A Solution to Privacy Issues in RFID Item-level Applications full report
#1


Project Members
M.Prabhu
R.Siddartha

[attachment=13880]
[attachment=13881]
A Solution to Privacy Issues in RFID Item-level Applications
OBJECTIVE
This project addresses the privacy issues and demonstrates a solution which achieves high security while maintains low manufacturing and maintaining cost in RFID item level applications such as library management.
MODULES
There are 4 modules in the project.
GUI.
SERIAL COMMUNICATION.
SHA IMPLEMENTATION.
VALIDATION.
GUI (Graphical User Interface
LOGIN PAGE
AFTER LOGIN PAGE
LENDING PAGE
RENEWAL PAGE
DESCRIPTION
The user enters the username and password.
If it is valid, then the user can access.
The access detail contains lending, renewal, return etc.
SERIAL COMMUNICATION
PROCEDURES
FIRST STEP : Request
SECOND STEP : (r,h(r//T (ID))
THIRD STEP : (r,h(r//T(ID))
FOURTH STEP : Valid / Invalid
FIFTH STEP : Valid / Invalid
(SHA) SECURE HASH ALGORITHM IMPLEMENTATION
Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length.
SHA generates a random number, that is used for the security purpose
The five algorithms are denoted SHA-1, SHA-224,
SHA-256, SHA-384, and SHA-512.
SHA-256 is used in this RFID structure.
VALIDATION
In this Validation phase, the database will send
whether the card is Valid/Invalid.
If the value in the database matches the value in
card then it is valid.
If the value doesn't matches then it is invalid.
Valid Card
Invalid Card
PROCESS
DESCRIPTION
The user enters the username to the database.
Then user enters password to the database.
The admin acknowledges whether it is valid or invalid.
If it is valid then the user access the books.
Then the reader request the tag.
The tag sends the data in the form of (r,h(r//T (ID)).
The reader sends the data in the form of (r,h(r//T(ID)).
CONCLUSION
We have proposed a RFID structure to address the privacy concerns in item-level applications, where the cost for tag manufacturing and management must be kept low.
In the proposed system, RFID tags do not need a secret key or a PIN for authentication, thus eliminates the costly key distribution and management.
FUTURE ENHANCEMENTS
Our future enhancement is to detect the RFID tags by the RFID readers and send to the database automatically with highly equipped hardware (Wireless).
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: rfid applications in patient tracking, rfid applications idea, bollywood item songs top 10, ieee seminar report on frequent item setmining, project report on contemporary issues, security and privacy issues in e passports seminar report pdf, sha boom lyrics,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,149 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,363 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,549 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,266 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 67,381 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 75,493 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,041 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,119 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 44,732 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,241 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: