“Information security and privacy” is one of the major challenges in the communication world
of IT as each and every information we pass need to be secured enough to the extent that it
doesn’t hurt anyone’s privacy. In trace and track world RFID play a pivotal role. We cannot
track people as it causes a privacy risk. Migration of data to cloud also comes under threat as
many things cannot be control over there. A trusted database is needed which can maintain and
enforce the privacy policy. In order to cater all these requirements, a secure, cheap and
complex computation encryption-decryption algorithm is required to meet this challenge.
This paper is based on the research survey of previous and current security and privacy
techniques used for securing RFID tag and reader communication and their impact on real
world.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
An Efficient User Privacy and Protecting Location Content in Location Based S...IJRST Journal
In location-based query a user wants to query a database of location data, known as Points Of Interest (POIs), and does not want to reveal his/her location to the server due to privacy concerns; (ii) the owner of the location data, that is, the location server, do Abstract: Nowadays, it is very easy for a person to learn his/her location with the help of a Global Positioning System (GPS) enabled device. A location s not want to simply distribute its data to all users. The location server desires to have some control over its data, since the data is its asset. A major enhancement upon previous solutions by introducing a two stage approach, the first step is based on Oblivious Transfer using homomorphic encryption and the second step is based on Private Information Retrieval, to achieve a secure solution for both parties. Introduce a security model and analyse the security in the context of our protocol. To highlight a security weakness of our previous work and present a solution using efficient homomorphic system.
A new approach for providing limited information only that is necessary for fund
transfer during online shopping thereby safeguarding customer data and increasing customer
confidence and preventing identity theft has been proposed. When you make a payment, the
information will never be passed on your personal financial details to merchant sites, keeping your
data safe and your identity protected against fraud. A cryptographic technique based on visual secret
sharing is used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret
image is encrypted in shares which are meaningless images that can be transmitted or distributed over
an un-trusted communication channel. Only combining the k shares or more give the original secret
image. Phishing is an attempt by an individual or a group to thieve personal confidential information
such as passwords, credit card information etc., from unsuspecting victims for identity theft, financial
gain and other fraudulent activities The use of images is explored to preserve the privacy of image
captcha by decomposing the original image captcha into two shares that are stored in separate
database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
Several solutions have been proposed to tackle phishing.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
A Novel RFID Readers Employee Management SystemIJMTST Journal
Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection technology which helps to automate business processes and allows identification of large number of tagged objects using radio waves. RFID based Employee Management System (EMS) would allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. The access tag can be read up to 5 (~16 feet) meters from the RFID reader, which usually eliminates the need to handle the tag or to walk very close to the reader. This freedom is particularly important to handicapped workers, staff carrying packages. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This paper presents the experiments conducted to set up RFID based EMS.
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...IJNSA Journal
RFID systems are one of the important techniques that have been used in modern technologies; these
systems rely heavily on default and random passwords. Due to the increasing use of RFID in various
industries, security and privacy issues should be addressed carefully as there is no efficient way to achieve
security in this technology. Some active tags are low cost and basic tags cannot use standard cryptographic
operations where the uses of such techniques increase the cost of these cards. This paper sheds light on the
weaknesses of RFID system and identifies the threats and countermeasures of possible attacks. For the
sake of this paper, an algorithm was designed to ensure and measure the strength of passwords used in the
authentication process between tag and reader to enhance security in their communication and defend
against brute-force attacks. Our algorithm is design by modern techniques based on entropy, password
length, cardinality, Markov-model and Fuzzy Logic
Radio Frequency Identification RFID tags generally belong to a single domain system which is called has RFID single domain system. Till date, most of the researches in the RFID single domain system have been authentication protocol against a variety of attacks. This topic generally describes about the security and privacy mechanism in RFID multi domain which is further divided into three sub topics that is RFID forehand system security, RFID backhand system security and RFID inter domain system security. Pawankumar Tanavarappu ""A Security Framework in RFID"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30217.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30217/a-security-framework-in-rfid/pawankumar-tanavarappu
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
An Efficient User Privacy and Protecting Location Content in Location Based S...IJRST Journal
In location-based query a user wants to query a database of location data, known as Points Of Interest (POIs), and does not want to reveal his/her location to the server due to privacy concerns; (ii) the owner of the location data, that is, the location server, do Abstract: Nowadays, it is very easy for a person to learn his/her location with the help of a Global Positioning System (GPS) enabled device. A location s not want to simply distribute its data to all users. The location server desires to have some control over its data, since the data is its asset. A major enhancement upon previous solutions by introducing a two stage approach, the first step is based on Oblivious Transfer using homomorphic encryption and the second step is based on Private Information Retrieval, to achieve a secure solution for both parties. Introduce a security model and analyse the security in the context of our protocol. To highlight a security weakness of our previous work and present a solution using efficient homomorphic system.
A new approach for providing limited information only that is necessary for fund
transfer during online shopping thereby safeguarding customer data and increasing customer
confidence and preventing identity theft has been proposed. When you make a payment, the
information will never be passed on your personal financial details to merchant sites, keeping your
data safe and your identity protected against fraud. A cryptographic technique based on visual secret
sharing is used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret
image is encrypted in shares which are meaningless images that can be transmitted or distributed over
an un-trusted communication channel. Only combining the k shares or more give the original secret
image. Phishing is an attempt by an individual or a group to thieve personal confidential information
such as passwords, credit card information etc., from unsuspecting victims for identity theft, financial
gain and other fraudulent activities The use of images is explored to preserve the privacy of image
captcha by decomposing the original image captcha into two shares that are stored in separate
database servers such that the original image captcha can be revealed only when both are
simultaneously available; the individual sheet images do not reveal the identity of the original image
captcha. Once the original image captcha is revealed to the user it can be used as the password.
Several solutions have been proposed to tackle phishing.
Secure system based on recombined fingerprints for sharing multimedia files i...eSAT Journals
Abstract In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection from merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security. Keywords: Fingerprint, Multimedia files, Blowfish algorithm, Merchant, Buyer, Child Buyer, Copyright Protection
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
A Novel RFID Readers Employee Management SystemIJMTST Journal
Radio Frequency Identification (RFID) is a new generation of Auto Identification and Data collection technology which helps to automate business processes and allows identification of large number of tagged objects using radio waves. RFID based Employee Management System (EMS) would allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. The access tag can be read up to 5 (~16 feet) meters from the RFID reader, which usually eliminates the need to handle the tag or to walk very close to the reader. This freedom is particularly important to handicapped workers, staff carrying packages. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This paper presents the experiments conducted to set up RFID based EMS.
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...IJNSA Journal
RFID systems are one of the important techniques that have been used in modern technologies; these
systems rely heavily on default and random passwords. Due to the increasing use of RFID in various
industries, security and privacy issues should be addressed carefully as there is no efficient way to achieve
security in this technology. Some active tags are low cost and basic tags cannot use standard cryptographic
operations where the uses of such techniques increase the cost of these cards. This paper sheds light on the
weaknesses of RFID system and identifies the threats and countermeasures of possible attacks. For the
sake of this paper, an algorithm was designed to ensure and measure the strength of passwords used in the
authentication process between tag and reader to enhance security in their communication and defend
against brute-force attacks. Our algorithm is design by modern techniques based on entropy, password
length, cardinality, Markov-model and Fuzzy Logic
Radio Frequency Identification RFID tags generally belong to a single domain system which is called has RFID single domain system. Till date, most of the researches in the RFID single domain system have been authentication protocol against a variety of attacks. This topic generally describes about the security and privacy mechanism in RFID multi domain which is further divided into three sub topics that is RFID forehand system security, RFID backhand system security and RFID inter domain system security. Pawankumar Tanavarappu ""A Security Framework in RFID"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30217.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30217/a-security-framework-in-rfid/pawankumar-tanavarappu
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
IoT as a domain has grown so much in the last few years that it rivals that of the mobile network
environments in terms of data volumes as well as cybersecurity threats. The confidentiality and privacy of
data within IoT environments have become very important areas of security research within the last few
years. More and more security experts are interested in designing robust IDS systems to protect IoT
environments as a supplement to the more traditional security methods. Given that IoT devices are
resource-constrained and have a heterogeneous protocol stack, most traditional intrusion detection
approaches don’t work well within these schematic boundaries. This has led security researchers to
innovate at the intersection of Machine Learning and IDS to solve the shortcomings of non-learning based
IDS systems in the IoT ecosystem.
Secured authentication of radio-frequency identification system using PRESENT...IJECEIAES
The internet of things (IoT) is an emerging and robust technology to interconnect billions of objects or devices via the internet to communicate smartly. The radio frequency identification (RFID) system plays a significant role in IoT systems, providing most features like mutual establishment, key establishment, and data confidentiality. This manuscript designed secure authentication of IoT-based RFID systems using the lightweight PRESENT algorithm on the hardware platform. The PRESENT-256 block cipher is considered in this work, and it supports 64-bit data with a 256-key length. The PRESENT-80/128 cipher is also designed along with PRESENT-256 at electronic codebook (ECB) mode for Secured mutual authentication between RFID tag and reader for IoT applications. The secured authentication is established in two stages: Tag recognition from reader, mutual authentication between tag and reader using PRESENT80/128/256 cipher modules. The complete secured authentication of IoTbased RFID system simulation results is verified using the chip-scope tool with field-programmable gate array (FPGA) results. The comparative results for PRESENT block cipher with existing PRESENT ciphers and other lightweight algorithms are analyzed with resource improvements. The proposed secured authentication work is compared with similar RFID-mutual authentication (MA) approaches with better chip area and frequency improvements.
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives.
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2. 256 Computer Science & Information Technology (CS & IT)
Streams of RFID data records are defined in the form of EPC (Electronics Product Code),
location (loc) and time (t) where each record indicates that an RFID reader in location (loc) has
detected an object having EPC at time t. The path of an object is defined by loci, ti, which is a
sequence of pair that is obtained by first grouping the RFID records by EPC and then sorting the
records in each group by timestamps. A timestamp is the entry time of an object in location
assuming that the object is staying in the same location until its new location is detected by
another reader [7]. RFID is a wireless system that works in conjunction with an organization’s
information technology infrastructure to improve business processes [1].
The RFID tag cannot determine the time and location independently [2]. The RFID tag cannot
maintain an internal clock to determine time by itself, not capture IP address or GPS coordinates
to determine its location independently.
RFID technology is used in many areas like medical, transportation, passport, library etc. for
object identification. In today’s scenario as of now, RFID tags are mostly used in proximity cards,
automated toll-payment transponders and payment tokens. Previously as its readings are more
accurate than (mostly manually operated) barcode systems, RFID tags can be integrated within
the structure of packaging material or even within products.
2. SECURITY & PRIVACY RISK
Widespread RFID deployment creates privacy risks for everyone. In this case, a reader would
periodically broadcast a query and all the reader in the vicinity will respond to that reader. The
reader will then forward these responses to the database.
For instance, an unauthorized user can use the reader or buy another to communicate directly with
the tag. So, RFID data can easily be attacked. There are various attacks like sniffing, tracking,
spoofing, replay [20] and Denial of service cause security and privacy risk for RFID technology
[21].
2.1 Data Security Issues of RFID Tag
At present, RFID is mainly facing the following three issues of security:
• Information of RFID tags are intercepted
• RFID tags can be cracked
• RFID tags can be copied
Louis Parks, president and CEO of SecureRF, had spoken on RFID security on 1st June-2011. He
said that there's a great need for security in the case where we see data-enriched tags coming onto
the market. That means we're going to push the critical data out to the very edge of a supply chain
or a maintenance chain where the data will be on the tag and it will be critical that the data needs
to be protected.
3. PRIVACY SOLUTIONS AND THEIR LIMITATIONS
3.1 Privacy Threats Phases & Preserving Techniques
There are two phases of data privacy threats in terms of physical RFID tags:-
3. Computer Science & Information Technology (CS & IT) 257
• Data Collection
• Data Publishing
Many privacy preserving technology [8] like EPC re-encryption and killing tags[9] addresses the
privacy threat in the data collection phase whereas anonymization algorithms works on the
privacy threat in the data publishing phase [7]. The anonymization algorithm for the query engine
transforms the raw object-specific RFID data into a version that is immunized against privacy
attacks.
Many privacy models such as K-anonymity, L-diversity, T-closeness has been proposed to thwart
privacy threats caused by the record linkage and attributes linkage attacks in the context of
relational databases. All these models works assuming that a given set of attributes called quasi-
identifier (QID) can identify an individual. However these models are effective for anonymization
on relational databases but these models are not applicable to RFID data (due to high
dimensionality nature of RFID data).
RFID is high dimensional because of the large combinations of location and timestamp. For
example, if a subway is having 100 stations that operate 20 hrs per day, then RFID table would
have 100 X 20=2000 dimensions. Applying traditional privacy model, such as K-anonymity,
would include all dimensions into a single QID and require every path to be shared by at least K
records. However, in real-life privacy attacks, it is unlikely that an adversary could know all
locations and timestamps that the target victim has visited because it requires non-trivial effort to
gather each piece of prior knowledge from so many possible locations at different time. Thus, it is
reasonable to assume that the adversary’s prior knowledge is bounded by at most L pairs of
locations and timestamps that the target victim is visited. Based on this LKC, privacy model is
defined for anonymizing high-dimensional RFID data [7] but the limitation of this model is that
the data holder must have advance knowledge of all the adversaries, which is impossible in
reality.
Most of the previous work on privacy preserving RFID technology focused on the threats caused
by the physical RFID tags and proposed techniques like sleeping tags, and EPC re-encryption.
Basically the privacy and security issue was at communication layer among tags and readers not
on the database layer where a large amount of RFID data actually resides. The important part here
is to preserve the data truthfulness, if data will be examined by human users for the purpose of
auditing and data interpretation. [7].
3.2 Private Information Retrieval (PIR) Approach
There are various fundamental approaches based on PIR (private information retrieval) like:
• Range queries - to Process range queries
• k-nearest neighbour queries - to Process k-nearest neighbour queries
These above approaches provide secure and cheap location base user privacy services as compare
to anonymity and cloaking based approaches, which require a trusted intermediate anonymizer to
protect a user’s location information during query processing [6] and one more important thing is
that the high dimensionality of RFID results applying traditional anonymity causes data of RFID
suffers from the curse of high dimensionality, hence results in the poor data usefulness [7].
3.3 Strawman1 ‘Query Encryption’
4. 258 Computer Science & Information Technology (CS & IT)
According to Strawman1, encryption of the data protects user’s privacy but may cause slow query
performance and according to Strawman2 the protocol must ensure that user’s query does not
reveal useful information that an adversary can use to violate user’s privacy.
Strawman Solution is used for encryption of query to improve privacy but Solution-1 is only
suitable for small size table and Solution-2 prevents likability so long as the adversary never
observes a user querying a database [2].
Privacy protection is an important part in ubiquitous computing environments [3]. For example in
June 2005, names and credit card numbers of more than 40 million MasterCard cardholders were
exposed and In May 2006, disks containing the names, social security numbers and dates of birth
of more than 26 million United States veterans were stolen from the home of an employee of the
department of Veterans Affairs [4]. Retrieval of sensitive data from databases invokes concerns
on user privacy. Thus a PIR (Private Information Retrieval) scheme allows a user to retrieve a
data from a database without revealing other information. Earlier “Query Privacy” was also
proposed [5].
In a current scenario various fundamental approaches like anonymity and clocking-based
approach can’t give surety of information privacy as well as cheap computation and
communication overhead.
3.4 Other Techniques
There are some techniques like EPCglobal tags come with a password protected kill function that
permanently deactivates tag. Digital signatures are an important tool for data and device
authentication. Techniques like RFID tags pseudonyms consist of names that are periodically
refreshed, either by trusted RFID readers or an on-tag pseudorandom number generator. A mix
net of RFID readers can also periodically re-encrypt tag data which protect RFID devices from
attacks. Detection and evasion is a technique where consumers can detect unauthorized RFID
activity and devices like Guardian (www.rfidguardian.org), will interpret RFID scans and log
their meaning [21].
4. RFID DATA SECURITY AT COMMUNICATION LAYER
4.1 Data security Solutions
A. Symmetric key cryptography-it requires same key for encryption and decryption.
B. Public key cryptography-it require different cryptographic key for encryption and
decryption.
In case of symmetric key cryptography techniques, secure authentication relies on a symmetric
key shared between a tag and reader. For privacy, a tag cannot identify itself to a reader before an
authentication interaction, thus the reader does not know which key to use in the interaction. Thus
the results reader had to try every key which was quite costly too. To reduce the cost of key,
public key cryptography can be used.
In case of public key cryptography, the response generation is performed using a secret key that is
also called private key, but the response verification on the reader side can be performed without
any secret key only with a public key, which is not required to protect against misuse.
As we know RFID tag respond to radio interrogation automatically, even if the information
emitted by a tag is encrypted, the information may be used to track the tag, thus causing privacy
issues. Thus RFID protocols must provide privacy and authenticity.
5. Computer Science & Information Technology (CS & IT) 259
RFID tag is one kind of chip of integrated circuits yet the electronic process is not complicated,
which uses 40 bit cipher code in usual conditions, it can be cracked in one hour. Even RFID with
more robust encryption can also be cracked through a special hardware device, which called brute
force cracking. Firstly, use special liquid to dissolve the protective layer of the RFID tags.
Secondly, connect the special hardware device with the integrated circuit. In this case, the
attacker can not only access the data in the label, but also analyze the structural design of labels.
Overall, whether how micro the RFID tags is, it was still possibly cracked.
4.2 Data Encryption Techniques and Their Limitations
There are the various Data encryption techniques were used for ensuring the data transmission
security between server and RFID tag. For example, Y P. Zhang et al. proposed a stream cipher
algorithm with respect to the traditional block-based cipher approaches [19]. M. E. Smid and D.
K. Branstad analyzed the past and future of DES algorithm [18].T. Jamil proposed an enhanced
algorithm for the typical DES algorithm, called AES (Advanced Encryption Standard) [13]. J.
Jiang proposed a parallel processing algorithm for the RSA [14]. S. Lian et al. proposed a fast
video encryption scheme based on chaos [15]. M. McLoone and J. V. McCanny designed a
hardware circuit for DES based on the FPGA technique [16]. M.Shaar et al. proposed a new data
encryption algorithm, called HHEA [17]. But these techniques not completely secure to protect
data between tag and reader.
Now let’s take the scenario where the encryption is strong enough so that it cannot be cracked,
but RFID tags are still faced the danger of being copied. In other words, smart card equipment
can easily copy the information from RFID tags and the work will be rapidly finished. Clearly,
RFID encryption protection is not absolute security, but in any case, this is still the most
important and effective application of preserving RFID products. Public Key Encryption based on
IBE technology to RFID system, which can effectively solve the issues of data privacy, integrity
and non-repudiation as well and also it can conquer the disadvantages such as storage and
management difficulties, system complexity, high cost and low efficiency shortcomings when
PKI technology applies to RFID system. IBE Security Solutions is on Encrypt Tag Data and
Label Reading and Writing Process [10].
To protect privacy violation against various attacks like eavesdropping, location tracking,
spoofing, message losses or replay attack etc. various encryption schemes were proposed by
researchers such as blocker-tag [22], hash lock scheme [23], randomized hash lock [23], hash
chain(Ohkubo et al., 2003), variable ID, re-encryption etc.. All of these schemes are not perfect
against all types of attack like Hash lock scheme is week against all attacks, Randomized hash
chain scheme is comparatively strong against location tracking and message loss but week against
eavesdropping and replay attack, Hash chain scheme is strong against location tracking, replay
attack and message loss but week against replay attack [24].
In current scenario lots of research going on communication security of RFID through light
weight cryptography like elliptic curve cryptography [24] to ensure RFID system security and
privacy friendly.
5. CONCLUSIONS
RFID data security consumers want to ensure that their personal information isn’t misused, and
that RFID tags are used responsibly.
As we know RFID tag respond to radio interrogation automatically, even if the information
emitted by a tag is encrypted, the information may be used to track the tag, thus causing privacy
6. 260 Computer Science & Information Technology (CS & IT)
issues. To protect RFID against various attacks public key approach is used as it provide secure
communication in comparison of symmetric key approach. But on the other hand public key
approach is comparatively complex, requires higher implementation effort in chip size, lower
performance and high power consumption.
Thus a low cost RFID tag authentication protocols must be developed in such a way that provides
better privacy and authenticity also. In current scenario lots of research solutions are proposed on
low cost lightweight cryptography but still they are costly as well as vulnerable to security. So
strong encryption-decryption technique is needed which should be cheap, complex and efficient.
In other words low cost RFID tag is required with high computation speed.
Performing operation on encrypted query is also more challenging. So a secure encryption-
decryption algorithm is required for PIR scheme. These are the useful tools for protecting the
confidentiality of sensitive data.
REFERENCES
[1] Monika Sharma and Manind Goyal “Improving Security by embedded RFID” National Confer-ence
on Advance Computing & Communication Technology (2010).
[2] Chiu C. Tan,Qun Li,and Lei Xie “Privacy Protection for RFID-based Tracking System” IEEE RFID
(2010).
[3] D. Anthony, T. Henderson, and D. Kotz, “Privacy in location aware computing environments” IEEE
Pervasive computing, (2007).
[4] Zhiqiang Yang, Sheng Zhong and Rebecca N. Wright, “Privacy-Preserving Queries on Encrypted
Data”. http://www.cs.rutgers.edu/~rwright1/Publications/esorics06.pdf
[5] Shuhong Wang, Xuhua Ding, Robert H. Deng and Feng Bao,”Private information Retrieval Using
Trusted Hardware”.http://www.mysmu.edu/faculty/xhding/publications/pir.pdf
[6] Ali Khoshgozaran and Cyrus Shahabi, “Private Information Retrieval Techniques for Enabling
Location Privacy in Location Based Services”. http://infolab.usc.edu/DocsDemos/Khoshgozaran-
shahabi-PIR-Chapter.pdf
[7] Benjamin C. M. Fung, Khalil Al-Hussaeni and Ming Cao, “Preserving RFID Data Privacy” IEEE
International Conference on RFID (2009).
[8] S. E. Sarma, S. A. Weis, and D. W. Engels, RFID systems and security and privacy implications. In
Proc, of the 4th International Workshop of Cryptographic Hardware and Embedded System (CHES),
pages 1-19, San Diego (2003).
[9] Ari Juels, RFID Security and Privacy :A Research Survey, IEEE Journal on Selected Areas in
Communications (2005).
[10] Xian Zhang, Danning Li IBE Technology Applying to the Information Security of RFID Tags IEEE
Xplore (2010).
[11] R.K Pateriya, sangeeta sharma, The Evolution of RFID Security and Privacy: A Research Survey,
IEEE Conference on Communication System and Network Technologies (2012).
[12] M. Aikawa, K. Takaragi, S. Furuya, and M. Sasamoto, "A Lightweight Encryption Method Suit-able
for Copyright Protection," IEEE Trans. on Consumer Electronics, Vol. 44, No.3, pp. 902-910 (1998).
[13] T. Jamil, "The Rijndael Algorithm," IEEE Potentials, Vol. 23, Issue 2, pp. 36-38 (2004).
[14] J. Jiang, "Pipeline Algorithms of RSA Data Encryption and Data Compression," Proc. of IEEE Int'l
Conf: on Comm. Technology (ICCT'96), Vol. 2, 5-7 May 1996, pp. 1088-1091 (1996).
[15] S. Lian, J. Sun, Z. Wang, and Y. Dai, "A Fast Video Encryption Scheme Based-on Chaos," Proc. of
the 8th IEEE Int'l Conf: on Control, Automation, Robotics, and Vision (ICARCV 2004), Vol. 1, 6-9
Dec. 2004, pp. 126-131 (2004).
[16] M. McLoone and J. V. McCanny, "A High Performance FPGA Implementation of DES," Proc. Of
IEEE Workshop on Signal Processing Systems (SiPS 2000), 11-13 Oct. 2000, pp. 374-383 (2000).
[17] M. Shaar, M. Saeb, M. Elmessiery, and U. Badwi, "A Hybrid Hiding Encryption Algorithm (HHEA)
for Data Communication Security," Proc. of the 46th IEEE Int'l Midwest Symposium on Circuits and
Systems (MWSCAS'03), Vol. 1, 27-30 Dec. 2003, pp.476-478 (2003).
[18] M. E. Smid and D. K. Branstad, "Data Encryption Standard: Past and Future," Proc. IEEE, Vol. 76,
No. 5, May 1988, pp. 550-559 (1988).
7. Computer Science & Information Technology (CS & IT) 261
[19] Y P. Zhang, J. Sun, and X. Zhang, "A Stream Cipher Algorithm Based on Conventional Encryption
Techniques," Proc. of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE
2004) Vol. 2, 2-5 May 2004, pp. 649-652 (2004).
[20] L. Francis, G. Hancke, K. Mayes, and K. Markantonakis. Practical NFC Peer-to-Peer Relay Attack
using Mobile Phones. In Workshop on RFID Security, RFIDSec’10, Istanbul, Turkey, Jun. 2010
(2010).
[21] Saroj Kumar Panigrahy, Sanjay Kumar Jena, and Ashok Kumar Turuk “Security in Bluetooth, RFID
and Wireless Sensor Networks” Proceedings of the 2011 International Conference on Com-
munication, Computing & Security Pages 628-633 (2011).
[22] Jules, A, Rivest, R. L. & Szydlo M. , “The blocker tag : selective blocking of RFID tag for consumer
privacy”, Proceeding of ACM conference on Computer and Communication Security (2003).
[23] S.A. Weis, S.E. Sarma, R.L. Rivest & D.W. Engels, “Security and Privacy aspects of low cost Radio
frequency identification system”, First International Conference on Security in Pervasive Computing,
pp. 201-202, Lecture Notes in Computer Science 2802, Springer-Verlag (2003).
[24] Ji-Yeon Kim, Jong-Jin-Jung and Geun-Sik Jo, “Shared Tag RFID System for Multiple Application
Objects”, Development and Implementation of RFID Technology Online Book Chapter-25 (2009).