1 授課教授:黃秋煌 學生:賴志勇 學號: M0018762. 2 Source: This work was published as an abstract in the proceedings of 2007 Symposium on Cryptography and Information.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Mobile RFID Service and Its Security in Korea 17 Nov Keon Woo Kim.
NEAR-FIELD COMMUNICATION MAKING LIFE EASY Presenter: Grace Chen NFC Technology.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
ITEC 810 Overview of Micropayment Technology
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
RFID Security CMPE 296T -Sankate Sharma -Sangbeom Ryu.
Mobile Commerce and Ubiquitous Computing
Cloud Usability Framework
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Medical Applications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Study of Transport Protocols performance in Smart Meter networks Student: Sally Advisor: Dr. Quincy Wu Date: 2012/06/30 1.
OAuth option for mHealth Brief Profile Proposal for 2013/14 presented to the IT Infrastructure Planning Committee R Horn (Agfa Healthcare)
GEORGE MILLER BLUE TEAM CS 410 Mobile Digital Signatures A Mobile Access Defense Health System (MADHS)
指導教授:黃秋煌 報告者:黃明維 無線射頻辨識 論文報告 1. RFID Lab, Dept. IECS, FCU Outline Internet of Things architecture for a RFID-based product tracking business model SHARDIS:
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Technological Innovation & Integrated Products in Consumer Electronics Industry September 14, 2005 Japan Electronics & Information Technology Industries.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
National Chi Nan University Performance Evaluation of Transport Protocols in Smart Meter Networks Speaker: Chia-Wen Lu Advisor: Dr. Quincy Wu Date: 2012/07/23.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
Java Asynchronous Wireless Application Server (JAWAS)
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Lecture 31 Electronic Business (MGT-485). Review of Lecture
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
©2013 Monet., Co ltd. All rights reserved.. Introduce Found in: 30/05/2013 Registration Business License : Issued by Ho Chi Minh City Planning.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Integrating the Healthcare Enterprise Audit Trail and Node Authentication Profile Name of Presenter IHE affiliation.
學生 : 黃兆祺 學號 : 教授 : 溫志煜.  INTRODUCTION  Self-Maintenance Ecological System Of Artificial Ecological System On Sensor Networks  CONCLUSION.
1 Design of Embedded Home Network Gateway for CEBus Based on ARM Binbin Ni, Mingguang Wu, Yanpeng Liu 2006 IEEE International Conference on Industrial.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
清華大學工業工程與工程管理研究所 賴俊翰 彭俊昌 許琬婷 The Principle and Application of RFID -For H Distribution Company Jeffrey Richard Georgia.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Personal Information Management in a Ubiquitous Computing Environment Institute of Systems & Information Technologies/KYUSHU Kenichi Takahashi.
A Study on Smart Gateway Based on Android 4.x Bluetooth HDP(Health Device Profile) Jae-Hwan Jeon l, Sung-In Kang 2, Gwan-Hyung Kim 3, Oh-Hyun Kwon 3, Sung-Wook.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Hoda Jannati School of Computer Science
Building a contactless university examination system using NFC Speaker : Chih-Ching Chen Advisor : Dr. Ho-Ting Wu 2013/12/2 1.
A Comparative Study of RFID Solutions for Security and Privacy: POP vs. Previous Solutions Advanced Information Systems Engineering Lab Saitama University,
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Advanced Science and Technology Letters Vol.40 (Healthcare and Nursing 2013), pp Requirement of Authentication.
A Design of Electronic Payment Authentication Method based on NFC Smartphone Seolhwa Han, Okkyung Choi*, Kangseok Kim, Hongjin Yeh, Taesik Shon Dept. of.
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
Communication Scheme for Loosely Coupled Mobile User Groups in Wireless Sensor Fields Euisin Lee, Soochang Park, Fucai Yu, Min-Sook Jin, and Sang-Ha Kim.
CLOUD ENABLED WIRELESS BODY AREA NETWORKS FOR PERVASIVE HEALTHCARE Presents: Roi Peretz Golan Haham
Security of the Internet of Things: perspectives and challenges
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
English for Advance Learners I
Mobile RFID Topics in Internet JinKyu, Yoo
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
The Streaming Service Model using Complex
Mobile Commerce and the Internet of Things
Internet of Things (IoT)
N-Guard: a Solution to Secure Access to NFC tags
Impact of new technologies on regulation
Mobile Commerce and Ubiquitous Computing
Privacy Protection for E-Health Systems by
Presentation transcript:

1 授課教授:黃秋煌 學生:賴志勇 學號: M

2 Source: This work was published as an abstract in the proceedings of 2007 Symposium on Cryptography and Information Security. Authors: Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee Presenter: Chi Yong Lai Date:2012/11/26

3 Source: Department of Computer Education, Teachers College, Jeju National University, 61 Iljudong-ro, Jeju- si, Jeju-do, , Korea Authors: Namje Park Presenter: Chi Yong Lai Date:2012/11/26

4 . INTRODUCTION . SECURITY FRAMEWORK . SOLUTION . CONCLUSIONS

5 Smart Home Environment Hospital data management system UHF TagHF / UHF Tag EPC-Information Services (EPC-IS) IS (Information Services) server mobile phone

6 . RFID Technology for Consumers : an “Internet of Objects” . Mobile-RFID Technology(mRFID) . B2B (Business to Business) models . B2C (Business to Customer) models for marketing . 3G/4G/Wi-Fi networks . Near Field Communication (NFC)

7 Smart Home Environment Secure Communication between mRFID- Smartphones and Home Servers Otherwise the communication channel between the smartphone and the home server can be easily compromised,man-in-the-middle attacks, replay attacks.

8 Smart Home Environment Secure Communication between Home Servers and EPC-IS Object Naming Service Object Naming Service

9 Smart Home Environment Secure Communication: RFID Reader-enabled Appliances & Home Servers

10 Smart Home Environment Secure Communication: RFID Reader-enabled Appliances & Home Servers

11 Hospital RFID application services like authentication of tag, reader, and owner, privacy protection. 1. Approach of Platform Level information service server,terminal security application,payment server,privacy protection server.

12 Hospital 2. Approach of Protocol Level WIPI (Wireless Internet Platform for Interoperability) 3. Approach of Privacy Level Owners have the option to allow access to any personal information on the object’s tag by authorized persons like a pharmacist or doctor but limit or completely restrict access to unauthorized persons.

13 Hospital Implementation of Customized Healthcare Service The proposed system for tracking patient care at a hospital. A mechanism that manages privacy policy in a user-centric manner for ubiquitous medical care.

14 Hospital Design M-RPS Based Customized Service First step is setting the default level of access control over patient information in the default policy. Second step is user-controllable profile based privacy protection Third step is auditable privacy management.

15 Hospital Design M-RPS Based Customized Service

16 Hospital Implementation

17 Hospital Performance Evaluation

18 Hospital Performance Evaluation

19 Smart Home HTTP Secure Hospital A frequency-hopping spread spectrum (FHSS)-type reader Attacks man-in-the-middle attacks replay attacks

20 Object Name Service (ONS) The Object Name Service (ONS)