z-a solution to privacy issues in rfid item-level
TRANSCRIPT
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
1/20
Project Members Project Guide
M.Prabhu (60104104046) Prof R.Raj Bharath ME,
R.Siddartha (60104104066) AP,CSE.
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
2/20
OBJECTIVE
This project addresses the privacy issues and
demonstrates a solution which achieves high security
while maintains low manufacturing and maintaining
cost in RFID item level applications such as librarymanagement.
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
3/20
MODULES
There are 4 modules in the project.
GUI.
SERIAL COMMUNICATION. SHA IMPLEMENTATION.
VALIDATION.
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
4/20
CLIENT DATABASE/ADMIN
User Name
Password
Acknowledge
(Valid/Invalid)
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
5/20
LOGIN PAGE
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
6/20
AFTER LOGIN PAGE
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
7/20
LENDING PAGE
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
8/20
RENEWAL PAGE
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
9/20
DESCRIPTION
The user enters the username and password.
If it is valid, then the user can access.
The access detail contains lending, renewal, return etc.
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
10/20
SERIAL COMMUNICATION
TAG READER DATABASE
1
2
3
4
5
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
11/20
PROCEDURES
FIRST STEP : Request
SECOND STEP : (r,h(r//T (ID))
THIRD STEP : (r,h(r//T(ID))
FOURTH STEP : Valid / Invalid
FIFTH STEP : Valid / Invalid
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
12/20
(SHA) SECURE HASH
ALGORITHM IMPLEMENTATION
Hash algorithms compute a fixed-length digital
representation (known as a message digest) of an
input data sequence (the message) of any length.
SHA generates a random number, that is used forthe security purpose
The five algorithms are denoted SHA-1, SHA-224,
SHA-256, SHA-384, and SHA-512.
SHA-256 is used in this RFID structure.
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
13/20
VALIDATION
In this Validation phase, the database will send
whether the card is Valid/Invalid.
If the value in the database matches the value in
card then it is valid.
If the value doesn't matches then it is invalid.
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
14/20
Valid Card
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
15/20
Invalid Card
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
16/20
PROCESS
TAG READER
USER
1.User name
2.Password4.Access
BOOK
6.(r,h(r//T(ID)) 8. Valid
/Invalid
9.Valid
/Invalid
5.Request 7.(r,h(r//T(ID))
3.Acknowledge
(Valid/Invalid)
DATABASE
/ADMIN
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
17/20
DESCRIPTION
The user enters the username to the database.
Then user enters password to the database.
The admin acknowledges whether it is valid or invalid.
If it is valid then the user access the books. Then the reader request the tag.
The tag sends the data in the form of (r,h(r//T (ID)).
The reader sends the data in the form of (r,h(r//T(ID)).
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
18/20
CONCLUSION
We have proposed a RFID structure to address the
privacy concerns in item-level applications, where the
cost for tag manufacturing and management must be
kept low.
In the proposed system, RFID tags do not need a secret
key or a PIN for authentication, thus eliminates the
costly key distribution and management.
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
19/20
FUTURE ENHANCEMENTS
Our future enhancement is to detect the RFID
tags by the RFID readers and send to the database
automatically with highly equipped hardware
(Wireless).
-
8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level
20/20
THANK U !!!