This document proposes an algorithm to detect and discriminate tampered RFID data using steganography. The objectives are to develop an algorithm that requires fewer computations and memory overhead. The motivation is that RFID tags are vulnerable to physical tampering since they store sensitive data. The approach embeds a chaotic watermark across RFID tag memory partitions. When tampering occurs, the extracted watermark is compared to detect and identify the specific memory partition that was tampered. The algorithm is implemented on a low-cost hardware with an RFID reader, microcontroller and RFID tags.
Design of Anti-collision Technique for RFID UHF Tag using VerilogIOSR Journals
Abstract: This paper presents a proposed Reliable and Cost Effective Anti-collision technique (RCEAT) for Radio Frequency Identification (RFID) Class 0 UHF tag. The RCEAT architecture consists of two main subsystems; PreRCEAT and PostRCEAT. The PreRCEAT subsystem is to detect any error in the incoming messages. Then the identification bit (ID) of the no error packet will be fed to the next subsystem. The PostRCEAT subsystem is to identify the tag by using the proposed Fast-search Lookup Table. The proposed system is designed using Verilog HDL. The system has been successfully implemented in hardware using Field Programmable Grid Array (FPGA) SPARTAN 3E. Finally the RCEAT architecture is synthesized using xillins 13.3v. From the hardware verification results, it shows that the proposed RCEAT system enables to identify the tags without error at the maximum operating frequency of 180MHz. The system consumes 7.578 mW powers, occupies 6,041 gates and 0.0375 mm2 area with Data arrival time of 2.31 ns. Key words: FPGA,Spartan 3e,RCEAT,Verilog HDL,RFID tag,CRC.
Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGAVivek Venugopalan
This document discusses hardware Trojan threats in FPGAs. It proposes a novel metric called the Hardware Trojan Threat Detectability Metric (HDM) that uses weighted physical parameters to detect Trojans. Several Trojans were designed and implemented in an FPGA testbed to compromise systems. HDM increased detection rates to 86% compared to 57% using single parameters. The document analyzes potential attack surfaces in FPGAs and discusses optimization of Trojans to avoid detection.
Secure Scan Design Using Redundant Scan RegisterIDES Editor
Cryptographic VLSI chip has a significant role to
resist the attacks which is the growing customer concern of
hardware security. Redundancy introduces a great amount of
randomness & non linearity in any kind circuitry
(combinational or sequential). We introduce a new type of
redundancy in sequential circuits to make redundant scan
registers that are indistinguishable with the original scan
registers. They are sequentially undetectable as well as
redundant, which makes it highly secured. The approach is
only to replace the original scan registers to modified
redundant scan registers called RScR.
This document summarizes the features of the AVR32 architecture, including:
1. It is a 32-bit RISC architecture with up to 15 general purpose 32-bit registers and supports byte, half-word, word, and double word memory access.
2. It has optional extensions like DSP, Java, SIMD, and coprocessors. It also supports efficient on-chip debugging and optional MPU/MMU.
3. The architecture defines different microarchitectures (AVR32A and AVR32B) that provide different performance levels by trading off area and power consumption.
The document outlines a proposed design for a radio frequency identification (RFID) system security method. It begins with an introduction and background on RFID technology and security concerns. It then presents the methodology, which involves analyzing security threats and devising an attack taxonomy. The document proposes a cryptographic authentication protocol for RFID tags that provides mutual authentication, untraceability, and resistance to various attacks. It uses encryption techniques like keyed hash functions to authenticate tags and readers while maintaining low computation and communication costs suitable for passive RFID tags.
This is a seminar on hardware trojan that i have given during my M.tech. It follows the latest classification of hardware trojans used in research community. 3 latest hardware trojan detection technique and 2 insertion techniques are presented in slides.
EPCglobal Class 1 Generation 2 is a standard for passive UHF RFID tags that allows readers to identify tags in the field. It uses a slotted Aloha algorithm to mitigate data collisions as multiple tags may respond simultaneously. The reader initiates communication with tags using query and command messages. Tags respond using backscattering to modulate the reader's signal and transmit their identifier and other data. This allows for inventorying and accessing tags without needing their own power source.
Hardware Trojans, a relatively unheard threat viz-a-viz the typical software based malwares and virus attacks ,that keep befalling across is being realized gradually by the IT security domain including the users, the IT Security guys and the corporate sector who all of a sudden recognize the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim doesn’t even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are persistent in nature ie once infected in an IC, the threat remains and cannot be removed even once detected. The presentation i plan to run will bring out the over view of these threats including classifications, mechanisms they work on,few case studies and the current set of countermeasures being researched upon.
Design of Anti-collision Technique for RFID UHF Tag using VerilogIOSR Journals
Abstract: This paper presents a proposed Reliable and Cost Effective Anti-collision technique (RCEAT) for Radio Frequency Identification (RFID) Class 0 UHF tag. The RCEAT architecture consists of two main subsystems; PreRCEAT and PostRCEAT. The PreRCEAT subsystem is to detect any error in the incoming messages. Then the identification bit (ID) of the no error packet will be fed to the next subsystem. The PostRCEAT subsystem is to identify the tag by using the proposed Fast-search Lookup Table. The proposed system is designed using Verilog HDL. The system has been successfully implemented in hardware using Field Programmable Grid Array (FPGA) SPARTAN 3E. Finally the RCEAT architecture is synthesized using xillins 13.3v. From the hardware verification results, it shows that the proposed RCEAT system enables to identify the tags without error at the maximum operating frequency of 180MHz. The system consumes 7.578 mW powers, occupies 6,041 gates and 0.0375 mm2 area with Data arrival time of 2.31 ns. Key words: FPGA,Spartan 3e,RCEAT,Verilog HDL,RFID tag,CRC.
Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGAVivek Venugopalan
This document discusses hardware Trojan threats in FPGAs. It proposes a novel metric called the Hardware Trojan Threat Detectability Metric (HDM) that uses weighted physical parameters to detect Trojans. Several Trojans were designed and implemented in an FPGA testbed to compromise systems. HDM increased detection rates to 86% compared to 57% using single parameters. The document analyzes potential attack surfaces in FPGAs and discusses optimization of Trojans to avoid detection.
Secure Scan Design Using Redundant Scan RegisterIDES Editor
Cryptographic VLSI chip has a significant role to
resist the attacks which is the growing customer concern of
hardware security. Redundancy introduces a great amount of
randomness & non linearity in any kind circuitry
(combinational or sequential). We introduce a new type of
redundancy in sequential circuits to make redundant scan
registers that are indistinguishable with the original scan
registers. They are sequentially undetectable as well as
redundant, which makes it highly secured. The approach is
only to replace the original scan registers to modified
redundant scan registers called RScR.
This document summarizes the features of the AVR32 architecture, including:
1. It is a 32-bit RISC architecture with up to 15 general purpose 32-bit registers and supports byte, half-word, word, and double word memory access.
2. It has optional extensions like DSP, Java, SIMD, and coprocessors. It also supports efficient on-chip debugging and optional MPU/MMU.
3. The architecture defines different microarchitectures (AVR32A and AVR32B) that provide different performance levels by trading off area and power consumption.
The document outlines a proposed design for a radio frequency identification (RFID) system security method. It begins with an introduction and background on RFID technology and security concerns. It then presents the methodology, which involves analyzing security threats and devising an attack taxonomy. The document proposes a cryptographic authentication protocol for RFID tags that provides mutual authentication, untraceability, and resistance to various attacks. It uses encryption techniques like keyed hash functions to authenticate tags and readers while maintaining low computation and communication costs suitable for passive RFID tags.
This is a seminar on hardware trojan that i have given during my M.tech. It follows the latest classification of hardware trojans used in research community. 3 latest hardware trojan detection technique and 2 insertion techniques are presented in slides.
EPCglobal Class 1 Generation 2 is a standard for passive UHF RFID tags that allows readers to identify tags in the field. It uses a slotted Aloha algorithm to mitigate data collisions as multiple tags may respond simultaneously. The reader initiates communication with tags using query and command messages. Tags respond using backscattering to modulate the reader's signal and transmit their identifier and other data. This allows for inventorying and accessing tags without needing their own power source.
Hardware Trojans, a relatively unheard threat viz-a-viz the typical software based malwares and virus attacks ,that keep befalling across is being realized gradually by the IT security domain including the users, the IT Security guys and the corporate sector who all of a sudden recognize the immense threat they might already be living in with. A distinctive dormant Hardware Trojan threat can be so flagitious that the victim doesn’t even know if he is effectuated when he might already be. Hardware Trojans are evolving threats that can shake the roots of any set and constituted government or corporate giant for that matter. Unlike Software virus/malware threats, Hardware Trojans are persistent in nature ie once infected in an IC, the threat remains and cannot be removed even once detected. The presentation i plan to run will bring out the over view of these threats including classifications, mechanisms they work on,few case studies and the current set of countermeasures being researched upon.
This document provides an outline and overview of key concepts related to radio frequency identification (RFID) systems for manufacturing and logistics applications. It begins with definitions of RFID terminology including tags, readers, air interfaces, and modulation techniques. It then covers technical characteristics such as frequency ranges and reading ranges. Common applications are also discussed, including mandates from the US Department of Defense and Walmart for their suppliers to implement RFID tracking.
The document discusses the Chinese Revolution of 1949, including the Qing Dynasty, the government of the Republic of China, the Long March, the Second Sino-Japanese War, the civil war in 1947-1948, and how the actual revolution occurred in 1949 where the Communist Party took control of mainland China.
UHF RFID tags called Magicstraps can be embedded directly into printed circuit boards. Magicstraps are rewritable RFID chips with an integrated antenna matching circuit, allowing them to be used as-is on PCBs without additional antenna components. Embedding Magicstraps turns PCBs into smart, traceable products with RFID capabilities. This allows applications like anti-counterfeiting, inventory management and predictive maintenance across the entire supply chain.
The LVDT consists of a primary winding in the center of a former surrounded by two secondary windings. It works on the principle of mutual induction to convert displacement, a non-electrical energy, into an electrical output. When the soft iron core inside is in the null position, equal voltages are induced in the two secondary windings, resulting in a differential output voltage of 0. If the core moves left or right, the flux linking one secondary increases while the other decreases, producing a differential voltage. The LVDT has a linear output characteristic for small displacements but becomes non-linear at larger displacements. It is used to measure various parameters like force, weight, pressure, and displacements in applications such as soil testing
The document provides details about a project report on security extensibility in steganography. It discusses existing steganography techniques like the Least Significant Bit (LSB) algorithm and their drawbacks. It proposes developing a new Security Extensibility Algorithm (SRM algorithm) to provide better security for steganography compared to the LSB algorithm. The SRM algorithm would be used for steganography, cryptography, password authentication, and digital watermarking. The report outlines the system analysis, design, and testing of the proposed SRM algorithms to enhance security when embedding secret messages within digital files.
The strain gauge is a passive resistive transducer that converts mechanical forces into a change in electrical resistance. There are different types of strain gauges including wire gauges, foil gauges, and semiconductor gauges. Wire gauges can be unbonded or bonded to measure strain, while foil gauges consist of a grid of fine resistance wires bonded to a carrier material. Semiconductor gauges use materials like silicon and germanium that change resistance due to their piezoresistive effect when strained.
This document discusses transducers and the linear variable differential transformer (LVDT). It defines a transducer as a device that converts one form of energy to another, and classifies transducers based on their principles and whether they are active, passive, primary or secondary. LVDTs are introduced as the most widely used inductive transducer to convert linear motion to an electrical signal. The document proceeds to describe the construction, operating principle, and advantages/disadvantages of LVDTs, and concludes by outlining their applications in measuring small displacements.
This document provides an overview of steganography. It discusses how steganography hides messages within carriers so that the message is concealed. The document then discusses the history of steganography dating back to ancient Greece. It also discusses modern uses of steganography during the Cold War and by terrorist groups. The document outlines the objectives of the study which are to provide security during message transmission. It then discusses steganography techniques like the LSB algorithm and provides snapshots of its implementation. Finally, it discusses the results of using LSB steganography and concludes with possibilities for further enhancement.
This project aims to develop a smart system to identify stolen cars at checkpoints using radio frequency identification (RFID) technology. The system involves issuing each car a unique identification code stored on a silicon chip installed under the vehicle. When a car passes a checkpoint, a passive RFID reader will generate a 125 kHz frequency to read the chip's ID code. If the code is not in the system's database, the car would be identified as stolen. The key components used are an RFID reader, microcontroller, LCD display, LEDs, and EEPROM memory. The system works by encoding each car's unique ID number and storing it on an RFID tag installed on the car.
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
The document proposes an examination room guidance system using RFID technology, where each student is issued an RFID card containing their exam details. The system includes an RFID reader, tags, Arduino, LCD display and LEDs, such that when a student's tag is scanned their exam room and seat number will be displayed to guide them to the correct location. The proposed system aims to help students easily find their exam rooms and seats, reducing stress and saving time compared to traditional jumbling systems.
Diapositivas presentado para el grado de Magister en Ciencias de la Computacion en University of Queensland.
Titulo de la Tesis: A RFID Collision Avoidance Framework based on SDR
The SKM53 is an ultra high sensitivity GPS module with embedded antenna that provides high performance navigation with solid fix capabilities. It has features such as ultra high sensitivity of -165dBm, 22 tracking channels, NMEA protocols, and a tiny form factor. The module requires a 5V power supply, supports UART communication at 9600 baud by default, and uses the NMEA 0183 protocol for data output. It can be used with an Arduino board.
The SKM53 is an ultra high sensitivity GPS module with embedded antenna that provides high performance navigation with solid fix capabilities. It has features such as ultra high sensitivity of -165dBm, 22 tracking channels, NMEA protocols, and a tiny form factor. The module requires a 5V power supply, supports UART communication at 9600 baud by default, and uses the NMEA 0183 protocol for data output. It can be used with an Arduino board.
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
The document describes the design of a compliant passive digital block for a read-only RFID tag. Key aspects include:
1) An asynchronous counter is used to generate timing signals for the digital block and derive the subcarrier frequency signals. This minimizes clock activity and reduces power consumption compared to a synchronous design.
2) A 4x16 decoder addresses a 128-bit NOR ROM memory to fetch the stored electronic product code.
3) An 8x1 multiplexer sequences the parallel memory output into a serial data stream for transmission. Selection lines are derived from the asynchronous counter.
4) Data is encoded using Manchester coding before modulation and transmission back to the reader, in compliance with ISO 144
Research Inventy: International Journal of Engineering and Scienceresearchinventy
The document describes the design of a compliant passive digital block for a read-only RFID tag. Key aspects include:
1) An asynchronous counter is used to generate timing signals for the digital block and derive the subcarrier frequency signals. This minimizes clock activity and reduces power consumption compared to a synchronous design.
2) A 4x16 decoder addresses a 128-bit NOR ROM memory to fetch the stored electronic product code.
3) An 8x1 multiplexer sequences the parallel memory output into a serial data stream for transmission. Selection lines are derived from the asynchronous counter.
4) Data is encoded using Manchester coding before modulation and transmission back to the reader, in compliance with ISO 144
Sourcefire Vulnerability Research Team Labslosalamos
Today's client side attack threats represent a boon for the attacker in ways to obfuscate, evade, and hide their attacks methods. Adobe PDF, Flash, Microsoft Office documents, and Javascript require a very deep understanding of the file format, how its interpreted in the Browser, and understanding of the byte code paths that some of these formats can generate. To effectively handle some of these types of attacks it requires processing of these files multiple times to deal with compression, obfuscation, program execution, etc. This requires a new type of system to handle this type of inspection. The NRT system allows for this deep file format understanding and inspection.
Gateway Business Solutions, A Solution provider in Telecom, Access Control, Time Attendance, Digital Security and Surviellance and Office automation. Pioneers in VOIP solutions like IP PBX, CALL CENTRE SOLUTIONS etc.
Description
Gateway Business Solution is a Distributor to M/S Matrix Comsec Pvt Ltd, for their Range of Telecom and Security Products and solutions. MATRIX Analog, Digital and IP Pbx solutions and Security products such as Door Access and Time Attendance Products (Proximity and Biometric)
Gateway is also Channel Partner for M/s Intellicon Pvt Ltd for their range of Telecom Products. Transtel, Karel, NEC IP EPABX systems and Radvision and Lifesize Video Conferencing Solutions.
Gateway is also a pioneer in offering VOIP solutions ranging from Soft IP PBX, Call Centre Solutions, Automatic Voice Campaigner etc.
Contact :
Gateway Business Solutions
2nd Flr, Sai Krupa, 33 Durga Nagar Colony
Punjagutta
Hyderabad 500 082
Ph: 93978 20222
This document summarizes a seminar presentation on currency note detection using RFID tags. It discusses the need to secure currency from counterfeiting and the goals of designing an electronic system to detect notes using RFID technology. It describes how RFID tags work and memory capabilities. The proposed design uses a microcontroller programmed with Keil software to read RFID tags and detect genuine notes via a stored database. Potential applications discussed include embedding RFID in currency, passports, and tracking school items and library materials.
This document provides an overview of radio frequency identification (RFID) concepts, components, and applications. It discusses RFID tags, readers, and middleware. Key applications of RFID include supply chain management, logistics, and retail. The document also covers Electronic Product Codes (EPC), which provide a unique identifier for RFID tags. EPCs follow a standardized format and can be used to track items throughout the supply chain. RFID middleware filters and routes RFID data to various applications and systems.
The ANPR (Automatic Number Plate Recognition) using ALR (Automatic line
Tracking Robot) is a system designed to help in recognition of number plates of vehicles.
This system is designed for the purpose of the security and it is a security system.
For more details
http://projectsofashok.blogspot.com/2010/04/anprautomatic-number-plate-recognition.html
This document describes an RFID system project that uses an Arduino Uno, ATmega 328p microcontroller, EM-18 RFID reader module, passive RFID tags, real-time clock, and 16x2 LCD. It explains the hardware and software components, including how the RFID reader detects tags and the microcontroller registers entries and exits to the LCD display. Key aspects of RFID technology like tags, readers, and middleware are also overviewed at a high level.
This document provides an outline and overview of key concepts related to radio frequency identification (RFID) systems for manufacturing and logistics applications. It begins with definitions of RFID terminology including tags, readers, air interfaces, and modulation techniques. It then covers technical characteristics such as frequency ranges and reading ranges. Common applications are also discussed, including mandates from the US Department of Defense and Walmart for their suppliers to implement RFID tracking.
The document discusses the Chinese Revolution of 1949, including the Qing Dynasty, the government of the Republic of China, the Long March, the Second Sino-Japanese War, the civil war in 1947-1948, and how the actual revolution occurred in 1949 where the Communist Party took control of mainland China.
UHF RFID tags called Magicstraps can be embedded directly into printed circuit boards. Magicstraps are rewritable RFID chips with an integrated antenna matching circuit, allowing them to be used as-is on PCBs without additional antenna components. Embedding Magicstraps turns PCBs into smart, traceable products with RFID capabilities. This allows applications like anti-counterfeiting, inventory management and predictive maintenance across the entire supply chain.
The LVDT consists of a primary winding in the center of a former surrounded by two secondary windings. It works on the principle of mutual induction to convert displacement, a non-electrical energy, into an electrical output. When the soft iron core inside is in the null position, equal voltages are induced in the two secondary windings, resulting in a differential output voltage of 0. If the core moves left or right, the flux linking one secondary increases while the other decreases, producing a differential voltage. The LVDT has a linear output characteristic for small displacements but becomes non-linear at larger displacements. It is used to measure various parameters like force, weight, pressure, and displacements in applications such as soil testing
The document provides details about a project report on security extensibility in steganography. It discusses existing steganography techniques like the Least Significant Bit (LSB) algorithm and their drawbacks. It proposes developing a new Security Extensibility Algorithm (SRM algorithm) to provide better security for steganography compared to the LSB algorithm. The SRM algorithm would be used for steganography, cryptography, password authentication, and digital watermarking. The report outlines the system analysis, design, and testing of the proposed SRM algorithms to enhance security when embedding secret messages within digital files.
The strain gauge is a passive resistive transducer that converts mechanical forces into a change in electrical resistance. There are different types of strain gauges including wire gauges, foil gauges, and semiconductor gauges. Wire gauges can be unbonded or bonded to measure strain, while foil gauges consist of a grid of fine resistance wires bonded to a carrier material. Semiconductor gauges use materials like silicon and germanium that change resistance due to their piezoresistive effect when strained.
This document discusses transducers and the linear variable differential transformer (LVDT). It defines a transducer as a device that converts one form of energy to another, and classifies transducers based on their principles and whether they are active, passive, primary or secondary. LVDTs are introduced as the most widely used inductive transducer to convert linear motion to an electrical signal. The document proceeds to describe the construction, operating principle, and advantages/disadvantages of LVDTs, and concludes by outlining their applications in measuring small displacements.
This document provides an overview of steganography. It discusses how steganography hides messages within carriers so that the message is concealed. The document then discusses the history of steganography dating back to ancient Greece. It also discusses modern uses of steganography during the Cold War and by terrorist groups. The document outlines the objectives of the study which are to provide security during message transmission. It then discusses steganography techniques like the LSB algorithm and provides snapshots of its implementation. Finally, it discusses the results of using LSB steganography and concludes with possibilities for further enhancement.
This project aims to develop a smart system to identify stolen cars at checkpoints using radio frequency identification (RFID) technology. The system involves issuing each car a unique identification code stored on a silicon chip installed under the vehicle. When a car passes a checkpoint, a passive RFID reader will generate a 125 kHz frequency to read the chip's ID code. If the code is not in the system's database, the car would be identified as stolen. The key components used are an RFID reader, microcontroller, LCD display, LEDs, and EEPROM memory. The system works by encoding each car's unique ID number and storing it on an RFID tag installed on the car.
IRJET- Examination Room Guidance System using RFID and ArduinoIRJET Journal
The document proposes an examination room guidance system using RFID technology, where each student is issued an RFID card containing their exam details. The system includes an RFID reader, tags, Arduino, LCD display and LEDs, such that when a student's tag is scanned their exam room and seat number will be displayed to guide them to the correct location. The proposed system aims to help students easily find their exam rooms and seats, reducing stress and saving time compared to traditional jumbling systems.
Diapositivas presentado para el grado de Magister en Ciencias de la Computacion en University of Queensland.
Titulo de la Tesis: A RFID Collision Avoidance Framework based on SDR
The SKM53 is an ultra high sensitivity GPS module with embedded antenna that provides high performance navigation with solid fix capabilities. It has features such as ultra high sensitivity of -165dBm, 22 tracking channels, NMEA protocols, and a tiny form factor. The module requires a 5V power supply, supports UART communication at 9600 baud by default, and uses the NMEA 0183 protocol for data output. It can be used with an Arduino board.
The SKM53 is an ultra high sensitivity GPS module with embedded antenna that provides high performance navigation with solid fix capabilities. It has features such as ultra high sensitivity of -165dBm, 22 tracking channels, NMEA protocols, and a tiny form factor. The module requires a 5V power supply, supports UART communication at 9600 baud by default, and uses the NMEA 0183 protocol for data output. It can be used with an Arduino board.
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
The document describes the design of a compliant passive digital block for a read-only RFID tag. Key aspects include:
1) An asynchronous counter is used to generate timing signals for the digital block and derive the subcarrier frequency signals. This minimizes clock activity and reduces power consumption compared to a synchronous design.
2) A 4x16 decoder addresses a 128-bit NOR ROM memory to fetch the stored electronic product code.
3) An 8x1 multiplexer sequences the parallel memory output into a serial data stream for transmission. Selection lines are derived from the asynchronous counter.
4) Data is encoded using Manchester coding before modulation and transmission back to the reader, in compliance with ISO 144
Research Inventy: International Journal of Engineering and Scienceresearchinventy
The document describes the design of a compliant passive digital block for a read-only RFID tag. Key aspects include:
1) An asynchronous counter is used to generate timing signals for the digital block and derive the subcarrier frequency signals. This minimizes clock activity and reduces power consumption compared to a synchronous design.
2) A 4x16 decoder addresses a 128-bit NOR ROM memory to fetch the stored electronic product code.
3) An 8x1 multiplexer sequences the parallel memory output into a serial data stream for transmission. Selection lines are derived from the asynchronous counter.
4) Data is encoded using Manchester coding before modulation and transmission back to the reader, in compliance with ISO 144
Sourcefire Vulnerability Research Team Labslosalamos
Today's client side attack threats represent a boon for the attacker in ways to obfuscate, evade, and hide their attacks methods. Adobe PDF, Flash, Microsoft Office documents, and Javascript require a very deep understanding of the file format, how its interpreted in the Browser, and understanding of the byte code paths that some of these formats can generate. To effectively handle some of these types of attacks it requires processing of these files multiple times to deal with compression, obfuscation, program execution, etc. This requires a new type of system to handle this type of inspection. The NRT system allows for this deep file format understanding and inspection.
Gateway Business Solutions, A Solution provider in Telecom, Access Control, Time Attendance, Digital Security and Surviellance and Office automation. Pioneers in VOIP solutions like IP PBX, CALL CENTRE SOLUTIONS etc.
Description
Gateway Business Solution is a Distributor to M/S Matrix Comsec Pvt Ltd, for their Range of Telecom and Security Products and solutions. MATRIX Analog, Digital and IP Pbx solutions and Security products such as Door Access and Time Attendance Products (Proximity and Biometric)
Gateway is also Channel Partner for M/s Intellicon Pvt Ltd for their range of Telecom Products. Transtel, Karel, NEC IP EPABX systems and Radvision and Lifesize Video Conferencing Solutions.
Gateway is also a pioneer in offering VOIP solutions ranging from Soft IP PBX, Call Centre Solutions, Automatic Voice Campaigner etc.
Contact :
Gateway Business Solutions
2nd Flr, Sai Krupa, 33 Durga Nagar Colony
Punjagutta
Hyderabad 500 082
Ph: 93978 20222
This document summarizes a seminar presentation on currency note detection using RFID tags. It discusses the need to secure currency from counterfeiting and the goals of designing an electronic system to detect notes using RFID technology. It describes how RFID tags work and memory capabilities. The proposed design uses a microcontroller programmed with Keil software to read RFID tags and detect genuine notes via a stored database. Potential applications discussed include embedding RFID in currency, passports, and tracking school items and library materials.
This document provides an overview of radio frequency identification (RFID) concepts, components, and applications. It discusses RFID tags, readers, and middleware. Key applications of RFID include supply chain management, logistics, and retail. The document also covers Electronic Product Codes (EPC), which provide a unique identifier for RFID tags. EPCs follow a standardized format and can be used to track items throughout the supply chain. RFID middleware filters and routes RFID data to various applications and systems.
The ANPR (Automatic Number Plate Recognition) using ALR (Automatic line
Tracking Robot) is a system designed to help in recognition of number plates of vehicles.
This system is designed for the purpose of the security and it is a security system.
For more details
http://projectsofashok.blogspot.com/2010/04/anprautomatic-number-plate-recognition.html
This document describes an RFID system project that uses an Arduino Uno, ATmega 328p microcontroller, EM-18 RFID reader module, passive RFID tags, real-time clock, and 16x2 LCD. It explains the hardware and software components, including how the RFID reader detects tags and the microcontroller registers entries and exits to the LCD display. Key aspects of RFID technology like tags, readers, and middleware are also overviewed at a high level.
The document is a project report for an automatic strong security system called "SMART VAULT" that provides 24/7 access to lockers. It uses robotic technology and three layers of security - biometric fingerprint authentication, RFID card authentication, and a 4-digit PIN - to allow customers to access their lockers privately at any time without human intervention through an automated carousel system. The system was designed to provide strong security while allowing convenient access for users.
This document describes a proposed true random number generator circuit for RFID tags. The circuit uses a simple operational amplifier with positive feedback configured as a Schmitt trigger. In the absence of an input signal, the output will be randomly set to either the positive or negative saturated output level depending on the polarity of the differential input thermal noise voltage from resistors at the input. This causes the output bit pattern to be random. Results show the output passes the NIST randomness tests without further processing. The simple circuit can be implemented on existing RFID tag platforms like MSP430 microcontrollers and meets requirements for being lightweight, robust to thermal and power attacks, and not requiring a seed value or continuous operation.
This presentation proposes a remote biometric authentication system using video-object steganography over wireless networks. It uses principal component analysis (PCA) and discrete wavelet transform (DWT) to encrypt biometric signals, hide them in video objects, and transmit them securely. The encrypted biometric signals are inserted into the most significant wavelet coefficients of video objects during transmission. At the receiver end, fingerprint matching is used to authenticate users by extracting and decrypting the biometric signals from the video objects. The system aims to provide secure remote authentication using natural biometrics while maintaining efficiency and resistance against data loss during wireless transmission.
RFID based Access Control using 8051 Micro ControllerCircuitsToday
This document describes an RFID based access control system using an 8051 microcontroller. The system uses an RFID reader and tags to identify authorized users and grant access by controlling a relay if their RFID code matches stored codes. An LCD displays status messages. The system provides security for organizations by only allowing access to people with valid RFID tags. It can be enhanced with GSM to notify of access attempts and expanded for attendance tracking.
This document describes an RTOS based security system using multiple authentication methods like fingerprint, RFID, and password. It uses two ARM boards - one with the authentication modules and another with sensors. If the person is authorized after authentication, the second board and sensors are disabled via SPI communication. It aims to provide secure access to confidential areas using technologies like RFID, fingerprint, keyboard, and sensors for humidity, motion, weight. The system is programmed using the uCOS-II RTOS on the LPC1768 microcontroller and communication between boards occurs through SPI.
Similar to Tamper Detection & Discrimination in Passive RFID Systems using Steganography (20)
Tamper Detection & Discrimination in Passive RFID Systems using Steganography
1. Tamper Detection & Discrimination
in Passive RFID Systems using
Steganography
By,
Giridhar R
Mahadevan SM
Manishgant A P
Under the guidance
of
Dr.E.Janardhanan
2. Objective
• To develop an algorithm to detect and discriminate tampered RFID data.
• To scale the algorithm in such a way as to require fewer arithmetic
operations and memory overhead
• To implement the same on a low cost hardware interfaced to the RFID
reader.
3. Motivation
• Unlike other types of IT systems where the data is stored in a physically
secure location such as a data server in a server room, RFID systems store
some of its sensitive data on the RFID tag itself, which is in turn affixed to
physical objects that travel along the supply chain.
• This means that’s its relatively easy for potential attackers to gain physical
access to the RFID tags and mount an attack.
• As physical access to the tags grant direct access to the memory area of
the RFID tag, attackers who successfully gain physical access can then
alter data easily on the tag
• These attackers can also carry out those attacks a lot more easily as they
can easily circumvent any security measures put in place by security
protocols to protect against remote access attacks.
4. General Passive RFID Memory banks
• The Header, is fully used for identifying the EAN.UCC key and the
partitioning scheme
• The EPC Manager, is used to identify the manufacturer uniquely.
• The Object Class, is used to identify the product manufactured by the
manufacturer
• The Serial Number, which is the last partition, is used to uniquely identify
an item, which belongs to a particular Object Class
5. Literature Survey
Paper Title Content
Recovering and Restoring
Tampered RFID Data
using Steganographic
Principles
A theoretical approach to embed secret
pattern inside RFID Serial Number
Partition to recover tampered data in
Object Class.
A Watermarking Based
Tamper Detection Solution
for RFID Tags
Embedding a watermark in RFID to
detect tampering on any of the data
fields of the tag.
Tamper Discrimination in
RFID tags using Chaotic
Watermarking
Original Chaotic Watermarking is
applied to RFID tags. This provides for
Tamper detection as well as
discrimination.
6. Disadvantages of Existing Methods
METHOD DISADVANTAGE
Tamper Detection
in RFID Tags using Fragile
Watermarking
• Provides only for detection of
tamper overall and does not
specify where the tamper has
occurred.
A Watermarking Based
Tamper Detection Solution for
RFID Tags
• This method provides for
identifying the area of attack, but
does not delve upon recovery.
• Uses reserved Kill Bit field for
storage.
Tamper detection in
ubiquitous RFID Supply
Chains
• Only a Generic function
described to generate pattern.
7. Our Approach
• The “Object Class” (24 bits) is used to uniquely identify one
product. if product A (Orange) has cheaper transportation
cost compared to product
• B (Mango), the attacker might attempt to change OC of
product B, to gain an economic benefit.
• However if the attacker changes the serial number (SN),
which is used to identify one item of a specific product,
he/she cannot gain any economic benefit,
8. EPC C1G2 Data Structure
• Electronic Product Code (EPC) was first developed by Auto-ID
Center in MIT in 1999.
• This centre developed the initial RFID standard and later
transferred to EPCGlobal for commercialization in late 2003.
• Two data structures were designed by EPC,
– 64 bit EPC was designed primarily for testing and
– 96 bit EPC were designed for commercialization.
10. Principles of Chaotic Systems
• Chaotic theory has been established since 1970s from many different
research areas, such as physics, mathematics, biology and chemistry, etc.
• The most well-known characteristics of chaos are the so-called “butterfly-
effect” (the sensitivity to the initial condition), and the pseudo-
randomness generated by deterministic equations.
• A chaotic dynamical system is an unpredictable, deterministic and
uncorrelated system that exhibits noise-like behavior through its sensitive
dependence on its initial conditions which generates sequences similar to
PN sequence.
• The chaotic dynamics have been successfully employed to various
engineering applications such as automatic control, signals processing and
watermarking.
11. Principles of Chaotic Systems
• Chaotic systems can be applied to any of the number systems.
• Chaotic sequences can range from few bits to few thousand
bits, based on the equation and the number of iterations.
• This dynamic range of the sequences is beneficial in RFID
systems, where the memory on the tag is a huge constraint.
• Watermark generated using chaotic sequences can be used in
such cases.
12. Block Diagram
Generate Secret
Pattern
Embed pattern in
[SN] using Chaotic
watermarking
Also Chaotically
embed OC data
across several
tags.
Chaotically arrange
select bits in [SN]
in reserved
Tampering occurs
Extracted pattern
is compared at
receiver side for a
match
The variation in
watermark will
indicate the field of
attack
13. Basic approach
• The embedding algorithm begins by selecting a set of one way
functions F {f1, f2, f3}.
• Each one way function is applied to the values within the RFID
tags partition to generate a secret value as shown
14. Basic approach
• This secret value is then embedded at predefined location
within the Serial Number partition by appending it to the
original Serial Number Value (SNorg) to generate the
appended Serial Number (SNapp).
15. Generating the Watermark
• STEP 1 – Two different chaotic sequences (as given below)
are taken as the keys for encryption
𝑍 𝑛+1 = 𝜇𝑍 𝑛(1 − 𝑍 𝑛) - (1)
𝑆 𝑛 = 1 + 0.3 × 𝑆 𝑛−2 − 1.08 + 379𝑆 𝑛−1
2
+ 1001 × 𝑍 𝑛
2
𝑚𝑜𝑑 3 –
(2)
Where,
n = 1,2,3… map iteration index
𝜇= system parameter (3.57< 𝜇<4)
𝑍 𝑛 and 𝑆 𝑛 are chaotic sequences with initial values
(0 < 𝑍1< 1) and (-1.5< 𝑆0, 𝑆1 <1.5)
16. Generation(Contd..)
• STEP 2 – Map 8 bits of Header, anterior 14 bits of EM,
latter 14 bits of EM, anterior 12 bits of OC, latter
12 bits of OC as decimal fractions, d1,d2,d3,d4,
d5 respectively. If b7b6b5b4b3b2b1b0 is the header
𝑑1 = 𝑏7 × 2−1
+ 𝑏6 × 2−2
+ ⋯ + 𝑏0 × 2−8
• STEP 3 – For the length of Header is 8 bits, when Header is
tampered, d1 is variational.
17. Generation (Contd..)
STEP 4 - Use d1 as the initial value of (1) will generate various chaotic
sequences.
STEP 5 - The sequence is converted to binary and any 2 bits from it is
designated as W1
STEP 6 - The EM is divided into two parts and each part is mapped into
two decimal fractions d2 and d3.
STEP 7 - Since the length of each part is 14 bits, when each part is
tampered, d2 and d3 will be variational.
18. Generation (Contd…)
STEP 8 – d2 and d3 are used as initial condition for (1) and (2)
respectively and any 5 bits from the obtained binary
sequence is taken as W2
STEP 9 – Similar method described above is used to generate
watermark W3 for OC
STEP 10 – Connect W1,W2 and W3 to form final watermark Wf
19. Embedding and Detection
STEP 1 – Chaotic scheme is again used to determine 12 positions
inside the 36 bit SN field and the 12 bits are embedded in
the respective positions.
STEP 2 – Chaotic watermark algorithm discussed previously is used to
generate the watermark Wg at the reader side. The
watermark Wf is compared.
• If they are same, then no data tamper is observed;
• If anterior 2 bits are different, then Header in RFID tags is tampered
• If middle 5 bits are different, then EM in RFID tags is tampered
• If latter 5 bits are different, then OC in RFID tags is tampered.
20. Watermark Generation
Header EPC Manager Object Class
Serial
Number
CCS CCS CCS
+
Watermark
Header EPC Manager Object Class
Serial
Number
21. Embedding Process
Header EPC Manager Object Class
Serial
Number
Attack
Header EPC Manager Object Class
Serial
Number
CCS CCS CCS
+
Watermark
Extracted
Watermark
Match
?
Tamper!
25. Hardware Description of Components
• The choice of the microcontroller is the Atmel ATMega89S52 8 bit
controller.
• The AT89S52 is a low-power, high-performance CMOS 8-bit
microcontroller with 8K bytes of in-system programmable Flash
memory.
• The device is compatible with the industry-standard 80C51
instruction set and pinout. The on-chip Flash allows the program
memory to be reprogrammed in-system or by a conventional
nonvolatile memory programmer.
26. AT89S52 Properties
• 8K bytes of Flash,
• 256 bytes of RAM,
• 32 I/O lines,
• Watchdog timer,
• 2 data pointers,
• Three 16-bit timer/counters,
• A six-vector two-level interrupt architecture,
• A full duplex serial port,
• On-chip oscillator and clock circuitry.
28. RFID Reader/Writer
• HY502 series of RFID reader/writer modules are based on non-
contact card reader ASCI chip compatible with ISO14443 standard.
• It uses 600nm CMOS EEPROM technology, supports ISO14443
typeA protocol, and also supports the MIFARE standard encryption
algorithm.
• HY502 series supports Mifare One S50, S70, Ultra Light & Mifare
Pro, FM11RF08 and other compatible cards.
30. RFID Tags
• The MIFARE Classic 1K offers 1024 bytes of data storage, split into
16 sectors.
• It has namely 3 major blocks, the RF section for transmitting and
receiving data. The EEPROM memory is for storage and a DCU is
present for authentication and control.
• They can be programmed for operations like reading, writing,
increasing value blocks, etc.
• The cards are contactless and operate at 13.56 MHz
32. Interfacing
• Interfacing of the RFID Reader/Writer with the Microcontroller is
done using the MAX232 IC.
• The MAX232 is an integrated circuit that converts signals from an
RS-232 serial port to signals suitable for use in TTL compatible
digital logic circuits.
• The MAX232 is a dual driver/receiver and typically converts the RX,
TX, CTS and RTS signals.
35. Keil IDE
• Keil C51 development environment is used for developing
applications on the 8051 microcontroller architecture.
• Keil has tools to directly compile the source code (both in C and in
assembly) into the standard Intel .hex format.
• The tools also have the facility to directly burn the code onto the
controller using a non-volatile programmer.
37. ProgISP
• ProgISP is a Flash/EEPROM burner software designed specifically
for writing the Intel Hex files into the 8051 family of
Microcontrollers designed by Atmel
• There are various functions available to erase and program the chip
as desired
• There are also the standard debug utilities to verify the chip I/O and
also verify and lock the program inside the IC
39. Results
• The hardware is tested real time by using two RFID read/write
cards which can be written and read many times over.
• The system is initialized and made to run the algorithm and write
the watermark onto the card.
• After the writing part, the algorithm checks for the authenticity of
the watermark and displays the output accordingly on the LCD
display.
43. Conclusions
• The proposed algorithm aims to address the security fault in RFID in
2 ways.
• The algorithm gives a fool proof way to detect tamper in the
passive RFID cards.
• The algorithm effectively runs on a low cost hardware so that it can
be employed along with the reader/writer for portable security.
44. References
[1] M. I. Youssef, M. Zahara, A. E. Emam, and M. Abd ElGhany;
Chaotic Sequences Implementations on Residue Number Spread
Spectrum System; International Journal Of Communications, Issue 2,
Volume 2, 2008
[2] Noman, Curran, Lunney; Watermarking Based Tamper Detection
for RFID tags; IIH-MSP Sixth International Conference 2011.
[3] Mohan, M.; Potdar, V.; Chang, E.; Recovering and Restoring
Tampered RFID Data Using Steganographic Principles;IEEE
International Conference On Industrial Technology (ICIT) 2006
45. References
[4] Bogdan Cristea ; Statistical Properties of Chaotic Binary Sequences ;
IEEE Transactions on Information Theory ; 2008
[5] Harinda Fernando and Jemal Abawajy ; A Taxonomy of Security in Very
Large Scale Networked RFID Systems; Deakin’s University; 2009
[6] Government of Honkong Special Administrative Region ; RFID Security;
2008
[7] Kirk Wong, Patrick Hui, Allan Chan, “Cryptography and authentication on
RFID passive tags for apparel products,” Computers in Industry, 2006.
46. References
[8] Stephen Weis, Sanjay Sarma, Ronald Rivest, et al, “Security and privacy
aspects of low-cost radio frequency identification systems”
[9]D.Molnar and D. Wagner, “Privacy and security in library RFID: Issues,
practices, and architectures” In Conference on Computer and Communications
Security – CCS, ACM Press, 2004 pp. 210-219
[10]S. A. Weis, S. E. Sarma, R. L. Rivest, D. W. Engels, “Security and
Privacy Aspects of Low-cost Radio Frequency Identification Systems”, in D.
Hutter et al. Edn. Security in Pervasive Computing 2003, LNCS 2802, pp.
201-212, 2004