424 resultados para RFID,


Relevância:

10.00% 10.00%

Publicador:

Resumo:

For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Remote drafting technology now available for sheep makes possible targeted supplementation of individuals within a grazing flock. This system was evaluated by using 68 Merino wethers grazing dry-season, native Mitchell grass pasture (predominantly Astrebla spp.) as a group and receiving access to lupin grain through a remote drafter 0, 1, 2, 4 or 7 days/week for 8 weeks. The sole paddock watering point was separately fenced and access was via a one-way flow gate. Sheep exited the watering point through a remote drafter operated by solar power and were drafted by radio frequency identification (RFID) tag, according to treatment, either back into the paddock or into a common supplement yard where lupins were provided ad libitum in a self-feeder. Sheep were drafted into the supplement yard on only their first time through the drafter during the prescribed 24-h period and exited the supplement yard via one-way flow gates in their own time. The remote drafter operated with a high accuracy, with only 2.1% incorrect drafts recorded during the experimental period out of a total of 7027 sheep passes through the remote drafter. The actual number of accesses to supplement for each treatment group, in order, were generally less than that intended, i.e. 0.02, 0.69, 1.98, 3.35 and 6.04 days/week. Deviations from the intended number of accesses to supplement were mainly due to sheep not coming through to water on their allocated day of treatment access, although some instances were due to incorrect drafts. There was a non-linear response in growth rate to increased frequency of access to lupins with the growth rate response plateauing at similar to 3 actual accesses per week, corresponding to a growth rate of 72.5 g/head. day. This experiment has demonstrated the application of the remote drafting supplementation system for the first time under grazing conditions and with the drafter operated completely from solar power. The experiment demonstrates a growth response to increasing frequency of access to supplement and provides a starting point with which to begin to develop feeding strategies to achieve sheep weight-change targets.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work proposes a supermarket optimization simulation model called Swarm-Moves is based on self organized complex system studies to identify parameters and their values that can influence customers to buy more on impulse in a given period of time. In the proposed model, customers are assumed to have trolleys equipped with technology like RFID that can aid the passing of products' information directly from the store to them in real-time and vice-versa. Therefore, they can get the information about other customers purchase patterns and constantly informing the store of their own shopping behavior. This can be easily achieved because the trolleys "know" what products they contain at any point. The Swarm-Moves simulation is the virtual supermarket providing the visual display to run and test the proposed model. The simulation is also flexible to incorporate any given model of customers' behavior tailored to particular supermarket, settings, events or promotions. The results, although preliminary, are promising to use RFID technology for marketing products in supermarkets and provide several dimensions to look for influencing customers via feedback, real-time marketing, target advertisement and on-demand promotions. ©2009 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: The aging population is placing increasing demands on surgical services, simultaneously with a decreasing supply of professional labor and a worsening economic situation. Under growing financial constraints, successful operating room management will be one of the key issues in the struggle for technical efficiency. This study focused on several issues affecting operating room efficiency. Materials and methods: The current formal operating room management in Finland and the use of performance metrics and information systems used to support this management were explored using a postal survey. We also studied the feasibility of a wireless patient tracking system as a tool for managing the process. The reliability of the system as well as the accuracy and precision of its automatically recorded time stamps were analyzed. The benefits of a separate anesthesia induction room in a prospective setting were compared with the traditional way of working, where anesthesia is induced in the operating room. Using computer simulation, several models of parallel processing for the operating room were compared with the traditional model with respect to cost-efficiency. Moreover, international differences in operating room times for two common procedures, laparoscopic cholecystectomy and open lung lobectomy, were investigated. Results: The managerial structure of Finnish operating units was not clearly defined. Operating room management information systems were found to be out-of-date, offering little support to online evaluation of the care process. Only about half of the information systems provided information in real time. Operating room performance was most often measured by the number of procedures in a time unit, operating room utilization, and turnover time. The wireless patient tracking system was found to be feasible for hospital use. Automatic documentation of the system facilitated patient flow management by increasing process transparency via more available and accurate data, while lessening work for staff. Any parallel work flow model was more cost-efficient than the traditional way of performing anesthesia induction in the operating room. Mean operating times for two common procedures differed by 50% among eight hospitals in different countries. Conclusions: The structure of daily operative management of an operating room warrants redefinition. Performance measures as well as information systems require updating. Parallel work flows are more cost-efficient than the traditional induction-in-room model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Patterning nanostructures on flexible substrates plays a key role in the emerging flexible electronics technology. The flexible electronic devices are inexpensive and can be conformed to any shape. The potential applications for such devices are sensors, displays, solar cells, RFID, high-density biochips, optoelectronics etc. E-beam lithography is established as a powerful tool for nanoscale fabrication, but its applicability on insulating flexible substrates is often limited because of surface charging effects. This paper presents the fabrication of nanostructures on insulating flexible substrates using low energy E-beam lithography along with metallic layers for charge dissipation. Nano Structures are patterned on different substrates of materials such as acetate and PET foils. The fabrication process parameters such as the proximity gap of exposure, the exposure dosage and developing conditions have been optimized for each substrate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A wireless fuel quantity indication system (FQIS) has been developed using an RFID-enabled sensing platform. The system comprises a fully passive tag, modified reader protocol, capacitive fuel probe, and auxiliary antenna for additional energy harvesting. Results of fluid testing show sensitivity to changes in fluid height of less than 0.25in. An RF-DC harvesting circuit was developed, which delivers up to 5dBm of input power through a remote radio frequency (RF) source. Testing was conducted in a loaded reverberation chamber to emulate the fuel tank environment. Results demonstrate feasibility of the remote source to power the sensor with less than 1W of maximum transmit power and under 100ms dwell time (100mW average power) into the tank. This indicates adequate coverage for large transport aircraft at safe operating levels with a sample rate of up to 1 sample/s.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nanocomposite thin film transistors (TFTs) based on nonpercolating networks of single-walled carbon nanotubes (CNTs) and polythiophene semiconductor [poly [5, 5′ -bis(3-dodecyl-2-thienyl)- 2, 2′ -bithiophene] (PQT-12)] thin film hosts are demonstrated by ink-jet printing. A systematic study on the effect of CNT loading on the transistor performance and channel morphology is conducted. With an appropriate loading of CNTs into the active channel, ink-jet printed composite transistors show an effective hole mobility of 0.23 cm 2 V-1 s-1, which is an enhancement of more than a factor of 7 over ink-jet printed pristine PQT-12 TFTs. In addition, these devices display reasonable on/off current ratio of 105-10 6, low off currents of the order of 10 pA, and a sharp subthreshold slope (<0.8 V dec-1). The work presented here furthers our understanding of the interaction between polythiophene polymers and nonpercolating CNTs, where the CNT density in the bilayer structure substantially influences the morphology and transistor performance of polythiophene. Therefore, optimized loading of ink-jet printed CNTs is crucial to achieve device performance enhancement. High performance ink-jet printed nanocomposite TFTs can present a promising alternative to organic TFTs in printed electronic applications, including displays, sensors, radio-frequency identification (RFID) tags, and disposable electronics. © 2009 American Institute of Physics.

Relevância:

10.00% 10.00%

Publicador: