z-a solution to privacy issues in rfid item-level

Upload: surangma-parashar

Post on 06-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    1/20

    Project Members Project Guide

    M.Prabhu (60104104046) Prof R.Raj Bharath ME,

    R.Siddartha (60104104066) AP,CSE.

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    2/20

    OBJECTIVE

    This project addresses the privacy issues and

    demonstrates a solution which achieves high security

    while maintains low manufacturing and maintaining

    cost in RFID item level applications such as librarymanagement.

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    3/20

    MODULES

    There are 4 modules in the project.

    GUI.

    SERIAL COMMUNICATION. SHA IMPLEMENTATION.

    VALIDATION.

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    4/20

    CLIENT DATABASE/ADMIN

    User Name

    Password

    Acknowledge

    (Valid/Invalid)

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    5/20

    LOGIN PAGE

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    6/20

    AFTER LOGIN PAGE

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    7/20

    LENDING PAGE

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    8/20

    RENEWAL PAGE

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    9/20

    DESCRIPTION

    The user enters the username and password.

    If it is valid, then the user can access.

    The access detail contains lending, renewal, return etc.

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    10/20

    SERIAL COMMUNICATION

    TAG READER DATABASE

    1

    2

    3

    4

    5

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    11/20

    PROCEDURES

    FIRST STEP : Request

    SECOND STEP : (r,h(r//T (ID))

    THIRD STEP : (r,h(r//T(ID))

    FOURTH STEP : Valid / Invalid

    FIFTH STEP : Valid / Invalid

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    12/20

    (SHA) SECURE HASH

    ALGORITHM IMPLEMENTATION

    Hash algorithms compute a fixed-length digital

    representation (known as a message digest) of an

    input data sequence (the message) of any length.

    SHA generates a random number, that is used forthe security purpose

    The five algorithms are denoted SHA-1, SHA-224,

    SHA-256, SHA-384, and SHA-512.

    SHA-256 is used in this RFID structure.

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    13/20

    VALIDATION

    In this Validation phase, the database will send

    whether the card is Valid/Invalid.

    If the value in the database matches the value in

    card then it is valid.

    If the value doesn't matches then it is invalid.

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    14/20

    Valid Card

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    15/20

    Invalid Card

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    16/20

    PROCESS

    TAG READER

    USER

    1.User name

    2.Password4.Access

    BOOK

    6.(r,h(r//T(ID)) 8. Valid

    /Invalid

    9.Valid

    /Invalid

    5.Request 7.(r,h(r//T(ID))

    3.Acknowledge

    (Valid/Invalid)

    DATABASE

    /ADMIN

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    17/20

    DESCRIPTION

    The user enters the username to the database.

    Then user enters password to the database.

    The admin acknowledges whether it is valid or invalid.

    If it is valid then the user access the books. Then the reader request the tag.

    The tag sends the data in the form of (r,h(r//T (ID)).

    The reader sends the data in the form of (r,h(r//T(ID)).

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    18/20

    CONCLUSION

    We have proposed a RFID structure to address the

    privacy concerns in item-level applications, where the

    cost for tag manufacturing and management must be

    kept low.

    In the proposed system, RFID tags do not need a secret

    key or a PIN for authentication, thus eliminates the

    costly key distribution and management.

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    19/20

    FUTURE ENHANCEMENTS

    Our future enhancement is to detect the RFID

    tags by the RFID readers and send to the database

    automatically with highly equipped hardware

    (Wireless).

  • 8/3/2019 Z-A Solution to Privacy Issues in RFID Item-Level

    20/20

    THANK U !!!