frequency signal. For this whole operation we need two components of this system those are RFID transmitter: it is employed for the emission of radio frequency signal. It also works as a receiver which receives the signal which is reflected back from the object. RFID tag: It is employed for assigning a particular identity to n system so that it can get accessed by radio signal. It contains a chip which has some memory employed for storing information about the object. It also works as reflector which reflects the upcoming radio frequency signals back to the transmitter but with the encoded digital information. This can be retained by the transmitting antenna with the help of decoder employed with a digital to analog converter. Radio Frequency Identification (RFID) is a type of automatic identification system. The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. The use of RFID in tracking and access applications first appeared during the 1980s. RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive-and invasive-uses for RFID tags are in the works. In a typical RFID system, individual objects are equipped with a small, inexpensive tag which contains a transponder with a digital memory chip that is given a unique electronic product code. The interrogator, an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it can read and write data to it. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. RFID tags come in a wide variety of shapes and sizes. Some tags are easy to spot, such as the hard plastic anti-theft tags attached to merchandise in stores. Animal tracking tags which are implanted beneath the skin of family pets or endangered species are no bigger than a small section of pencil lead. Even smaller tags have been developed to be embedded within the fibres of a national currency. While barcodes have historically been the primary means of tracking products, RFID systems are rapidly becoming the preferred technology for keeping tabs on people, pets, products, and even vehicles. One reason for this is because the read/write capability of an active RFID system enables the use of interactive applications. Also, the tags can be read from a distance and through a variety of substances such as snow, fog, ice, or paint, where barcodes have proved useless.
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013 869 All Rights Reserved © 2013 IJARCET Currently, RFID tags are not widely used in consumer products because the price of the tags is still prohibitively expensive. However, as companies push for enhanced means of tracking products and profiling consumers, the increased demand and production of RFID technologies will drive down prices. Already, developments in RFID technology are yielding systems with larger memory capacities, wider reading ranges, and faster processing. In response, the market for RFID tags is growing explosively, projected to reach $10 billion annually within the decade. It’s important to have a clear idea of what data security means right from the start. Only then can you truly measure whether an RFID implementation is truly secure. Here are three qualities that define data security in an RFID context:  Controlled access to the data—only authorized entities (people, systems) can read and write information.  Control over access to the system—Only authorized entities can configure and add to the system, and all devices on the system are authentic and trustworthy.  Confidence and trust in the system—Users share a general perception that the system is safe and secure. This is a more subjective criteria, but important. IV. APPLICATIONS: a) Animal tracking - RFID technology is very useful in the tracking of animals especially pets. the RFID tags are implanted on any of their body parts and by transmitting radio frequency signals these animals can be tracked and identified . (b) Maintaining records of individual - With the help of RFID records of each individual can be maintained and accessed when required and soon it is going to be implemented by the Indian Govt. (c) Networking – RFID can be used for the purpose of network security the famous electronics accessories mfg. company APPLE is going to implement this technique in network security (d) Banking security- RFID and Biometric technology is being used in the locker system in banks and ATM’s for providing better security. V. CONCLUSION As cryptography is an ancient and dynamic method of achieving network security and is still being used widely but the idea behind this paper is to make use of RFID systems parallel with cryptography due to its enormous property of providing high degree of user and data authentification and better reliability. Hence a greater extent of security can be achieved by using RFID VI. REFERENCES: (1) Applied cryptography and data security -- Prof. Christof Paar (2) www.google.com (3) Cryptography in network security -- William Stallings (4) Network security essentials -- William Stallings .Authors Biography: P.Swetha is from HYDERABAD, ANDHRAPRADESH. Completed M.TECH in CSE with specialization CSE from Vidya Vikas Institute of Technology affiliated to JNTUH in 2009 and B.TECH in CSE from VidyaJyothi Institute of Technology affiliated to JNTUH in 2006. Currently she is working as an Assistant professor in CSE department at Global Institute of Engineering & Technology, Hyderabad from 2010. Her areas of research interests include Data Mining, Networking, Android & Network security. R.SUKANYA is from HYDERABAD, ANDHRAPRADESH. Completed M.TECH in CSE with specialization (COMPUTER SCIENCE & ENGINEERING) from P.IndraReddy Memorial College of engineering affiliated by JNTUH.Currently working as an Assistant professor in CSE department in Global Institute of Engineering & Technology, Hyderabad from 2011. Her Areas of research interests include Data Mining, Networking , Android & Network security.