Preview

Network Security Protocol with Rfid System

Powerful Essays
Open Document
Open Document
1385 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security Protocol with Rfid System
NETWORK SECURITY WITH RFID SYSTEM AND CRYPTOGRAPHY

ABSTRACT:

Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding the original messages for transmission. On the other side The RFID technology recently has gained enormous attention in various field like in database maintenances(in the library management system), media, industry and as well as in network security. In the Radio frequency identification (RFID) use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person (user) for the purpose of identification and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system.

This paper will describe about the brief introduction of the old and dynamic method employed for network security that is cryptography. Cryptographic technique is widely applicable in network security field but still we are suffering from hacking and unauthorized access. Hence we have introduced a new idea for being applicable in security field that is RFID technique. Here we will describe its various applications in various fields and how it can be implemented in network security. The security and privacy issues of RFID and their solutions will also be discussed. And the future possible ideas for the new technologies like PPTN (point to point tunneling protocol) and VPN (virtual private network) with their applications in network security will also be discussed.

INTRODUCTION:

In present scenario the no. of subscriber with wireless access of internet through laptop, personal



References: (1) APPLIED CRYPTOGRAPHY AND DATA SECURITY -- Prof. Christof Paar (2) WWW.GOOGLE .COM (3) CRYPTOGRAPHY IN NETWORK SECURITY -- William Stallings

You May Also Find These Documents Helpful

  • Powerful Essays

    Dexit is a new electronic payment system that designs for low-value transactions. Based on Radio Frequency Identification (RFID) technology, customers can use a small electronic tag to pay for goods and services without entering password on a specialized reader at the retail stores, which is obviously faster than any other payment methods, such as cash, debit cards and credit cards. With this high reliable and convenient payment system, customers can save much time on waiting queues and eliminate the troubles for carrying loose coins and exact change for small-money purchases. In addition, merchants will also benefit a lot from Dexit to increase their revenues by improving cashier efficiency, decreasing the cash-handing costs, reducing cash counting and depositing charges, as well as avoiding the bothers on checking for counterfeit money.…

    • 3130 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    MGT 420 Midterm Exam

    • 1644 Words
    • 7 Pages

    Asset tracking software equipped with RFID hardware can give the convenience of tracking and identifying your assets uniquely in real time. When it is combined with suitable sensors and bar code scanners, it can be applied in various industrial tracking applications in order to produce and send alarms when there are any movements or disturbances on the asset or just maintain inventory.…

    • 1644 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    RFID cloners, cryptography and Bayesian Math, is something Cory Doctorow knows well. The author this book is a , speaker, teacher, writer of novels and short stories and editor of a…

    • 484 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    References: Banks, J. (2008). Understanding RFID Part 9: RFID privacy and security. Retrieved from http://www.rfidnews.org/2008/05/30/understanding-rfid-part-9-rfid-privacy-and-security…

    • 1390 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    E- Commerce

    • 881 Words
    • 4 Pages

    RFI, radio frequency identification and smart card device are tracking device combined with biometric technologies, such as retina scanners, finger print readers, to track more items and people in many different situation. These technologies are combined with each other and with communication systems that enable companies to communicate and share information with other such as customer demands, consumer behavior, inventory level and etc.…

    • 881 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Bp Case Study

    • 1496 Words
    • 6 Pages

    May be one of the most widespread usage at wal-mart, Tesco, Metro, etc... Companies like Wal-Mart even influencing/imposing the adoption of this technology to their partners for better supply chain tracking!…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Project Sneaky Analysis

    • 215 Words
    • 1 Page

    The nature of the opportunity is to spread awareness of existing devices that can steal information causing identify theft, bankruptcy, and many more malicious activities to harm society. Technology can harm society due to the unawareness of the capabilities of new devices being created. New devices are created every day and the vulnerabilities are not yet known until a hacker or a malicious person attempts to test them. Radio-frequency Identification (RFID) scanners are made to make smart chips easier to read and reduce time in process that takes time to go over documents. Project Sneaky takes that life simplicity and shows the vulnerabilities within RFID scanning process throughout the technological world.…

    • 215 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    D. THREATS * Funding * Price Wars * Taxation * Low economy * Low demand…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Radio Frequency Identification is the process of identifying a person or an object or a thing using the RF-transmitted identification code. Over the years, the technology has played a vital role in improving the efficiency and effectiveness of health care systems. Today the health care systems are using a wide range of RFID applications to enhance the overall performance of their industry. A few applications include; RFID tracking system, RFID bracelets, RFID under the skin, RFID for patient management system and RFID for resource management system (Banks, 2007).…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    waste disposal

    • 7404 Words
    • 24 Pages

    Wireless technology can now be seen almost everywhere. This technology has recently become very popular, and with the convenience that comes with its use, it will probably be the most commonly used technology among computer networks in the near future. Unfortunately, new technology is always under fire when it comes to security, which is a topic that has now become more imperative and indispensable when dealing with transferring and storing sensitive computer information. The realm of wireless technology is still new, and as it becomes more common among many types of computer networks, hackers or intruders will find more ways to intrude a wireless system. We will discuss why wireless networks are vulnerable to such intrusions. While the number of vulnerabilities and risks continue to rise, security engineers have attempted to slow and hope to eventually halt the many types of wireless network intrusions. A wireless network Intrusion Detection system (IDS) is a system for detecting such intrusions. Because of the multitude of methods of intrusions, there are several reasons why IDS is essential to any network, both wired and wireless. While the wireless IDS technology is new, we need to find out its capabilities and how it can help in providing a robust level of security for wireless networks. Additionally, we need to know what types of IDS are available and the drawbacks that come with using a wireless IDS.…

    • 7404 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    In this chapter introduction of the CREDIT CARD SECURITY SYSTEM USING GSM are discussed. It gives overall view of the project design and the related literature and the environment to be considered. Chapter wise organization discuss the main processing done using LPC 2148 microcontroller and then what is the process that can be automated which is within the scope of the work. Then we discuss the implementation aspects.…

    • 16993 Words
    • 68 Pages
    Powerful Essays
  • Powerful Essays

    RFID (Radio Frequency Identification) and BIT-COINS technologies are regarded as the most prestigious payment system technologies of today due to their various responsibilities of tracking and making legitimate payments. The main focus of this article is to make the thorough investigation on the birth, development and evolution of BIT-COINS and RFID technologies regarding the following issues which might arise when using these technologies. This issue includes: How the payment system works, Payment system cost, Security of the payment system, Regulations and Independence.…

    • 1331 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Rfid Tags

    • 1620 Words
    • 7 Pages

    Swedberg, C. (2003, February 5). Retrieved from http://www.rfidjournal.com/article/view/10391 Wolff, J. A. (2001). Rfid tags – an intelligent bar code replacement. Retrieved from ftp://ftp.software.ibm.com/software/pervasive/info/tech/gsoee200.pdf…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Radio Frequency Identification devices or further known throughout this paper RFID were first developed in 1945 by a Russian named Léon Theremin who was a Russian spy. This makes perfect sense that Theremin used his first RFID type devices a Russian spy tool, though his first RFID devices also included audio and were used for ease dropping as well as tracking. Since then RFID has stuck around and been developed for much milder uses. Basically what RFID is, “is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object” (Wiki). An RFID system that would be used for inventory purposes would consist of a tag made up of a microchip with an…

    • 3157 Words
    • 13 Pages
    Powerful Essays

Related Topics