SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2905
Accessory authentication on NFC enabled product using three pass AES
algorithm
Sukrutha C Basappa1, Nagaraja G S2
1MTech student at R V College of Engineering, Bengaluru, Karnataka
2Professor and Associate Dean (PG-CSE) at R V College of Engineering, Bengaluru, Karnataka
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays, Near Field Communication (NFC)
market is no more a monopoly. Competition is highamong the
companies with regard to products they manufacture and
their features for consumer attraction. Mutual authentication
between NFC reader and tag ensures safe communication
between them. This paper proposes an accessory
authentication model that guarantees that counterparts of a
product are of same company. AES-128 bits algorithm is used
in two different modes, that is AES-ECB and AES-CBC for
mutual authentication. AES-CBC mode is stronger in terms of
security when compared to AES-ECB mode.
Key Words: AES, Brand protection, Mutual
authentication, NFC, Security.
1. INTRODUCTION
NFC technology was developed in the year 2004 by
Philips Electronics and Sony. It is a short range, wireless
technology with operating area within 10 centimeters,
operating frequency 13.56 MHz and data transmission rate
used here is of 106 kbps. The objective of the paper is to
develop an accessory authentication model for an NFC
enabled product. This ensures that replaceable part of the
product (NFC tag) and the fixed part (active NFC reader) are
paired counterparts and are of the same company. With this
end-user can get high quality product. This kind of product
positively impacts manufacturing and authenticating
companies, thereby ensuring brand protection. Some
examples are authentication in motorized tooth brush,
where brush handle has NFC reader and the brush head has
NFC tag in it. In high end blenders, the base unit will have
NFC reader and the jar/container will have NFC tag.[12] To
achieve this, firstly communication is establishedamongthe
NFC reader and the tag. Then three pass AES (Advanced
Encryption Standard) algorithm is run, before actual data
transfer happens. AES-128 is a symmetric block cipher, that
uses one shared secret key for both encryption and
decryption. Choice for mode of AES is provided. User can
choose authentication to happen either in AES-ECB
(Electronic Code Book) or in AES-CBC (Cipher Block
Chaining) mode, depending on their requirement.
2. LITERATURE SURVEY
In [1], authors have used the fact that NFC has an
operating modecalled read or write. This has the propertyof
one directional transfer of data only. However, they have
tried to bring in a bi-directional model that is half duplex in
nature. Main advantage of this operating modeof NFCisthat,
it allows different data formats and very low protocol
overhead. But one main challenge is regarding the reader
collision problem, completing transactions in a secure way,
within a timeframe. Fingerprint and Kerberos are two factor
authentication used.
In [2], a smart bandage with wireless temperature and
strain sensor, with passive NFC tag is designed. An android
application called SenseAble was built, to display the body
temperatureand other sensor readings.Chestexpansionand
contraction of a Covid-19 patient was rightly monitored by
this smart bandage.
In [3], it proves thatMITMattackscanbedoneduringNFC
communication, when using a passive card. This method of
attack mimics real implementation of EMV protocolenabling
devices, used for payments. Paper demonstrates how a
contactless payment system can be compromised by an
attacker, by using a malicious MITM card.
In [4], study is done on reading range of implanted
sensors, based on NFC Integrated circuit (IC) by using a NFC
enabled smart phone. Challenges noted were low coupling
between loops of various sizes and limited quality imposed
by bandwidthcommunication.Resultsshowthatsystemwith
three coils performs better at longer distance than 2-coil
system.
In [5], a scheme to build a new public transport payment
method with different technologies like NFC, Bluetooth, IC
card is integrated. Advantage is that, passengers can choose
the payment method that suits them, in terms of discount on
ticket fare. This solves the problem that the payment
platforms are not unified and that passengers have many
applications on their mobile, which causes inconvenience
while travelling.
In [6], a model forvehicle network operatorsusingNFCis
proposed. Tourists generally will not use local mobile
operator’s services, as they stay for short time and the
roamingchargesare also high. Asasolution,themodelwhich
allows less mobile traffic cost for tourist and has increased
transaction security is proposed. Here the user’s mobile
traffic is routed to the network of vehicle rental service
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2906
provider. This simplifiesthetourismforatouristandsecurity
of user’s personal data.
In [7], author starts the paper by discussing general
aspects of NFC and its comparison with RFID technology.
Light is thrown on different ISOstandardsNFCcomplieswith
and NFC operating modes. They prove that NFC isvulnerable
to securityattacks, which canleakuser’simportantdata.This
can have negative impact on organization adopting NFC
technology and its applications. Different attacks are listed
and a scientific method to increase security is also proposed.
In [8], extended version of different attacks in NFCareais
briefed. Focus on DoS and data corruptions was given as it
was noted from studying risk assessment models, these two
attacks were most commonly witnessed. They were studied
by Analytical Hierarchy Process (AHP). A solution was
proposed whichwasatouchandgoapplicationcalledMIDAS.
It is concluded that AES and ECC (Elliptic Curve
Cryptography) are best known algorithms to build a secure
channel and to avoid data corruption.
In [9], Authors propose an application of NFC in the IoT
domain. Textile industry is far behind in terms of IoT. Hence,
to enhance the textile business, a system called ‘Interactive
clothes’ is designed. Every cloth has an NFC chip with unique
number embedded in it. An application to scan the NFC is
developed, which gives a URL to the database. This system
modernises manufacturing, managing, selling and buying
goods.
In [10], author proves that tags used in NFC system are
limited in terms of chip size and power consumption. These
limitations make it difficult tointegrate strongcryptographic
security onto the tags. Author suggests that there is need to
implement secure algorithmthat is secureagainstattacklike
Side-Channel Analysis (SCA). As a case study, a tag with
cryptographic algorithms (AES and ECDSA) implemented is
taken.
Few of the research gaps observed are as follows:
1. NFCisashort-rangecommunicationtechnology,and
hence believed that security risks are low as the
interaction is within close proximity. But security
vulnerabilities do exist and few attacks are only
discovered.
2. NFC is mostly used in the area of access control and
paymentmethod.Otherapplicationslikefiletransfer
and in IoT can be researched more.
3. The economic performance of NFC developments
can be evaluatedandimpactsofNFCtechnologieson
companies, organizations and business models can
be explored.
3. DESIGN
Project design gives an outline of project development
process. It helps to identify the modules and the tools
required to implement them. Figure 1 shows the system
architecture which includes a user application built on NFC
reader library for authentication process [11]. The reader
library stack has fourlayers.Applicationlayeristhetoplayer,
which implements the commands to work with contactless
technologies.ProtocolabstractionlayerhasfunctionsforNFC
card activation. The hardware specific elements of reader
implemented in the hardware abstraction layer. It also helps
execute native commands of the chip. The lowest bus
abstraction layer, implements the communication between
the reader and tag. Both reader and taghaveakeystore,from
which they decide upon a secret key for authentication.
Figure 1: System architecture
Data flow diagrams help to understand thesystem better
as it brings in modularity. Figure 2 shows DFD Level 0.
Authentication procedure starts when user application
makes reader to pass ReqA (Request A) command to the
detected cards. Authentication result is decisive, if
counterparts are authenticated then communication
between them starts, else aborts.
Figure 2: DFD Level 0
DFD Level 1 in figure 3 shows the two modules involved
in accessory authentication. First is communication
establishmemt between reader andtag, whichisachieved by
using available command set of tags. If more thanonecard is
present in proximity, collisionresolutionisdone bystandard
anticollision procedure and one card is selected. Then three
pass AES algorithm is used for mutual authentication.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2907
Figure 3: DFD Level 1
4. METHODOLOGY
NFC reader will emit radio waves in a periodic manner
and checks if any card is present in its proximity. If no card is
detected, reader continues the loop until a card is detected.If
more than one card is detected, anticollision procedure
resolves the conflict and chooses one card as counterpart for
reader. After card selection and activation, authentication
procedure happens. If reader and tag successfully
authenticate to each other, a sample text is written into the
card and then read back to check data integrity. Figure 4
shows entire methodology adopted in the form of flowchart.
Figure 4: Flowchart of accessory authentication
AES three pass mutual authentication is a procedure
which uses key of length 128 bits [12]. In the first pass of
algorithm, NFC reader encrypts its data (RndX) with agreed
secret key (K) and sends the cipher to NFC tag. In return, tag
responds by sending the deciphered data. In second pass,tag
encrypts its data (RndY) and sends the cipher generated to
reader. Reader deciphers andsends the responseback.Third
pass includes each party verifying if data received is same as
what they had generated originally. That is reader checks if
tag had sent RndX correctly, and tag checks if reader’s
response had RndY. If any one party fails to authenticate
themselves to other, the accessory authentication procedure
is aborted. User can choose either AES-ECB mode for
authentication or AES-CBC mode. If databeingencipheredby
each party is not sensitive, ECB is best option as it is fast.
However, if security of data is prime concern, then CBC is
preferred because of its complexity. Figure 5 shows pictorial
representation of authentication procedurediscussedabove.
Figure 5: Three pass mutual authentication
5. RESULT AND ANALYSIS
Anticollision procedure selects a tag based on its uid
(unique identification number) which is followed by card
activation. The console display is as shown in figure 6.
Technology of the detected card is displayed along with its
uid.
Figure 6: Card activation
Card activation is followed by choice entry by user for
mode selection. The output after running accessory
authentication in AES-CBC mode is shown in figure 7. Both
reader and tag have authenticated to each other. Sample text
was written into tag and readsuccessfully without any error.
Figure 7: Accessory authentication by AES-CBC mode
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2908
AES-ECB mode is simple and fast approach. Drawback is
that duplicate data in plain text will be reflected in the cipher
text. Hence, it is not recommended in the areas where
security is a priority. Whereas, AES-CBC mode will encrypt
every occurrence of same plain text into differentciphertext.
But it is slow and complex compared to ECB mode. Yet CBCis
stronger in terms of security and is preferred for
authentication.
6. CONCLUSION
A survey shows that NFC market is likely to raise from
18 billion USD in 2020 to 34.9 billion USD by 2025.Themain
use cases are in mobile commerce and usage of wearable
technology. This paper serves the need for accessory
authentication by AES algorithm, to ensure that genuine
parts of same company are used. This enhances consumer
experience, convenience and ensures product safety. If
product requires more secure form of authentication, ECCis
suggested from public key cryptographic algorithms. Here,
user application just checks read and write ontothetagafter
successful authentication. This feature can be enhanced
according to user needs. Example in case of NFC enabled
product like motorized toothbrush, authentication can be
followed by tapping mobile phone to tag can display URL to
webpage that keeps track of oral health and brush head
replacement date.
REFERENCES
[1] M. S. Chishti, C. T. King and A. Banerjee, “Exploring Half-
Duplex Communication of NFC Read/Write Mode for
Secure Multi-Factor Authentication”, 2021 in IEEE
Access, vol. 9, pp. 6344-6357, doi:
10.1109/ACCESS.2020.3048711.
[2] P. Escobedo, M. Bhattacharjee,F.Nikbakhtnasrabadiand
R. Dahiya, “Smart Bandage With Wireless Strain and
TemperatureSensorsand BatterylessNFCTag”,2021,in
IEEE Internet of Things Journal, vol. 8, no. 6, pp. 5093-
5100, 15 March, doi: 10.1109/JIOT.2020.3048282.
[3] S. Akter, S. Chellappan, T. Chakraborty, T. A. Khan, A.
Rahman and A. B. M. Alim Al Islam, “Man-in-the-Middle
Attack on Contactless Payment over NFC
Communications: Design, Implementation, Experiments
and Detection”, 2021, in IEEE Transactions on
Dependable and Secure Computing, vol. 18, no. 6, pp.
3012-3023, 1 Nov-Dec, doi:
10.1109/TDSC.2020.3030213.
[4] A. Lazaro, M. Boada, R. Villarino and D. Girbau, “Study on
the Reading of Energy-Harvested Implanted NFC Tags
Using Mobile Phones”, 2020 in IEEE Access, vol. 8, pp.
2200-2221, doi: 10.1109/ACCESS.2019.2962570.
[5] C. Shuran and Y. Xiaoling, “A New Public Transport
Payment Method BasedonNFCandQRCode”,2020IEEE
5th International Conference on Intelligent
Transportation Engineering (ICITE), pp. 240-244, doi:
10.1109/ICITE50838.2020.9231356.
[6] V. Oliinyk and O. Rubel, “Improving Safety and Ease of
Use in Automatic Electric Vehicle Rental Systems”, 2020
IEEE 15th International ConferenceonAdvancedTrends
in Radioelectronics, Telecommunications andComputer
Engineering (TCSET), pp. 800-803, doi:
10.1109/TCSET49122.2020.235545.
[7] A. Albattah, Y. Alghofaili and S. Elkhediri, “NFC
Technology: Assessment Effective of Security towards
Protecting NFC Devices & Services”, 2020 International
Conference on Computing and Information Technology
(ICCIT-1441), 2020, pp. 1-5, doi: 10.1109/ICCIT-
144147971.2020.9213758.
[8] M. M. Singh, K. A. A. K. Adzman and R.Hassan,“NearField
Communication (NFC) Technology Security
Vulnerabilities and Countermeasures”,2018,
InternationalJournalofEngineering&Technology,vol.7,
no. 4.31, pp. 298-305.
[9] Kishore Kumar Reddy N. G. and Rajeshwari K.,
“Interactive clothes based on IOT using NFC and Mobile
Application”, 2017 IEEE 7th Annual Computing and
Communication Workshop and Conference (CCWC),
2017, pp. 1-4, doi: 10.1109/CCWC.2017.7868339
[10] Korak T, “Evaluation of a security-enabledNFCTagwith
AES and ECDSA”, 2011, Master’s thesis, Institute
for appliedInformationProcessingandCommunications
(IAIK), Austria.
[11] NFC Reader Library:
https://community.nxp.com/pwmxy87654/attachme
nts/pwmxy87654/nfc/707/1/UM10802_NXP-NFC-
Reader-Library-v3.010-API.pdf
[12] Mutual authentication procedure:
https://community.nxp.com/pwmxy87654/attachme
nts/pwmxy87654/tech-days/179/1/AMF-SMC-
T3036.pdf
BIOGRAPHIES
Sukrutha C Basappa, is a MTech
student at Department of Computer
Science and Engineering, R V College
of Engineering, Bengaluru, Karnataka,
India.(sukruthacb.scn20@rvce.edu.in)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2909
Dr. Nagaraja G S, is working as
Professor and Associate Dean (PG-
CSE) at Department of Computer
Science and Engineering, R V College
of Engineering, Bengaluru, Karnataka,
India. (nagarajags@rvce.edu.in)

More Related Content

Similar to Accessory authentication on NFC enabled product using three pass AES algorithm

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdffermanrw
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksAIRCC Publishing Corporation
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioIRJET Journal
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...IAEME Publication
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 

Similar to Accessory authentication on NFC enabled product using three pass AES algorithm (20)

HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdf
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Application Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart HomeApplication Layer Security for IoT: The Case Study of a Smart Home
Application Layer Security for IoT: The Case Study of a Smart Home
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Accessory authentication on NFC enabled product using three pass AES algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2905 Accessory authentication on NFC enabled product using three pass AES algorithm Sukrutha C Basappa1, Nagaraja G S2 1MTech student at R V College of Engineering, Bengaluru, Karnataka 2Professor and Associate Dean (PG-CSE) at R V College of Engineering, Bengaluru, Karnataka ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, Near Field Communication (NFC) market is no more a monopoly. Competition is highamong the companies with regard to products they manufacture and their features for consumer attraction. Mutual authentication between NFC reader and tag ensures safe communication between them. This paper proposes an accessory authentication model that guarantees that counterparts of a product are of same company. AES-128 bits algorithm is used in two different modes, that is AES-ECB and AES-CBC for mutual authentication. AES-CBC mode is stronger in terms of security when compared to AES-ECB mode. Key Words: AES, Brand protection, Mutual authentication, NFC, Security. 1. INTRODUCTION NFC technology was developed in the year 2004 by Philips Electronics and Sony. It is a short range, wireless technology with operating area within 10 centimeters, operating frequency 13.56 MHz and data transmission rate used here is of 106 kbps. The objective of the paper is to develop an accessory authentication model for an NFC enabled product. This ensures that replaceable part of the product (NFC tag) and the fixed part (active NFC reader) are paired counterparts and are of the same company. With this end-user can get high quality product. This kind of product positively impacts manufacturing and authenticating companies, thereby ensuring brand protection. Some examples are authentication in motorized tooth brush, where brush handle has NFC reader and the brush head has NFC tag in it. In high end blenders, the base unit will have NFC reader and the jar/container will have NFC tag.[12] To achieve this, firstly communication is establishedamongthe NFC reader and the tag. Then three pass AES (Advanced Encryption Standard) algorithm is run, before actual data transfer happens. AES-128 is a symmetric block cipher, that uses one shared secret key for both encryption and decryption. Choice for mode of AES is provided. User can choose authentication to happen either in AES-ECB (Electronic Code Book) or in AES-CBC (Cipher Block Chaining) mode, depending on their requirement. 2. LITERATURE SURVEY In [1], authors have used the fact that NFC has an operating modecalled read or write. This has the propertyof one directional transfer of data only. However, they have tried to bring in a bi-directional model that is half duplex in nature. Main advantage of this operating modeof NFCisthat, it allows different data formats and very low protocol overhead. But one main challenge is regarding the reader collision problem, completing transactions in a secure way, within a timeframe. Fingerprint and Kerberos are two factor authentication used. In [2], a smart bandage with wireless temperature and strain sensor, with passive NFC tag is designed. An android application called SenseAble was built, to display the body temperatureand other sensor readings.Chestexpansionand contraction of a Covid-19 patient was rightly monitored by this smart bandage. In [3], it proves thatMITMattackscanbedoneduringNFC communication, when using a passive card. This method of attack mimics real implementation of EMV protocolenabling devices, used for payments. Paper demonstrates how a contactless payment system can be compromised by an attacker, by using a malicious MITM card. In [4], study is done on reading range of implanted sensors, based on NFC Integrated circuit (IC) by using a NFC enabled smart phone. Challenges noted were low coupling between loops of various sizes and limited quality imposed by bandwidthcommunication.Resultsshowthatsystemwith three coils performs better at longer distance than 2-coil system. In [5], a scheme to build a new public transport payment method with different technologies like NFC, Bluetooth, IC card is integrated. Advantage is that, passengers can choose the payment method that suits them, in terms of discount on ticket fare. This solves the problem that the payment platforms are not unified and that passengers have many applications on their mobile, which causes inconvenience while travelling. In [6], a model forvehicle network operatorsusingNFCis proposed. Tourists generally will not use local mobile operator’s services, as they stay for short time and the roamingchargesare also high. Asasolution,themodelwhich allows less mobile traffic cost for tourist and has increased transaction security is proposed. Here the user’s mobile traffic is routed to the network of vehicle rental service
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2906 provider. This simplifiesthetourismforatouristandsecurity of user’s personal data. In [7], author starts the paper by discussing general aspects of NFC and its comparison with RFID technology. Light is thrown on different ISOstandardsNFCcomplieswith and NFC operating modes. They prove that NFC isvulnerable to securityattacks, which canleakuser’simportantdata.This can have negative impact on organization adopting NFC technology and its applications. Different attacks are listed and a scientific method to increase security is also proposed. In [8], extended version of different attacks in NFCareais briefed. Focus on DoS and data corruptions was given as it was noted from studying risk assessment models, these two attacks were most commonly witnessed. They were studied by Analytical Hierarchy Process (AHP). A solution was proposed whichwasatouchandgoapplicationcalledMIDAS. It is concluded that AES and ECC (Elliptic Curve Cryptography) are best known algorithms to build a secure channel and to avoid data corruption. In [9], Authors propose an application of NFC in the IoT domain. Textile industry is far behind in terms of IoT. Hence, to enhance the textile business, a system called ‘Interactive clothes’ is designed. Every cloth has an NFC chip with unique number embedded in it. An application to scan the NFC is developed, which gives a URL to the database. This system modernises manufacturing, managing, selling and buying goods. In [10], author proves that tags used in NFC system are limited in terms of chip size and power consumption. These limitations make it difficult tointegrate strongcryptographic security onto the tags. Author suggests that there is need to implement secure algorithmthat is secureagainstattacklike Side-Channel Analysis (SCA). As a case study, a tag with cryptographic algorithms (AES and ECDSA) implemented is taken. Few of the research gaps observed are as follows: 1. NFCisashort-rangecommunicationtechnology,and hence believed that security risks are low as the interaction is within close proximity. But security vulnerabilities do exist and few attacks are only discovered. 2. NFC is mostly used in the area of access control and paymentmethod.Otherapplicationslikefiletransfer and in IoT can be researched more. 3. The economic performance of NFC developments can be evaluatedandimpactsofNFCtechnologieson companies, organizations and business models can be explored. 3. DESIGN Project design gives an outline of project development process. It helps to identify the modules and the tools required to implement them. Figure 1 shows the system architecture which includes a user application built on NFC reader library for authentication process [11]. The reader library stack has fourlayers.Applicationlayeristhetoplayer, which implements the commands to work with contactless technologies.ProtocolabstractionlayerhasfunctionsforNFC card activation. The hardware specific elements of reader implemented in the hardware abstraction layer. It also helps execute native commands of the chip. The lowest bus abstraction layer, implements the communication between the reader and tag. Both reader and taghaveakeystore,from which they decide upon a secret key for authentication. Figure 1: System architecture Data flow diagrams help to understand thesystem better as it brings in modularity. Figure 2 shows DFD Level 0. Authentication procedure starts when user application makes reader to pass ReqA (Request A) command to the detected cards. Authentication result is decisive, if counterparts are authenticated then communication between them starts, else aborts. Figure 2: DFD Level 0 DFD Level 1 in figure 3 shows the two modules involved in accessory authentication. First is communication establishmemt between reader andtag, whichisachieved by using available command set of tags. If more thanonecard is present in proximity, collisionresolutionisdone bystandard anticollision procedure and one card is selected. Then three pass AES algorithm is used for mutual authentication.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2907 Figure 3: DFD Level 1 4. METHODOLOGY NFC reader will emit radio waves in a periodic manner and checks if any card is present in its proximity. If no card is detected, reader continues the loop until a card is detected.If more than one card is detected, anticollision procedure resolves the conflict and chooses one card as counterpart for reader. After card selection and activation, authentication procedure happens. If reader and tag successfully authenticate to each other, a sample text is written into the card and then read back to check data integrity. Figure 4 shows entire methodology adopted in the form of flowchart. Figure 4: Flowchart of accessory authentication AES three pass mutual authentication is a procedure which uses key of length 128 bits [12]. In the first pass of algorithm, NFC reader encrypts its data (RndX) with agreed secret key (K) and sends the cipher to NFC tag. In return, tag responds by sending the deciphered data. In second pass,tag encrypts its data (RndY) and sends the cipher generated to reader. Reader deciphers andsends the responseback.Third pass includes each party verifying if data received is same as what they had generated originally. That is reader checks if tag had sent RndX correctly, and tag checks if reader’s response had RndY. If any one party fails to authenticate themselves to other, the accessory authentication procedure is aborted. User can choose either AES-ECB mode for authentication or AES-CBC mode. If databeingencipheredby each party is not sensitive, ECB is best option as it is fast. However, if security of data is prime concern, then CBC is preferred because of its complexity. Figure 5 shows pictorial representation of authentication procedurediscussedabove. Figure 5: Three pass mutual authentication 5. RESULT AND ANALYSIS Anticollision procedure selects a tag based on its uid (unique identification number) which is followed by card activation. The console display is as shown in figure 6. Technology of the detected card is displayed along with its uid. Figure 6: Card activation Card activation is followed by choice entry by user for mode selection. The output after running accessory authentication in AES-CBC mode is shown in figure 7. Both reader and tag have authenticated to each other. Sample text was written into tag and readsuccessfully without any error. Figure 7: Accessory authentication by AES-CBC mode
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2908 AES-ECB mode is simple and fast approach. Drawback is that duplicate data in plain text will be reflected in the cipher text. Hence, it is not recommended in the areas where security is a priority. Whereas, AES-CBC mode will encrypt every occurrence of same plain text into differentciphertext. But it is slow and complex compared to ECB mode. Yet CBCis stronger in terms of security and is preferred for authentication. 6. CONCLUSION A survey shows that NFC market is likely to raise from 18 billion USD in 2020 to 34.9 billion USD by 2025.Themain use cases are in mobile commerce and usage of wearable technology. This paper serves the need for accessory authentication by AES algorithm, to ensure that genuine parts of same company are used. This enhances consumer experience, convenience and ensures product safety. If product requires more secure form of authentication, ECCis suggested from public key cryptographic algorithms. Here, user application just checks read and write ontothetagafter successful authentication. This feature can be enhanced according to user needs. Example in case of NFC enabled product like motorized toothbrush, authentication can be followed by tapping mobile phone to tag can display URL to webpage that keeps track of oral health and brush head replacement date. REFERENCES [1] M. S. Chishti, C. T. King and A. Banerjee, “Exploring Half- Duplex Communication of NFC Read/Write Mode for Secure Multi-Factor Authentication”, 2021 in IEEE Access, vol. 9, pp. 6344-6357, doi: 10.1109/ACCESS.2020.3048711. [2] P. Escobedo, M. Bhattacharjee,F.Nikbakhtnasrabadiand R. Dahiya, “Smart Bandage With Wireless Strain and TemperatureSensorsand BatterylessNFCTag”,2021,in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 5093- 5100, 15 March, doi: 10.1109/JIOT.2020.3048282. [3] S. Akter, S. Chellappan, T. Chakraborty, T. A. Khan, A. Rahman and A. B. M. Alim Al Islam, “Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection”, 2021, in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 3012-3023, 1 Nov-Dec, doi: 10.1109/TDSC.2020.3030213. [4] A. Lazaro, M. Boada, R. Villarino and D. Girbau, “Study on the Reading of Energy-Harvested Implanted NFC Tags Using Mobile Phones”, 2020 in IEEE Access, vol. 8, pp. 2200-2221, doi: 10.1109/ACCESS.2019.2962570. [5] C. Shuran and Y. Xiaoling, “A New Public Transport Payment Method BasedonNFCandQRCode”,2020IEEE 5th International Conference on Intelligent Transportation Engineering (ICITE), pp. 240-244, doi: 10.1109/ICITE50838.2020.9231356. [6] V. Oliinyk and O. Rubel, “Improving Safety and Ease of Use in Automatic Electric Vehicle Rental Systems”, 2020 IEEE 15th International ConferenceonAdvancedTrends in Radioelectronics, Telecommunications andComputer Engineering (TCSET), pp. 800-803, doi: 10.1109/TCSET49122.2020.235545. [7] A. Albattah, Y. Alghofaili and S. Elkhediri, “NFC Technology: Assessment Effective of Security towards Protecting NFC Devices & Services”, 2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020, pp. 1-5, doi: 10.1109/ICCIT- 144147971.2020.9213758. [8] M. M. Singh, K. A. A. K. Adzman and R.Hassan,“NearField Communication (NFC) Technology Security Vulnerabilities and Countermeasures”,2018, InternationalJournalofEngineering&Technology,vol.7, no. 4.31, pp. 298-305. [9] Kishore Kumar Reddy N. G. and Rajeshwari K., “Interactive clothes based on IOT using NFC and Mobile Application”, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 2017, pp. 1-4, doi: 10.1109/CCWC.2017.7868339 [10] Korak T, “Evaluation of a security-enabledNFCTagwith AES and ECDSA”, 2011, Master’s thesis, Institute for appliedInformationProcessingandCommunications (IAIK), Austria. [11] NFC Reader Library: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/nfc/707/1/UM10802_NXP-NFC- Reader-Library-v3.010-API.pdf [12] Mutual authentication procedure: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/tech-days/179/1/AMF-SMC- T3036.pdf BIOGRAPHIES Sukrutha C Basappa, is a MTech student at Department of Computer Science and Engineering, R V College of Engineering, Bengaluru, Karnataka, India.(sukruthacb.scn20@rvce.edu.in)
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2909 Dr. Nagaraja G S, is working as Professor and Associate Dean (PG- CSE) at Department of Computer Science and Engineering, R V College of Engineering, Bengaluru, Karnataka, India. (nagarajags@rvce.edu.in)