• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • Tagged with
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Chaos Based RFID Authentication Protocol

Chung, Harold 17 June 2013 (has links)
Chaotic systems have been studied for the past few decades because of its complex behaviour given simple governing ordinary differential equations. In the field of cryptology, several methods have been proposed for the use of chaos in cryptosystems. In this work, a method for harnessing the beneficial behaviour of chaos was proposed for use in RFID authentication and encryption. In order to make an accurate estimation of necessary hardware resources required, a complete hardware implementation was designed using a Xilinx Virtex 6 FPGA. The results showed that only 470 Xilinx Virtex slices were required, which is significantly less than other RFID authentication methods based on AES block cipher. The total number of clock cycles required per encryption of a 288-bit plaintext was 57 clock cycles. This efficiency level is many times higher than other AES methods for RFID application. Based on a carrier frequency of 13.56Mhz, which is the standard frequency of common encryption enabled passive RFID tags such as ISO-15693, a data throughput of 5.538Kb/s was achieved. As the strength of the proposed RFID authentication and encryption scheme is based on the problem of predicting chaotic systems, it was important to ensure that chaotic behaviour is maintained in this discretized version of Lorenz dynamical system. As a result, key boundaries and fourth order Runge Kutta approximation time step values that are unique for this new mean of chaos utilization were discovered. The result is a computationally efficient and cryptographically complex new RFID authentication scheme that can be readily adopted in current RFID standards such as ISO-14443 and ISO-15693. A proof of security by the analysis of time series data obtained from the hardware FPGA design is also presented. This is to ensure that my proposed method does not exhibit short periodic cycles, has an even probabilistic distribution and builds on the beneficial chaotic properties of the continuous version of Lorenz dynamical system.
2

Chaos Based RFID Authentication Protocol

Chung, Harold January 2013 (has links)
Chaotic systems have been studied for the past few decades because of its complex behaviour given simple governing ordinary differential equations. In the field of cryptology, several methods have been proposed for the use of chaos in cryptosystems. In this work, a method for harnessing the beneficial behaviour of chaos was proposed for use in RFID authentication and encryption. In order to make an accurate estimation of necessary hardware resources required, a complete hardware implementation was designed using a Xilinx Virtex 6 FPGA. The results showed that only 470 Xilinx Virtex slices were required, which is significantly less than other RFID authentication methods based on AES block cipher. The total number of clock cycles required per encryption of a 288-bit plaintext was 57 clock cycles. This efficiency level is many times higher than other AES methods for RFID application. Based on a carrier frequency of 13.56Mhz, which is the standard frequency of common encryption enabled passive RFID tags such as ISO-15693, a data throughput of 5.538Kb/s was achieved. As the strength of the proposed RFID authentication and encryption scheme is based on the problem of predicting chaotic systems, it was important to ensure that chaotic behaviour is maintained in this discretized version of Lorenz dynamical system. As a result, key boundaries and fourth order Runge Kutta approximation time step values that are unique for this new mean of chaos utilization were discovered. The result is a computationally efficient and cryptographically complex new RFID authentication scheme that can be readily adopted in current RFID standards such as ISO-14443 and ISO-15693. A proof of security by the analysis of time series data obtained from the hardware FPGA design is also presented. This is to ensure that my proposed method does not exhibit short periodic cycles, has an even probabilistic distribution and builds on the beneficial chaotic properties of the continuous version of Lorenz dynamical system.
3

e-Pontos: Uma solu??o embarcada de automa??o comercial aplicada a clubes de fidelidade baseado em tecnologia RFID e esmart card

Paiva, Jailton Carlos de 27 July 2012 (has links)
Made available in DSpace on 2014-12-17T14:56:06Z (GMT). No. of bitstreams: 1 JailtonCP_DISSERT.pdf: 2190503 bytes, checksum: ee26df46d54432b596d1d87d4b66b75c (MD5) Previous issue date: 2012-07-27 / In practically all vertical markets and in every region of the planet, loyalty marketers have adopted the tactic of recognition and reward to identify, maintain and increase the yield of their customers. Several strategies have been adopted by companies, and the most popular among them is the loyalty program, which displays a loyalty club to manage these rewards. But the problem with loyalty programs is that customer identification and transfer of loyalty points are made in a semiautomatic. Aiming at this, this paper presents a master's embedded business automation solution called e-Points. The goal of e-Points is munir clubs allegiances with fully automated tooling technology to identify customers directly at the point of sales, ensuring greater control over the loyalty of associate members. For this, we developed a hardware platform with embedded system and RFID technology to be used in PCs tenant, a smart card to accumulate points with every purchase and a web server, which will provide services of interest to retailers and customers membership to the club / Em praticamente todos os mercados verticais e em cada regi?o do planeta, os comerciantes de fidelidade adotaram a t?tica de reconhecimento e recompensa para identificar, manter e aumentar o rendimento de seus clientes. V?rias estrat?gias t?m sido adotadas pelas empresas, e a mais popular entre elas ? o programa de fidelidade, que exibe um clube de fidelidade para gerenciar essas recompensas. Mas o problema com os programas de fidelidade ? que a identifica??o dos clientes e a transmiss?o dos pontos de fidelidade s?o feitas de forma semiautom?tica. Visando isto, o presente trabalho de mestrado apresenta uma solu??o embarcada de automa??o comercial intitulada e-Pontos. O objetivo do e-Pontos ? munir os clubes de fidelidades com ferramental tecnol?gico totalmente automatizado para identificar os clientes diretamente nos pontos de vendas, garantindo um maior controle dos pontos de fidelidade dos membros associados. Para isso, foi desenvolvida uma plataforma de hardware com sistema embarcado e tecnologia RFID que ser? utilizada nos PCs dos lojistas, um smart card para acumular os pontos a cada compra e um servidor web, o qual disponibilizar? servi?os de interesse para os lojistas e os clientes conveniado ao clube

Page generated in 0.0255 seconds