Submit Search
Upload
Accessory authentication on NFC enabled product using three pass AES algorithm
•
0 likes
•
3 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i6/IRJET-V9I6581.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
IJECEIAES
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
IJECEIAES
Smart offload chain: a proposed architecture for blockchain assisted fog off...
Smart offload chain: a proposed architecture for blockchain assisted fog off...
IJECEIAES
Design and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoC
IRJET Journal
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
dbpublications
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
Recommended
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
IJECEIAES
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal ...
IRJET Journal
Efficient addressing schemes for internet of things
Efficient addressing schemes for internet of things
IJECEIAES
Smart offload chain: a proposed architecture for blockchain assisted fog off...
Smart offload chain: a proposed architecture for blockchain assisted fog off...
IJECEIAES
Design and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoC
IRJET Journal
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
dbpublications
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
TELKOMNIKA JOURNAL
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
9-2020.pdf
9-2020.pdf
fermanrw
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
IRJET Journal
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
Patricia Viljoen
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
IRJET Journal
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
ijngnjournal
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
IJECEIAES
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
ijcsit
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
AIRCC Publishing Corporation
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
TELKOMNIKA JOURNAL
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
IRJET Journal
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
IJNSA Journal
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
IAEME Publication
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Accessory authentication on NFC enabled product using three pass AES algorithm
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
IJCNCJournal
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
TELKOMNIKA JOURNAL
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
9-2020.pdf
9-2020.pdf
fermanrw
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
IRJET Journal
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
Patricia Viljoen
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
IRJET Journal
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
ijngnjournal
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
IJECEIAES
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
ijcsit
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
AIRCC Publishing Corporation
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
TELKOMNIKA JOURNAL
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
IRJET Journal
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
IJNSA Journal
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
IAEME Publication
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
Similar to Accessory authentication on NFC enabled product using three pass AES algorithm
(20)
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
9-2020.pdf
9-2020.pdf
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Recently uploaded
(20)
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
power system scada applications and uses
power system scada applications and uses
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Accessory authentication on NFC enabled product using three pass AES algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2905 Accessory authentication on NFC enabled product using three pass AES algorithm Sukrutha C Basappa1, Nagaraja G S2 1MTech student at R V College of Engineering, Bengaluru, Karnataka 2Professor and Associate Dean (PG-CSE) at R V College of Engineering, Bengaluru, Karnataka ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, Near Field Communication (NFC) market is no more a monopoly. Competition is highamong the companies with regard to products they manufacture and their features for consumer attraction. Mutual authentication between NFC reader and tag ensures safe communication between them. This paper proposes an accessory authentication model that guarantees that counterparts of a product are of same company. AES-128 bits algorithm is used in two different modes, that is AES-ECB and AES-CBC for mutual authentication. AES-CBC mode is stronger in terms of security when compared to AES-ECB mode. Key Words: AES, Brand protection, Mutual authentication, NFC, Security. 1. INTRODUCTION NFC technology was developed in the year 2004 by Philips Electronics and Sony. It is a short range, wireless technology with operating area within 10 centimeters, operating frequency 13.56 MHz and data transmission rate used here is of 106 kbps. The objective of the paper is to develop an accessory authentication model for an NFC enabled product. This ensures that replaceable part of the product (NFC tag) and the fixed part (active NFC reader) are paired counterparts and are of the same company. With this end-user can get high quality product. This kind of product positively impacts manufacturing and authenticating companies, thereby ensuring brand protection. Some examples are authentication in motorized tooth brush, where brush handle has NFC reader and the brush head has NFC tag in it. In high end blenders, the base unit will have NFC reader and the jar/container will have NFC tag.[12] To achieve this, firstly communication is establishedamongthe NFC reader and the tag. Then three pass AES (Advanced Encryption Standard) algorithm is run, before actual data transfer happens. AES-128 is a symmetric block cipher, that uses one shared secret key for both encryption and decryption. Choice for mode of AES is provided. User can choose authentication to happen either in AES-ECB (Electronic Code Book) or in AES-CBC (Cipher Block Chaining) mode, depending on their requirement. 2. LITERATURE SURVEY In [1], authors have used the fact that NFC has an operating modecalled read or write. This has the propertyof one directional transfer of data only. However, they have tried to bring in a bi-directional model that is half duplex in nature. Main advantage of this operating modeof NFCisthat, it allows different data formats and very low protocol overhead. But one main challenge is regarding the reader collision problem, completing transactions in a secure way, within a timeframe. Fingerprint and Kerberos are two factor authentication used. In [2], a smart bandage with wireless temperature and strain sensor, with passive NFC tag is designed. An android application called SenseAble was built, to display the body temperatureand other sensor readings.Chestexpansionand contraction of a Covid-19 patient was rightly monitored by this smart bandage. In [3], it proves thatMITMattackscanbedoneduringNFC communication, when using a passive card. This method of attack mimics real implementation of EMV protocolenabling devices, used for payments. Paper demonstrates how a contactless payment system can be compromised by an attacker, by using a malicious MITM card. In [4], study is done on reading range of implanted sensors, based on NFC Integrated circuit (IC) by using a NFC enabled smart phone. Challenges noted were low coupling between loops of various sizes and limited quality imposed by bandwidthcommunication.Resultsshowthatsystemwith three coils performs better at longer distance than 2-coil system. In [5], a scheme to build a new public transport payment method with different technologies like NFC, Bluetooth, IC card is integrated. Advantage is that, passengers can choose the payment method that suits them, in terms of discount on ticket fare. This solves the problem that the payment platforms are not unified and that passengers have many applications on their mobile, which causes inconvenience while travelling. In [6], a model forvehicle network operatorsusingNFCis proposed. Tourists generally will not use local mobile operator’s services, as they stay for short time and the roamingchargesare also high. Asasolution,themodelwhich allows less mobile traffic cost for tourist and has increased transaction security is proposed. Here the user’s mobile traffic is routed to the network of vehicle rental service
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2906 provider. This simplifiesthetourismforatouristandsecurity of user’s personal data. In [7], author starts the paper by discussing general aspects of NFC and its comparison with RFID technology. Light is thrown on different ISOstandardsNFCcomplieswith and NFC operating modes. They prove that NFC isvulnerable to securityattacks, which canleakuser’simportantdata.This can have negative impact on organization adopting NFC technology and its applications. Different attacks are listed and a scientific method to increase security is also proposed. In [8], extended version of different attacks in NFCareais briefed. Focus on DoS and data corruptions was given as it was noted from studying risk assessment models, these two attacks were most commonly witnessed. They were studied by Analytical Hierarchy Process (AHP). A solution was proposed whichwasatouchandgoapplicationcalledMIDAS. It is concluded that AES and ECC (Elliptic Curve Cryptography) are best known algorithms to build a secure channel and to avoid data corruption. In [9], Authors propose an application of NFC in the IoT domain. Textile industry is far behind in terms of IoT. Hence, to enhance the textile business, a system called ‘Interactive clothes’ is designed. Every cloth has an NFC chip with unique number embedded in it. An application to scan the NFC is developed, which gives a URL to the database. This system modernises manufacturing, managing, selling and buying goods. In [10], author proves that tags used in NFC system are limited in terms of chip size and power consumption. These limitations make it difficult tointegrate strongcryptographic security onto the tags. Author suggests that there is need to implement secure algorithmthat is secureagainstattacklike Side-Channel Analysis (SCA). As a case study, a tag with cryptographic algorithms (AES and ECDSA) implemented is taken. Few of the research gaps observed are as follows: 1. NFCisashort-rangecommunicationtechnology,and hence believed that security risks are low as the interaction is within close proximity. But security vulnerabilities do exist and few attacks are only discovered. 2. NFC is mostly used in the area of access control and paymentmethod.Otherapplicationslikefiletransfer and in IoT can be researched more. 3. The economic performance of NFC developments can be evaluatedandimpactsofNFCtechnologieson companies, organizations and business models can be explored. 3. DESIGN Project design gives an outline of project development process. It helps to identify the modules and the tools required to implement them. Figure 1 shows the system architecture which includes a user application built on NFC reader library for authentication process [11]. The reader library stack has fourlayers.Applicationlayeristhetoplayer, which implements the commands to work with contactless technologies.ProtocolabstractionlayerhasfunctionsforNFC card activation. The hardware specific elements of reader implemented in the hardware abstraction layer. It also helps execute native commands of the chip. The lowest bus abstraction layer, implements the communication between the reader and tag. Both reader and taghaveakeystore,from which they decide upon a secret key for authentication. Figure 1: System architecture Data flow diagrams help to understand thesystem better as it brings in modularity. Figure 2 shows DFD Level 0. Authentication procedure starts when user application makes reader to pass ReqA (Request A) command to the detected cards. Authentication result is decisive, if counterparts are authenticated then communication between them starts, else aborts. Figure 2: DFD Level 0 DFD Level 1 in figure 3 shows the two modules involved in accessory authentication. First is communication establishmemt between reader andtag, whichisachieved by using available command set of tags. If more thanonecard is present in proximity, collisionresolutionisdone bystandard anticollision procedure and one card is selected. Then three pass AES algorithm is used for mutual authentication.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2907 Figure 3: DFD Level 1 4. METHODOLOGY NFC reader will emit radio waves in a periodic manner and checks if any card is present in its proximity. If no card is detected, reader continues the loop until a card is detected.If more than one card is detected, anticollision procedure resolves the conflict and chooses one card as counterpart for reader. After card selection and activation, authentication procedure happens. If reader and tag successfully authenticate to each other, a sample text is written into the card and then read back to check data integrity. Figure 4 shows entire methodology adopted in the form of flowchart. Figure 4: Flowchart of accessory authentication AES three pass mutual authentication is a procedure which uses key of length 128 bits [12]. In the first pass of algorithm, NFC reader encrypts its data (RndX) with agreed secret key (K) and sends the cipher to NFC tag. In return, tag responds by sending the deciphered data. In second pass,tag encrypts its data (RndY) and sends the cipher generated to reader. Reader deciphers andsends the responseback.Third pass includes each party verifying if data received is same as what they had generated originally. That is reader checks if tag had sent RndX correctly, and tag checks if reader’s response had RndY. If any one party fails to authenticate themselves to other, the accessory authentication procedure is aborted. User can choose either AES-ECB mode for authentication or AES-CBC mode. If databeingencipheredby each party is not sensitive, ECB is best option as it is fast. However, if security of data is prime concern, then CBC is preferred because of its complexity. Figure 5 shows pictorial representation of authentication procedurediscussedabove. Figure 5: Three pass mutual authentication 5. RESULT AND ANALYSIS Anticollision procedure selects a tag based on its uid (unique identification number) which is followed by card activation. The console display is as shown in figure 6. Technology of the detected card is displayed along with its uid. Figure 6: Card activation Card activation is followed by choice entry by user for mode selection. The output after running accessory authentication in AES-CBC mode is shown in figure 7. Both reader and tag have authenticated to each other. Sample text was written into tag and readsuccessfully without any error. Figure 7: Accessory authentication by AES-CBC mode
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2908 AES-ECB mode is simple and fast approach. Drawback is that duplicate data in plain text will be reflected in the cipher text. Hence, it is not recommended in the areas where security is a priority. Whereas, AES-CBC mode will encrypt every occurrence of same plain text into differentciphertext. But it is slow and complex compared to ECB mode. Yet CBCis stronger in terms of security and is preferred for authentication. 6. CONCLUSION A survey shows that NFC market is likely to raise from 18 billion USD in 2020 to 34.9 billion USD by 2025.Themain use cases are in mobile commerce and usage of wearable technology. This paper serves the need for accessory authentication by AES algorithm, to ensure that genuine parts of same company are used. This enhances consumer experience, convenience and ensures product safety. If product requires more secure form of authentication, ECCis suggested from public key cryptographic algorithms. Here, user application just checks read and write ontothetagafter successful authentication. This feature can be enhanced according to user needs. Example in case of NFC enabled product like motorized toothbrush, authentication can be followed by tapping mobile phone to tag can display URL to webpage that keeps track of oral health and brush head replacement date. REFERENCES [1] M. S. Chishti, C. T. King and A. Banerjee, “Exploring Half- Duplex Communication of NFC Read/Write Mode for Secure Multi-Factor Authentication”, 2021 in IEEE Access, vol. 9, pp. 6344-6357, doi: 10.1109/ACCESS.2020.3048711. [2] P. Escobedo, M. Bhattacharjee,F.Nikbakhtnasrabadiand R. Dahiya, “Smart Bandage With Wireless Strain and TemperatureSensorsand BatterylessNFCTag”,2021,in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 5093- 5100, 15 March, doi: 10.1109/JIOT.2020.3048282. [3] S. Akter, S. Chellappan, T. Chakraborty, T. A. Khan, A. Rahman and A. B. M. Alim Al Islam, “Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection”, 2021, in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 3012-3023, 1 Nov-Dec, doi: 10.1109/TDSC.2020.3030213. [4] A. Lazaro, M. Boada, R. Villarino and D. Girbau, “Study on the Reading of Energy-Harvested Implanted NFC Tags Using Mobile Phones”, 2020 in IEEE Access, vol. 8, pp. 2200-2221, doi: 10.1109/ACCESS.2019.2962570. [5] C. Shuran and Y. Xiaoling, “A New Public Transport Payment Method BasedonNFCandQRCode”,2020IEEE 5th International Conference on Intelligent Transportation Engineering (ICITE), pp. 240-244, doi: 10.1109/ICITE50838.2020.9231356. [6] V. Oliinyk and O. Rubel, “Improving Safety and Ease of Use in Automatic Electric Vehicle Rental Systems”, 2020 IEEE 15th International ConferenceonAdvancedTrends in Radioelectronics, Telecommunications andComputer Engineering (TCSET), pp. 800-803, doi: 10.1109/TCSET49122.2020.235545. [7] A. Albattah, Y. Alghofaili and S. Elkhediri, “NFC Technology: Assessment Effective of Security towards Protecting NFC Devices & Services”, 2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020, pp. 1-5, doi: 10.1109/ICCIT- 144147971.2020.9213758. [8] M. M. Singh, K. A. A. K. Adzman and R.Hassan,“NearField Communication (NFC) Technology Security Vulnerabilities and Countermeasures”,2018, InternationalJournalofEngineering&Technology,vol.7, no. 4.31, pp. 298-305. [9] Kishore Kumar Reddy N. G. and Rajeshwari K., “Interactive clothes based on IOT using NFC and Mobile Application”, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 2017, pp. 1-4, doi: 10.1109/CCWC.2017.7868339 [10] Korak T, “Evaluation of a security-enabledNFCTagwith AES and ECDSA”, 2011, Master’s thesis, Institute for appliedInformationProcessingandCommunications (IAIK), Austria. [11] NFC Reader Library: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/nfc/707/1/UM10802_NXP-NFC- Reader-Library-v3.010-API.pdf [12] Mutual authentication procedure: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/tech-days/179/1/AMF-SMC- T3036.pdf BIOGRAPHIES Sukrutha C Basappa, is a MTech student at Department of Computer Science and Engineering, R V College of Engineering, Bengaluru, Karnataka, India.(sukruthacb.scn20@rvce.edu.in)
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2909 Dr. Nagaraja G S, is working as Professor and Associate Dean (PG- CSE) at Department of Computer Science and Engineering, R V College of Engineering, Bengaluru, Karnataka, India. (nagarajags@rvce.edu.in)
Download now