As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome.
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
1. SBVLC: Secure Barcode-based Visible Light
Communication for Smart phones
ABSTRACT:
As an alternative to NFC technology, 2D barcodes have been increasingly used for
security-sensitive applications including payments and personal identification.
However, the security of barcode-based communication in mobile applications has
not been systematically studied. In this paper, we propose SBVLC - a secure
system for barcode-based visible light communication (VLC) between smart
phones. We formally analyze the security of SBVLC based on geometric models
and propose physical security enhancement mechanisms for barcode
communication by manipulating screen view angles and leveraging user-induced
motions. We then develop two secure data exchange schemes. These schemes are
useful in many security-sensitive mobile applications including private information
sharing, secure device pairing, and mobile payment. SBVLC is evaluated through
extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password
verification to overcome all the hacking issues. We have two modules as banker
and the user. In the user module there will be two categories they are shopping and
paying bill. In the shopping section user will shop the product and enter the card
and bank details and send request to the banker regarding the transaction purpose.
And in turn the banker module there are two categories they are the create OTP
and the send OTP details. The banker will check the details of the user request
regarding the purchase and all the card and balance details and prepare a password
in the form of QR code. The password will be I the form of QR code and will be
sent to the user through the mail service to the user personal mail id. In turn the
user will pay the bill by loading the QR from the mail and scanning. On scanning
2. the password will generate if the password matches with the banker details the
transaction will become successful. Thus password hacking, key logging and
eavesdropping issues will be overcome.
EXISTING SYSTEM:
Short-range communication technologies including near field communication
(NFC) and 2D barcodes have enabled many popular smart phone applications such
as contactless payments, mobile advertisements, and device pairing. Evolved from
the RFID technology, NFC can enable reliable low-power communication between
RF tags and readers. However, NFC requires additional hardware and has been
supported by only a few smart phone platforms on the market. Recent studies have
shown that NFC is subject to security vulnerabilities such as eavesdropping and
jamming. Moreover, most existing barcode applications are based on a single
barcode exchange, which is insufficient for establishing a secure communication
channel. Whenever a user types in her password in a bank’s sign in box, the key
logger intercepts the password. The threat of such key loggers is pervasive and can
be present both in personal computers and public kiosks; there are always cases
where it is necessary to perform financial transactions using a public computer
although the biggest concern is that a user’s password is likely to be stolen in these
computers. Even worse, key loggers, often root kitted, are hard to detect since they
will not show up in the task manager process list.
DISADVANTAGE:
NFC requires additional hardware and has been supported by only a few
smart phone platforms on the market.
3. NFC is subject to security vulnerabilities such as eavesdropping and
jamming.
The threat of such key loggers is pervasive and can be present both in
personal computers and public kiosks.
Even worse, key loggers, often root kitted, are hard to detect since they will
not show up in the task manager process list.
Lack of accuracy. It is very burden to Users.
PROPOSED SYSTEM:
Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration
rate in mobile applications. This is largely due to the extremely low barrier to
adoption – almost every camera-enabled smart phone can read and process 2D
barcodes. As an alternative to NFC, 2D barcodes have been increasingly used for
security-sensitive applications including mobile payments and personal
identification. For instance, PayPal recently rolled out a barcode-based payment
service for retail customers. As one of the most anticipated new features of I Phone
5, the Passbook App stores tickets, coupons, and gift/loyalty cards using barcodes.
Proposes an iterative Increment Constrained Least Squares filter method for certain
2D matrix bar codes within a Gaussian blurring ersatz. In particular, they use the
L-shaped finder pattern of their codes to estimate the standard deviation of the
Gaussian PSF, and then restore the image by successively implementing a bi-level
constraint, our approach to solving the problem is to introduce an intermediate
device that bridges a human user and a terminal. Then, instead of the user directly
invoking the regular authentication protocol, she invokes a more sophisticated but
user-friendly protocol via the intermediate helping device. Every interaction
between the user and an intermediate helping device is visualized using a Quick
Response (QR) code. The goal is to keep user-experience the same as in legacy
authentication methods as much as possible, while preventing key logging attacks.
4. ADVANTAGE:
Compared with NFC, 2D barcodes have enjoyed a significantly higher
penetration rate in mobile applications.
As an alternative to NFC, 2D barcodes have been increasingly used for
security-sensitive applications including mobile payments and personal
identification.
Every interaction between the user and an intermediate helping device is
visualized using a Quick Response (QR) code.
Preventing key logging attacks.
ARCHITECHTURAL DIAGRAM:
5. MODULES:
The SBVLC application consists of two modules .They are:
User.
Banker.
USER:
The User module consists of two categories. They are
Go for shopping.
Pay bill.
Go for shopping:
In the go for shopping, user can choose the product and to get the
password he/she has to enter the bank and card details. And has to send
the details to the banker the banker verify all the details and prepare
password for the user and send it to him through mail.
Pay bill:
In the pay bill, the user will scan the QR code sent by the banker and
gets the password and use that password to claim his purchase, if the
details matches with the banker details, the purchase will be successful.
BANKER:
The Banker module consists of two categories. They are
Create QR.
6. Send password as QR.
Create QR:
In the create QR code category the banker will check for purchase
request from the user and verify the user details and prepare a password
in the form of QR code to him through mail service.
Send password as QR:
In this send password category, the banker will send the QR code to the
user through mail service, where the QR code can get from the gallery
which is stored in the SD card by the create password category .The
banker will send the QR code as a attachment to the user. From where
the user can download and can scan it to get the password.
ALGORITHM AND TECHNIQUES:
7. SYSTEM SPECIFICATION:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 14’ Colour Monitor.
Mouse : Optical Mouse.
Ram : 512 Mb.
8. SOFTWARE REQUIREMENTS:
Operating system : Windows 7 Ultimate.
Coding Language : Java.
Front-End : Eclipse.
Data Base : SQLite Manger.
CONCLUSION:
As an alternative to NFC, 2D barcodes have been increasingly used for security-
sensitive applications including mobile payments and personal identification.
Compared with NFC, 2D barcodes have enjoyed a significantly higher penetration
rate in mobile applications. As an alternative to NFC, 2D barcodes have been
increasingly used for security-sensitive applications including mobile payments
and personal identification. Every interaction between the user and an intermediate
helping device is visualized using a Quick Response (QR) code. Preventing key
logging attacks. Thus in our project password hacking, key logging and
eavesdropping issues will be overcome.