Netrwork security protocol with cryptogrphy and RFID systems
#1

Network security protocol with cryptography and RFID system
Lokesh Kumar
B.Tech. Student (4th year)
Department of Electronics & Communication Engg.
Poornima Institute of Engineering and Technology, Jaipur-302022


ABSTRACT: Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding the original messages for transmission. On the other side The RFID technology recently has gained enormous attention in various field like in database maintenances(in the library management system), media, industry and as well as in network security. In the Radio frequency identification (RFID) use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person (user) for the purpose of identification and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system.
This paper will describe about the brief introduction of the old and dynamic method employed for network security that is cryptography. Cryptographic technique is widely applicable in network security field but still we are suffering from hacking and unauthorized access. Hence we have introduced a new idea for being applicable in security field that is RFID technique. Here we will describe its various applications in various fields and how it can be implemented in network security. The security and privacy issues of RFID and their solutions will also be discussed. And the future possible ideas for the new technologies will also be discussed. here we will also define the new concept of network security which provide secure accessing that is VPN(virtual private network) and its contents as PPTN(point to point tunneling protocol) and also describe, how these techniques differ from RFID technique.
The future of the RFID technology is very wide today in optical and wireless communication it is widely being used for many purposes like object tracking, banking and security, and in networking it can be used for its enormous advantages..

Keywords: Encryption, decryption, RFID, VPN, PPTN.






[attachment=13998][attachment=13998][attachment=13998][attachment=13998][attachment=13998]
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: protocol rfid, rfid systems seminar, rfid based security systems embedded projects, cryptogrphy and n w security ppt, network security and cryptography in internet protocol with rfid system, network security protocol with cryptography and rfid system, rfid systems ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,153 31-01-2015, 11:55 PM
Last Post: Guest
  RFID Technology computer science crazy 4 4,631 09-08-2014, 07:10 PM
Last Post: Guest
  Android Mobile Security – An Issue of Future computer girl 2 2,402 24-08-2013, 10:26 AM
Last Post: computer topic
Information EMBEDDED SYSTEMS IN AUTOMOBILES seminar projects crazy 4 4,125 19-07-2013, 10:44 AM
Last Post: computer topic
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,735 06-02-2013, 10:02 AM
Last Post: seminar details
  Embedded Systems In Automobiles computer science crazy 5 6,013 23-01-2013, 09:13 PM
Last Post: Guest
  Maximum Power Point Tracking Controller for PV Systems using a PI Regulator project topics 1 3,075 19-01-2013, 12:51 PM
Last Post: seminar details
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,056 10-01-2013, 05:30 PM
Last Post: Guest
  Smart Cameras in Embedded Systems computer science crazy 1 2,134 22-12-2012, 12:04 PM
Last Post: seminar details
  Battery Free Embedded Systems full report computer science topics 1 2,607 22-12-2012, 12:03 PM
Last Post: seminar details

Forum Jump: