A Solution to Privacy Issues in RFID Item-level Applications full report
#1


Project Members
M.Prabhu
R.Siddartha

[attachment=13880]
[attachment=13881]
A Solution to Privacy Issues in RFID Item-level Applications
OBJECTIVE
This project addresses the privacy issues and demonstrates a solution which achieves high security while maintains low manufacturing and maintaining cost in RFID item level applications such as library management.
MODULES
There are 4 modules in the project.
GUI.
SERIAL COMMUNICATION.
SHA IMPLEMENTATION.
VALIDATION.
GUI (Graphical User Interface
LOGIN PAGE
AFTER LOGIN PAGE
LENDING PAGE
RENEWAL PAGE
DESCRIPTION
The user enters the username and password.
If it is valid, then the user can access.
The access detail contains lending, renewal, return etc.
SERIAL COMMUNICATION
PROCEDURES
FIRST STEP : Request
SECOND STEP : (r,h(r//T (ID))
THIRD STEP : (r,h(r//T(ID))
FOURTH STEP : Valid / Invalid
FIFTH STEP : Valid / Invalid
(SHA) SECURE HASH ALGORITHM IMPLEMENTATION
Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length.
SHA generates a random number, that is used for the security purpose
The five algorithms are denoted SHA-1, SHA-224,
SHA-256, SHA-384, and SHA-512.
SHA-256 is used in this RFID structure.
VALIDATION
In this Validation phase, the database will send
whether the card is Valid/Invalid.
If the value in the database matches the value in
card then it is valid.
If the value doesn't matches then it is invalid.
Valid Card
Invalid Card
PROCESS
DESCRIPTION
The user enters the username to the database.
Then user enters password to the database.
The admin acknowledges whether it is valid or invalid.
If it is valid then the user access the books.
Then the reader request the tag.
The tag sends the data in the form of (r,h(r//T (ID)).
The reader sends the data in the form of (r,h(r//T(ID)).
CONCLUSION
We have proposed a RFID structure to address the privacy concerns in item-level applications, where the cost for tag manufacturing and management must be kept low.
In the proposed system, RFID tags do not need a secret key or a PIN for authentication, thus eliminates the costly key distribution and management.
FUTURE ENHANCEMENTS
Our future enhancement is to detect the RFID tags by the RFID readers and send to the database automatically with highly equipped hardware (Wireless).
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: rfid security and privacy abstract for seminar, ftc report privacy by design, sha clack clack, rfid security and privacy lounge, student item 1, rfid applications, suggested topics for report on contemporary issues in management,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 42,451 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 30,917 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,129 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,845 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 66,721 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 74,825 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 23,591 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 41,637 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 44,102 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,045 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: