SlideShare a Scribd company logo
www.ijiarec.com
Author for Correspondence:
*1
Mr.V.Thamizharasu, PG Scholar, Department of CSE, Sasurie College of Engineering, Vijayamangalam, Tamilnadu, India.
E-mail: tamil_cse74@yahoo.com
2
Mr. M.Santhosh, M.E., Asst.Professor Department of CSE, Sasurie College of Engineering, Vijayamangalam, Tamilnadu, India.
JAN 2014
International Journal of Intellectual Advancements
and Research in Engineering Computations
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID
SECURITY AND PRIVACY VIA LOCATION SENSING
*1
Mr. V.Tamizharasu, 2
Mr. M.Santhosh,M.E.,
ABSTRACT
In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications
whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples
of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location
awareness can be used by both tags and back-end servers for defending against unauthorized reading and relay
attacks on RFID systems. On the tag side, we design a location-aware selective unlocking mechanism using which
tags can selectively respond to reader interrogations rather than doing so promiscuously. On the server side, we
design a location-aware secure transaction verification scheme that allows a bank server to decide whether to
approve or deny a payment transaction and detect a specific type of relay attack involving malicious readers. The
premise of our work is a current technological advancement that can enable RFID tags with low-cost location (GPS)
sensing capabilities. Unlike prior research on this subject, our defenses do not rely on auxiliary devices or require
any explicit user involvement
Index terms: RFID, GPS, Location aware selective unlocking, malicious readers.
I INTRODUCTION
The premise of the proposed work is based on
a current technological advancement that enables many
RFID tags with low-cost sensing capabilities.We report
on a new approach for enhancing security and privacy
in certain RFID applications where by location or
location-related information (such as speed) can serve
as a legitimate access context. Examples of these
applications include access cards, toll cards, credit
cards, and other payment tokens. We show that location
awareness can be used by both tags and back-end
servers for defending against unauthorized reading and
relay attacks on RFID systems. On the tag side, we
design a location-aware selective unlocking mechanism
using which tags can selectively respond to reader
interrogations rather than doing so promiscuously. On
the server side, we design a location-aware secure
transaction verification scheme that allows a bank
server to decide whether to approve or deny a payment
transaction and detect a specific type of relay attack
involving malicious readers. We show that location
information can be used as a basis for secure
transaction verification to defend against the reader-
and-ghost attacks, a devastating relay attack against
mobile payment systems involving malicious readers.
This is based on a straightforward observation that,
under normal scenarios, both the legitimate tag and
legitimate reader are in close physical proximity, at
roughly the same location. Thus, if the two devices
indicate different physically disparate locations, a bank
server could detect the presence of a reader-and-ghost
attack. In Vibrate-to-Unlock, a user unlocks his/her
RFID tags by authenticating to these tags through a
vibrating phone. However, such an auxiliary device
(required by above schemes) may not be available at
the time of accessing RFID tags, and users may not be
willing to always carry these devices. The payment card
stores card details such as the credit card number, name
of the owner, and expiration date. It also stores a
symmetric key shared with its issuer bank.
60
V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
II LITERATURE SURVEY
A SURVEY OF CONTEXT-AWARE MOBILE
COMPUTING RESEARCH
Two technologies allow users to move about
with computing power and network resources at hand:
portable computers and wireless communications.
Computers are shrinking; allowing many to be held by
hand despite impressive computing capabilities, while
the bandwidth of wireless links keep increasing. These
changes have increasingly enabled people to access
their personal information, corporate data, and public
resources “anytime, anywhere”. There are already many
wireless handheld computers available, running
different operating systems such as Palm OS, Microsoft
Pocket PC (Windows CE).
Wireless cellular networks. For example, Palm VII
automatically connects to the portal www.palm.net
whenever the embedded antenna is flipped on. There
are also several vendors making cellular modems that
snap on to a device’s serial port or into an expansion
port. Omnisky provides the cellular modem that outfits
the Palm V. Qualcomm integrates the Palm device and
cellular phone as a new product pd Smart Phone, while
Handspring has a cellular module to make their Palm
OS Visor a mobile phone too.
Wireless LAN networks. For example, the Symbol
PPT 2700 has an embedded Spectrum24® antenna that
supports the IEEE 802.11 airwave standard for wireless
communications and the ITU H.323 standard for
multimedia communications. There are also various
wireless LAN expansion modules supporting IEEE
802.11 and Open Air standards in the form of Compact
Flash, PCMCIA and Springboard cards available on
market.
Wireless PAN (Personal Area Network) or BAN
(Body Area Network). Wireless PAN or BAN allow
communication among devices within a personal
operating space, with typical characteristics such as
short range, low power, low cost, and small networks
with 8 to 16 nodes. Bluetooth is one of the promising
RF-based standards intended to replace the cable
between devices. There are already Bluetooth enabled
devices available, such as the Ericsson R520 mobile
phone. The IEEE 802.15 working group is also
developing Personal Area Network consensus standards
for short distance wireless network (WPAN). Of
course, the venerable IrDA standard allows line-of-
sight short-range IR communications.
DRAWBACKS
People want to access information anytime and
anywhere with the personal devices they carry all the
time. Traditional distributed systems that assume a
stationary execution environment are no longer suitable
for such extremely mobile scenarios. In light of this,
many mobile computing researchers have tried to shield
the mobility and make frequent disconnection
transparent to end users.
LOCATION AWARENESS: EXPLORING
SOCIAL COORDINATION
Mobile devices such as cellular telephones and
handheld computers are becoming increasingly
pervasive in our culture and society. For many, these
mobile devices are essential technologies that help
facilitate their social interactions. The size and form of
mobile devices allow them to accompany us throughout
our daily activities where our, as well as the
environment and people around us, change frequently.
Cellular telephones and handheld computers, once
separate devices, are merging into a single platform as
can be seen with today’s current iteration of smart
phones (e.g., Blackberry, and Audiovox SMT5600).
These smart phones integrate mobile communication
with lightweight computation and provide wireless
connectivity using 802.11 and Bluetooth. Bluetooth and
802.11 enable a smart phone to connect with wireless
networks and other independent technologies (e.g., a
global positioning system (GPS) receiver, a desktop
computer, and other smart phones). Harnessing
information from many sources and combining it
creates exciting new opportunities for applications and
expands the usefulness of our independent mobile
devices by combining their benefits. For example,
combining GPS and wireless connectivity using a smart
phone opens opportunities for smart phone applications
to facilitate social coordination. GPS can provide
location information to the smart phone that can be
annotated on a virtual map and displayed on the screen
for the user. The location of this smart phone can then
be communicated wirelessly to other smart phone users
within the user’s social group, providing everyone
within the social group an awareness of each others’
locations. The location information can then be used to
facilitate coordinating activities, such as meeting up at
the bar later in the evening for a drink. The use of
location awareness information on mobile devices has
been shown to be useful for social engagement. using
Active Campus and with the popularity of
61
V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
Dodgeball.com (a commercial mobile social
application). Depending on usage, availability of input
techniques, and the task to be completed, location
information can be presented, interpreted, and used in a
variety of ways. Colbert showed that mobile telephones
were the preferred communication medium for people
during a rendezvous. However, the exchange of
contextual information such as location can be difficult
to convey accurately through dialog. The verbal
exchange of location, instructions, and intentions
between coordinating people can be ambiguous,
misinterpreted, and misunderstood. As mobile
telephony hardware evolves, location-aware
applications can be developed to augment verbal
communication to facilitate the exchange and
understanding of location.
DRAWBACKS
Mobile devices are extremely constrained in
terms of how much information they can display and
the complexity of the presentation. It is critical that
effective use is made of the available display space,
showing only relevant information, appropriately
presented, and filtering out information irrelevant to the
current task. Equally constrained by device size and
mobility is interaction with the mobile device. A small
screen has small input widgets that can be difficult to
select, particularly given a high level of mobility. For
example, imagine rushing across campus to a meeting
for which you are late and that is located in an
unfamiliar location. It would be difficult to interact with
your mobile telephone, selecting widgets and
navigating menus and still be aware of your
surroundings.
SIMULTANEOUS PLAN RECOGNITION AND
MONITORING (SPRAM) FOR ROBOT
ASSISTANTS
Service robots that work in human
environments should carry out tasks that their human
supervisors are not able to do or do not want to do and
assist the human with tasks that cannot be done alone.
While a useful service robot will probably very often
receive explicit instructions by the human, an efficient
robot will also sometimes have to make decisions on its
own while being aware of the current state of the
human. Consider for example a cleaning robot that is
supposed to clean the apartment. Having detected that
the human had breakfast and went to work but probably
didn’t clean the table, the robot should start to clean the
table and maybe even start vacuuming the flat. On the
other hand, vacuuming the living room while the
human is sitting on the sofa watching TV or sleeping
may not be a very good idea. For a robot to be this
situation aware, it must have knowledge about the tasks
and activities of its human partner. Thus a model about
currently and also previously executed activities of the
human is essential for service robots that are efficient
helpers in human homes. But unless your apartment is
equipped with a lot of sensors, it will not be possible for
a robot to observe all actions of the human at every
time. Therefore, it makes sense to maintain a
probabilistic model of human activities that relies on
only partial observations of the human position and
actions. The robot will have to deal with high
uncertainties regarding the estimation of the current
activity of the human partner and in many cases it may
not be possible for it to exactly know what the human is
doing. This is why we propose the idea of Simultaneous
Plan Recognition and Monitoring (SPRAM) that
enables us to use (partial) observations of the human to
maintain a probabilistic model about several human
activities and their state of execution. This has the
advantage that even if we are not sure about which
activity we are observing, we can still draw conclusions
about the human intentions and reacts adequately.
Imagine, for example, a household robot that is
observing a human in a kitchen during his daily
morning routine. Even if the robot is not sure if the
human is preparing
Cereals, curd-cheese or bread for breakfast, it could still
infer that the human is preparing a meal, which has the
consequence that the table has to be cleaned afterwards.
DRAWBACKS
Thus, the knowledge about human task
performance becomes an inevitable part of a robotic
system that is aimed to work together with humans in
human centered environments like a household. But
high uncertainties within the robots sensors as well as
unpredictable behavior of humans and partial
occlusions usually make it hard to achieve certainty
about human task execution.
MONITORING QUANTITY AND QUALITY OF
SLEEPING USING WISPS
Inadequate and irregular sleeping is a major
health issue for the elderly. It is often closely related to
many serious diseases like cardio-vascular diseases,
diabetes, depression and obesity. Therefore it is very
62
V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
important to recognize sleeping disorders as early as
possible for proper diagnosis and treatment of the
original disease. Existing sleeping monitoring solutions
require wearable devices like Philips Active watch that
are expensive and also need user interaction. The
mattress on a bed with WISP tags that report
acceleration and temperature values to the home
computer. Based on these reports we infer whether the
bed is currently occupied or not and whether an
individual is sleeping or just lying on the bed. Also
utilize reports from other in-home motion sensors to
improve the accuracy of our inference. Our goal is to
learn the regular sleeping pattern of an individual
during training phase and later analyze the collected
data online and provide feedback to him or a health care
provider if there is significant irregularity in sleeping.
Results from our initial experiments show that the
accelerometer readings successfully detect bed
occupancy and movements on the bed during sleeping.
DRAWBACKS
WISP tags are that they need to place within 1-
2 meters of the reader. To meet the read-range
requirement and to keep the equipment away from
obstructing a resident’s movement, attach tags to the
mattress and place the reader below or beside the bed.
PLACE-ITS: A STUDY OF LOCATION-BASED
REMINDERS ON MOBILE PHONES
Every day people use special messages in
order to help us remember future tasks. These
messages, known as reminders, take many forms, such
as post-it notes, emailing one, to-do lists, and electronic
calendar alerts. For example, a student may send
himself an email to remind himself to bring a book for
class the next day. Reminders can be more helpful
when rich contextual information is used to present
them at appropriate times in appropriate places. A
grocery list reminder is more helpful while passing the
supermarket en route home from work, rather than
while at work or after getting home. Several context-
aware systems have prototyped reminder applications
but the evaluation of applications built on these systems
has only been conducted in limited areas. In a recent
pilot study on location-based reminders, we found that
the reminders that people wanted extend beyond life in
the research lab into all aspects of their personal lives.
In particular, people often set reminders because the
current context, both physical and social, prohibited
completing the activity at the time. Therefore, our
ability to understand the role of contextual reminders in
a per son’s natural setting depends on a ubiquitous
system being available consistently in a person’s life. A
compelling platform for pervasively deploying context-
aware reminders is mobile phones. Mobile phones with
location-sensing capabilities are becoming state of the
art, and several location-aware applications are
available for use. The ubiquity of mobile phone
networks enables pervasive location sensing; while the
always-carried and always-on nature of phones means
that reminder creation and notification are permanently
available to users. These factors allow a reminder
system to be omnipresent in the everyday life of a user.
In addition, reminder notifications on mobile phones do
not require any extra hardware, and gives people a
familiar device for in situation interaction. These
technical and social limitations motivate the focus on
location as a context cue. Recent advances in
computing and location-sensing technologies are
enabling high coverage location-sensing opportunities
to use in building location aware applications. Most of
these systems require some initial configuration, but
can then provide pervasive location sensing throughout
a person’s daily life. Using one’s location to trigger
reminders is a potentially valuable piece of context that
can improve the way people use reminders. Our aim is
to find how location-based reminders are used when
available throughout a person’s day. Of course there are
types of reminders in which location is not useful, but
our focus is on those that could benefit from the
additional location information. How and why does
location figure into the relevance of a reminder for a
person? How important is positional accuracy and
timeliness to the usefulness of location-based
reminders? In the following sections we describe the
design, implementation, and deployment of a location-
based reminder application, named Place-Its, for mobile
phones. This simple application, with the mobile phone
as a platform, permitted the integration of location-
based reminders into peoples’ daily practice. We then
report on a 10-person user study involving Place-Its
over a two week period. The study participants found
location-based reminders to be useful, despite relatively
low location accuracy. In particular, participants found
value in having the application always naturally on
hand for posting and receiving reminders, along with
pervasive location sensing. Also, the participants used
location-based reminders in numerous ways, including
several in which the location served as a convenient
proxy for other kinds of context.
63
V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63]
Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com
DRAWBACKS
The suitability for phone-based context-aware
reminders is unclear. The sensing capabilities of phones
are limited in the types of context and their accuracy of
sensing. The limited input capabilities of mobile
phones, combined with the tendency towards use while
committed to another task, suggests a simplistic user
interface that permits posting a reminder in a few key-
presses.
III CONCLUSION
In this paper, we reported a new approach to
defend against unauthorized reading and relay attacks
in some RFID applications whereby location can be
used as a valid context. We argued the feasibility of our
approach in terms of both technical and economical
aspects. Using location and derived speed information,
we designed locationaware selective unlocking
mechanisms and a locationaware transaction
verification mechanism. For collecting this information,
we made use of the GPS infrastructure. To demonstrate
the feasibility of our location-aware defense
mechanisms, we integrated a low-cost GPS receiver
with a RFID tag (the Intel’s WISP) and conducted
relevant experiments to acquire location and speed
information from GPS readings. Our results show that it
is possible to measure location and speed with high
accuracies even on a constrained GPS-enabled
platform, and that our locationaware defenses are quite
useful in significantly raising the bar against the reader-
and-leech attacks. As an immediate avenue for further
work, we intend to further optimize and fine-tune our
location detection algorithms for better efficiency on
resource-constrained RFID platforms and improved
tolerance to errors whenever applicable. Additionally,
we are exploring the use of ambient sensors to
determine proximity based on location-specific sensor
information for the second security primitive secure
transaction verification. We will also evaluate the
promising of proposed techniques by means of usability
studies.
REFERENCES
[1]. RFID Toll Collection Systems,
http://www.securitysa.com/news.aspx?pklnew
sid=25591, 2007.
[2]. 66-Channel LS20031 GPS Receiver Module,
http://www.megachip.ru/pdf/POLOLU/66_CH
ANNEL.pdf, 2011.
[3]. GM-101 Cost Effective GPS Module with Ttl
Rs-232
Interface,http://www.alibaba.com/product-
gs/435104168/GM_101_Cost_Effective_GPS_
Module.html, 2011.
[4]. NMEA 0183 Standard,
http://www.nmea.org/content/nmea_standards/
nmea_083_v_400.asp, 2011.
[5]. S. Brands and D. Chaum, “Distance-Bounding
Protocols,” Proc.Int’l Conf. Theory and
Applications of Cryptographic Techniques
Advances in Cryptology (EUROCRYPT),
1993.
[6]. J. Bringer, H. Chabanne, and E. Dottax,
“HB++: A Lightweight Authentication
Protocol Secure against Some Attacks,”
Proc.Second Int’l Workshop Security, Privacy
and Trust in Pervasive and Ubiquitous
Computing, 2006.
[7]. M. Buckner, R. Crutcher, M.R. Moore, and
S.F. Smith, “GPS and Sensor-Enabled RFID
Tags,”http://www.ornl.gov/webworks/cppr/y2
001/pres/118169.pdf, 2013.
[8]. M. Buettner, R. Prasad, M. Philipose, and D.
Wetherall, “Recognizing Daily Activities with
RFID-Based Sensors,” Proc.Int’l Conf.
Ubiquitous Computing (UbiComp), 2009.
[9]. M. Calamia, “Mobile Payments to Surge to
$670 Billion by 2015,”
http://www.mobiledia.com/news/96900.html,
July 2011.

More Related Content

What's hot

Payment revolution by Yoav Elgrichi
Payment revolution by Yoav ElgrichiPayment revolution by Yoav Elgrichi
Payment revolution by Yoav Elgrichi
Siti Aishah Zahari
 
Application of qr 2-3-4
Application of qr 2-3-4Application of qr 2-3-4
Application of qr 2-3-4
IAEME Publication
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
 
Near field communication
Near field communicationNear field communication
Near field communication
Nishank Magoo
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
Ahmed Kamel Taha
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
spy007s
 
Navigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A SurveyNavigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A Survey
AM Publications,India
 
Cracking the Code: How To Think About QR
Cracking the Code: How To Think About QRCracking the Code: How To Think About QR
Cracking the Code: How To Think About QR
Leo Burnett
 
Contactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyContactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile Loyalty
Merchant360, Inc.
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET Journal
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
Editor IJMTER
 
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
Pierre Metivier
 
Nfc power point
Nfc power pointNfc power point
Nfc power point
Rajeev Verma
 
NFC wallet
NFC walletNFC wallet
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
Vikram Dahiya
 
Ganesh
GaneshGanesh
Ganesh
Ganesh Deva
 

What's hot (17)

Payment revolution by Yoav Elgrichi
Payment revolution by Yoav ElgrichiPayment revolution by Yoav Elgrichi
Payment revolution by Yoav Elgrichi
 
Application of qr 2-3-4
Application of qr 2-3-4Application of qr 2-3-4
Application of qr 2-3-4
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Navigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A SurveyNavigation for Indoor Location Based On QR Codes and Google Maps – A Survey
Navigation for Indoor Location Based On QR Codes and Google Maps – A Survey
 
Cracking the Code: How To Think About QR
Cracking the Code: How To Think About QRCracking the Code: How To Think About QR
Cracking the Code: How To Think About QR
 
Contactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyContactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile Loyalty
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
 
Nfc power point
Nfc power pointNfc power point
Nfc power point
 
NFC wallet
NFC walletNFC wallet
NFC wallet
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
Ganesh
GaneshGanesh
Ganesh
 

Similar to A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING

A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
Sara Alvarez
 
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for  Mobile PhonesMobile Agents: An Intelligent Multi-Agent System for  Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
IOSR Journals
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
csandit
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
Adrit Techno Solutions
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
theijes
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
Lovely Singla
 
A43050104
A43050104A43050104
A43050104
IJERA Editor
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Valeria Gasik
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
deepapriya28
 
ijais13-451015
ijais13-451015ijais13-451015
ijais13-451015
Sathya Bala
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
IJCNCJournal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
E-Mobile
E-Mobile E-Mobile
E-Mobile
alldesign
 
Internet of things
Internet of thingsInternet of things
Internet of things
Devdutta Chakrabarti
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
KanagarajanSwamiappa
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
Tapesh Chalisgaonkar
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...
IJECEIAES
 

Similar to A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING (20)

A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for  Mobile PhonesMobile Agents: An Intelligent Multi-Agent System for  Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
A43050104
A43050104A43050104
A43050104
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
 
ijais13-451015
ijais13-451015ijais13-451015
ijais13-451015
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
E-Mobile
E-Mobile E-Mobile
E-Mobile
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...Design and implementation a network mobile application for plants shopping ce...
Design and implementation a network mobile application for plants shopping ce...
 

More from pharmaindexing

Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
pharmaindexing
 
Overview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factorsOverview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factors
pharmaindexing
 
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
pharmaindexing
 
A review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agentsA review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agents
pharmaindexing
 
Carbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case reportCarbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case report
pharmaindexing
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activity
pharmaindexing
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activity
pharmaindexing
 
Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1
pharmaindexing
 
A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...
pharmaindexing
 
Nano-Medicine Global Market
Nano-Medicine Global MarketNano-Medicine Global Market
Nano-Medicine Global Market
pharmaindexing
 
The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...
pharmaindexing
 
Corticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overviewCorticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overview
pharmaindexing
 
Anti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. JussAnti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. Juss
pharmaindexing
 
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
pharmaindexing
 
Bioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogensBioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogens
pharmaindexing
 
A study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and managementA study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and management
pharmaindexing
 
Evaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plantsEvaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plants
pharmaindexing
 
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
pharmaindexing
 
Concept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurologyConcept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurology
pharmaindexing
 
Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...
pharmaindexing
 

More from pharmaindexing (20)

Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...
 
Overview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factorsOverview on Recurrence Pregnancy Loss etiology and risk factors
Overview on Recurrence Pregnancy Loss etiology and risk factors
 
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.
 
A review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agentsA review on liver disorders and screening models of hepatoprotective agents
A review on liver disorders and screening models of hepatoprotective agents
 
Carbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case reportCarbamazepine induced Steven Johnson syndrome: A case report
Carbamazepine induced Steven Johnson syndrome: A case report
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activity
 
Monoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activityMonoherbal formulation development for laxative activity
Monoherbal formulation development for laxative activity
 
Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1Pneumonia and respiratory failure from swine origin influenza H1n1
Pneumonia and respiratory failure from swine origin influenza H1n1
 
A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...A descriptive study on newborn care among postnatal mothers in selected mater...
A descriptive study on newborn care among postnatal mothers in selected mater...
 
Nano-Medicine Global Market
Nano-Medicine Global MarketNano-Medicine Global Market
Nano-Medicine Global Market
 
The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...The Flaws in health practice in post-operative management of a patient in ter...
The Flaws in health practice in post-operative management of a patient in ter...
 
Corticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overviewCorticosteroid induced disorders – An overview
Corticosteroid induced disorders – An overview
 
Anti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. JussAnti-inflammatory activity of pupalia lappacea L. Juss
Anti-inflammatory activity of pupalia lappacea L. Juss
 
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...
 
Bioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogensBioactivity screening of Soil bacteria against human pathogens
Bioactivity screening of Soil bacteria against human pathogens
 
A study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and managementA study on sigmoid Volvulus presentation and management
A study on sigmoid Volvulus presentation and management
 
Evaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plantsEvaluation of Preliminary phytochemical on various some medicinal plants
Evaluation of Preliminary phytochemical on various some medicinal plants
 
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...
 
Concept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurologyConcept of srotas from ayurvedic perspective with special reference to neurology
Concept of srotas from ayurvedic perspective with special reference to neurology
 
Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...Health promotion survey in overweight and obese students of universities in n...
Health promotion survey in overweight and obese students of universities in n...
 

Recently uploaded

Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf
devtomar25
 
Operational amplifiers and oscillators notes
Operational amplifiers and oscillators notesOperational amplifiers and oscillators notes
Operational amplifiers and oscillators notes
ShachiPGowda
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Bayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptxBayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptx
amrita chaturvedi
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
cannyengineerings
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 

Recently uploaded (20)

Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf
 
Operational amplifiers and oscillators notes
Operational amplifiers and oscillators notesOperational amplifiers and oscillators notes
Operational amplifiers and oscillators notes
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Bayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptxBayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptx
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 

A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING

  • 1. www.ijiarec.com Author for Correspondence: *1 Mr.V.Thamizharasu, PG Scholar, Department of CSE, Sasurie College of Engineering, Vijayamangalam, Tamilnadu, India. E-mail: tamil_cse74@yahoo.com 2 Mr. M.Santhosh, M.E., Asst.Professor Department of CSE, Sasurie College of Engineering, Vijayamangalam, Tamilnadu, India. JAN 2014 International Journal of Intellectual Advancements and Research in Engineering Computations A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING *1 Mr. V.Tamizharasu, 2 Mr. M.Santhosh,M.E., ABSTRACT In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location awareness can be used by both tags and back-end servers for defending against unauthorized reading and relay attacks on RFID systems. On the tag side, we design a location-aware selective unlocking mechanism using which tags can selectively respond to reader interrogations rather than doing so promiscuously. On the server side, we design a location-aware secure transaction verification scheme that allows a bank server to decide whether to approve or deny a payment transaction and detect a specific type of relay attack involving malicious readers. The premise of our work is a current technological advancement that can enable RFID tags with low-cost location (GPS) sensing capabilities. Unlike prior research on this subject, our defenses do not rely on auxiliary devices or require any explicit user involvement Index terms: RFID, GPS, Location aware selective unlocking, malicious readers. I INTRODUCTION The premise of the proposed work is based on a current technological advancement that enables many RFID tags with low-cost sensing capabilities.We report on a new approach for enhancing security and privacy in certain RFID applications where by location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location awareness can be used by both tags and back-end servers for defending against unauthorized reading and relay attacks on RFID systems. On the tag side, we design a location-aware selective unlocking mechanism using which tags can selectively respond to reader interrogations rather than doing so promiscuously. On the server side, we design a location-aware secure transaction verification scheme that allows a bank server to decide whether to approve or deny a payment transaction and detect a specific type of relay attack involving malicious readers. We show that location information can be used as a basis for secure transaction verification to defend against the reader- and-ghost attacks, a devastating relay attack against mobile payment systems involving malicious readers. This is based on a straightforward observation that, under normal scenarios, both the legitimate tag and legitimate reader are in close physical proximity, at roughly the same location. Thus, if the two devices indicate different physically disparate locations, a bank server could detect the presence of a reader-and-ghost attack. In Vibrate-to-Unlock, a user unlocks his/her RFID tags by authenticating to these tags through a vibrating phone. However, such an auxiliary device (required by above schemes) may not be available at the time of accessing RFID tags, and users may not be willing to always carry these devices. The payment card stores card details such as the credit card number, name of the owner, and expiration date. It also stores a symmetric key shared with its issuer bank.
  • 2. 60 V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com II LITERATURE SURVEY A SURVEY OF CONTEXT-AWARE MOBILE COMPUTING RESEARCH Two technologies allow users to move about with computing power and network resources at hand: portable computers and wireless communications. Computers are shrinking; allowing many to be held by hand despite impressive computing capabilities, while the bandwidth of wireless links keep increasing. These changes have increasingly enabled people to access their personal information, corporate data, and public resources “anytime, anywhere”. There are already many wireless handheld computers available, running different operating systems such as Palm OS, Microsoft Pocket PC (Windows CE). Wireless cellular networks. For example, Palm VII automatically connects to the portal www.palm.net whenever the embedded antenna is flipped on. There are also several vendors making cellular modems that snap on to a device’s serial port or into an expansion port. Omnisky provides the cellular modem that outfits the Palm V. Qualcomm integrates the Palm device and cellular phone as a new product pd Smart Phone, while Handspring has a cellular module to make their Palm OS Visor a mobile phone too. Wireless LAN networks. For example, the Symbol PPT 2700 has an embedded Spectrum24® antenna that supports the IEEE 802.11 airwave standard for wireless communications and the ITU H.323 standard for multimedia communications. There are also various wireless LAN expansion modules supporting IEEE 802.11 and Open Air standards in the form of Compact Flash, PCMCIA and Springboard cards available on market. Wireless PAN (Personal Area Network) or BAN (Body Area Network). Wireless PAN or BAN allow communication among devices within a personal operating space, with typical characteristics such as short range, low power, low cost, and small networks with 8 to 16 nodes. Bluetooth is one of the promising RF-based standards intended to replace the cable between devices. There are already Bluetooth enabled devices available, such as the Ericsson R520 mobile phone. The IEEE 802.15 working group is also developing Personal Area Network consensus standards for short distance wireless network (WPAN). Of course, the venerable IrDA standard allows line-of- sight short-range IR communications. DRAWBACKS People want to access information anytime and anywhere with the personal devices they carry all the time. Traditional distributed systems that assume a stationary execution environment are no longer suitable for such extremely mobile scenarios. In light of this, many mobile computing researchers have tried to shield the mobility and make frequent disconnection transparent to end users. LOCATION AWARENESS: EXPLORING SOCIAL COORDINATION Mobile devices such as cellular telephones and handheld computers are becoming increasingly pervasive in our culture and society. For many, these mobile devices are essential technologies that help facilitate their social interactions. The size and form of mobile devices allow them to accompany us throughout our daily activities where our, as well as the environment and people around us, change frequently. Cellular telephones and handheld computers, once separate devices, are merging into a single platform as can be seen with today’s current iteration of smart phones (e.g., Blackberry, and Audiovox SMT5600). These smart phones integrate mobile communication with lightweight computation and provide wireless connectivity using 802.11 and Bluetooth. Bluetooth and 802.11 enable a smart phone to connect with wireless networks and other independent technologies (e.g., a global positioning system (GPS) receiver, a desktop computer, and other smart phones). Harnessing information from many sources and combining it creates exciting new opportunities for applications and expands the usefulness of our independent mobile devices by combining their benefits. For example, combining GPS and wireless connectivity using a smart phone opens opportunities for smart phone applications to facilitate social coordination. GPS can provide location information to the smart phone that can be annotated on a virtual map and displayed on the screen for the user. The location of this smart phone can then be communicated wirelessly to other smart phone users within the user’s social group, providing everyone within the social group an awareness of each others’ locations. The location information can then be used to facilitate coordinating activities, such as meeting up at the bar later in the evening for a drink. The use of location awareness information on mobile devices has been shown to be useful for social engagement. using Active Campus and with the popularity of
  • 3. 61 V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com Dodgeball.com (a commercial mobile social application). Depending on usage, availability of input techniques, and the task to be completed, location information can be presented, interpreted, and used in a variety of ways. Colbert showed that mobile telephones were the preferred communication medium for people during a rendezvous. However, the exchange of contextual information such as location can be difficult to convey accurately through dialog. The verbal exchange of location, instructions, and intentions between coordinating people can be ambiguous, misinterpreted, and misunderstood. As mobile telephony hardware evolves, location-aware applications can be developed to augment verbal communication to facilitate the exchange and understanding of location. DRAWBACKS Mobile devices are extremely constrained in terms of how much information they can display and the complexity of the presentation. It is critical that effective use is made of the available display space, showing only relevant information, appropriately presented, and filtering out information irrelevant to the current task. Equally constrained by device size and mobility is interaction with the mobile device. A small screen has small input widgets that can be difficult to select, particularly given a high level of mobility. For example, imagine rushing across campus to a meeting for which you are late and that is located in an unfamiliar location. It would be difficult to interact with your mobile telephone, selecting widgets and navigating menus and still be aware of your surroundings. SIMULTANEOUS PLAN RECOGNITION AND MONITORING (SPRAM) FOR ROBOT ASSISTANTS Service robots that work in human environments should carry out tasks that their human supervisors are not able to do or do not want to do and assist the human with tasks that cannot be done alone. While a useful service robot will probably very often receive explicit instructions by the human, an efficient robot will also sometimes have to make decisions on its own while being aware of the current state of the human. Consider for example a cleaning robot that is supposed to clean the apartment. Having detected that the human had breakfast and went to work but probably didn’t clean the table, the robot should start to clean the table and maybe even start vacuuming the flat. On the other hand, vacuuming the living room while the human is sitting on the sofa watching TV or sleeping may not be a very good idea. For a robot to be this situation aware, it must have knowledge about the tasks and activities of its human partner. Thus a model about currently and also previously executed activities of the human is essential for service robots that are efficient helpers in human homes. But unless your apartment is equipped with a lot of sensors, it will not be possible for a robot to observe all actions of the human at every time. Therefore, it makes sense to maintain a probabilistic model of human activities that relies on only partial observations of the human position and actions. The robot will have to deal with high uncertainties regarding the estimation of the current activity of the human partner and in many cases it may not be possible for it to exactly know what the human is doing. This is why we propose the idea of Simultaneous Plan Recognition and Monitoring (SPRAM) that enables us to use (partial) observations of the human to maintain a probabilistic model about several human activities and their state of execution. This has the advantage that even if we are not sure about which activity we are observing, we can still draw conclusions about the human intentions and reacts adequately. Imagine, for example, a household robot that is observing a human in a kitchen during his daily morning routine. Even if the robot is not sure if the human is preparing Cereals, curd-cheese or bread for breakfast, it could still infer that the human is preparing a meal, which has the consequence that the table has to be cleaned afterwards. DRAWBACKS Thus, the knowledge about human task performance becomes an inevitable part of a robotic system that is aimed to work together with humans in human centered environments like a household. But high uncertainties within the robots sensors as well as unpredictable behavior of humans and partial occlusions usually make it hard to achieve certainty about human task execution. MONITORING QUANTITY AND QUALITY OF SLEEPING USING WISPS Inadequate and irregular sleeping is a major health issue for the elderly. It is often closely related to many serious diseases like cardio-vascular diseases, diabetes, depression and obesity. Therefore it is very
  • 4. 62 V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com important to recognize sleeping disorders as early as possible for proper diagnosis and treatment of the original disease. Existing sleeping monitoring solutions require wearable devices like Philips Active watch that are expensive and also need user interaction. The mattress on a bed with WISP tags that report acceleration and temperature values to the home computer. Based on these reports we infer whether the bed is currently occupied or not and whether an individual is sleeping or just lying on the bed. Also utilize reports from other in-home motion sensors to improve the accuracy of our inference. Our goal is to learn the regular sleeping pattern of an individual during training phase and later analyze the collected data online and provide feedback to him or a health care provider if there is significant irregularity in sleeping. Results from our initial experiments show that the accelerometer readings successfully detect bed occupancy and movements on the bed during sleeping. DRAWBACKS WISP tags are that they need to place within 1- 2 meters of the reader. To meet the read-range requirement and to keep the equipment away from obstructing a resident’s movement, attach tags to the mattress and place the reader below or beside the bed. PLACE-ITS: A STUDY OF LOCATION-BASED REMINDERS ON MOBILE PHONES Every day people use special messages in order to help us remember future tasks. These messages, known as reminders, take many forms, such as post-it notes, emailing one, to-do lists, and electronic calendar alerts. For example, a student may send himself an email to remind himself to bring a book for class the next day. Reminders can be more helpful when rich contextual information is used to present them at appropriate times in appropriate places. A grocery list reminder is more helpful while passing the supermarket en route home from work, rather than while at work or after getting home. Several context- aware systems have prototyped reminder applications but the evaluation of applications built on these systems has only been conducted in limited areas. In a recent pilot study on location-based reminders, we found that the reminders that people wanted extend beyond life in the research lab into all aspects of their personal lives. In particular, people often set reminders because the current context, both physical and social, prohibited completing the activity at the time. Therefore, our ability to understand the role of contextual reminders in a per son’s natural setting depends on a ubiquitous system being available consistently in a person’s life. A compelling platform for pervasively deploying context- aware reminders is mobile phones. Mobile phones with location-sensing capabilities are becoming state of the art, and several location-aware applications are available for use. The ubiquity of mobile phone networks enables pervasive location sensing; while the always-carried and always-on nature of phones means that reminder creation and notification are permanently available to users. These factors allow a reminder system to be omnipresent in the everyday life of a user. In addition, reminder notifications on mobile phones do not require any extra hardware, and gives people a familiar device for in situation interaction. These technical and social limitations motivate the focus on location as a context cue. Recent advances in computing and location-sensing technologies are enabling high coverage location-sensing opportunities to use in building location aware applications. Most of these systems require some initial configuration, but can then provide pervasive location sensing throughout a person’s daily life. Using one’s location to trigger reminders is a potentially valuable piece of context that can improve the way people use reminders. Our aim is to find how location-based reminders are used when available throughout a person’s day. Of course there are types of reminders in which location is not useful, but our focus is on those that could benefit from the additional location information. How and why does location figure into the relevance of a reminder for a person? How important is positional accuracy and timeliness to the usefulness of location-based reminders? In the following sections we describe the design, implementation, and deployment of a location- based reminder application, named Place-Its, for mobile phones. This simple application, with the mobile phone as a platform, permitted the integration of location- based reminders into peoples’ daily practice. We then report on a 10-person user study involving Place-Its over a two week period. The study participants found location-based reminders to be useful, despite relatively low location accuracy. In particular, participants found value in having the application always naturally on hand for posting and receiving reminders, along with pervasive location sensing. Also, the participants used location-based reminders in numerous ways, including several in which the location served as a convenient proxy for other kinds of context.
  • 5. 63 V.Thamizarasu. et al., Inter. J. Int. Adv. & Res. In Engg. Comp., Vol.–02 (01) 2014 [59-63] Copyrights © International Journal of Intellectual Advancements and Research in Engineering Computations, www.ijiarec.com DRAWBACKS The suitability for phone-based context-aware reminders is unclear. The sensing capabilities of phones are limited in the types of context and their accuracy of sensing. The limited input capabilities of mobile phones, combined with the tendency towards use while committed to another task, suggests a simplistic user interface that permits posting a reminder in a few key- presses. III CONCLUSION In this paper, we reported a new approach to defend against unauthorized reading and relay attacks in some RFID applications whereby location can be used as a valid context. We argued the feasibility of our approach in terms of both technical and economical aspects. Using location and derived speed information, we designed locationaware selective unlocking mechanisms and a locationaware transaction verification mechanism. For collecting this information, we made use of the GPS infrastructure. To demonstrate the feasibility of our location-aware defense mechanisms, we integrated a low-cost GPS receiver with a RFID tag (the Intel’s WISP) and conducted relevant experiments to acquire location and speed information from GPS readings. Our results show that it is possible to measure location and speed with high accuracies even on a constrained GPS-enabled platform, and that our locationaware defenses are quite useful in significantly raising the bar against the reader- and-leech attacks. As an immediate avenue for further work, we intend to further optimize and fine-tune our location detection algorithms for better efficiency on resource-constrained RFID platforms and improved tolerance to errors whenever applicable. Additionally, we are exploring the use of ambient sensors to determine proximity based on location-specific sensor information for the second security primitive secure transaction verification. We will also evaluate the promising of proposed techniques by means of usability studies. REFERENCES [1]. RFID Toll Collection Systems, http://www.securitysa.com/news.aspx?pklnew sid=25591, 2007. [2]. 66-Channel LS20031 GPS Receiver Module, http://www.megachip.ru/pdf/POLOLU/66_CH ANNEL.pdf, 2011. [3]. GM-101 Cost Effective GPS Module with Ttl Rs-232 Interface,http://www.alibaba.com/product- gs/435104168/GM_101_Cost_Effective_GPS_ Module.html, 2011. [4]. NMEA 0183 Standard, http://www.nmea.org/content/nmea_standards/ nmea_083_v_400.asp, 2011. [5]. S. Brands and D. Chaum, “Distance-Bounding Protocols,” Proc.Int’l Conf. Theory and Applications of Cryptographic Techniques Advances in Cryptology (EUROCRYPT), 1993. [6]. J. Bringer, H. Chabanne, and E. Dottax, “HB++: A Lightweight Authentication Protocol Secure against Some Attacks,” Proc.Second Int’l Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. [7]. M. Buckner, R. Crutcher, M.R. Moore, and S.F. Smith, “GPS and Sensor-Enabled RFID Tags,”http://www.ornl.gov/webworks/cppr/y2 001/pres/118169.pdf, 2013. [8]. M. Buettner, R. Prasad, M. Philipose, and D. Wetherall, “Recognizing Daily Activities with RFID-Based Sensors,” Proc.Int’l Conf. Ubiquitous Computing (UbiComp), 2009. [9]. M. Calamia, “Mobile Payments to Surge to $670 Billion by 2015,” http://www.mobiledia.com/news/96900.html, July 2011.