Essays about: "rfid access"
Showing result 1 - 5 of 20 essays containing the words rfid access.
-
1. CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. READ MORE
-
2. The smart mailbox : The modern day mailbox
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : We often check our virtual mailbox several times a day but often forget to check our actual mailbox. This project aims to create a smart mailbox. This is defined as a mailbox that can notify the recipient that mail has been delivered and give access to the right person. READ MORE
-
3. Multi-Factor Mobile based Access Control Solution
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this thesis, alternatives for replacing an RFID card + PIN based access controlsolution for office buildings with a mobile applications are evaluated. The proposedsolutions are based on a probabilistic fingerprinting approach where distributionsof RSSI are approximated and stored in a fingerprint database during an initialoffline phase. READ MORE
-
4. Relay Attack Resistant Passive Keyless Entry : Securing PKE Systems with Immobility Detection
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : A significant security risk of modern vehicles is their vulnerability to relay attacks, due to challenge-response methods, such as those employed in Passive Keyless Entry (PKE) used by most commercial cars, being inherently exposed. This class of attacks are where communication between a vehicle and its key is relayed by an attacker over long range - thereby bypassing any encryption and unlocking the vehicle without requiring direct access to the key. READ MORE
-
5. Network Authentication to the Physical World
University essay from KTH/Kommunikationssystem, CoSAbstract : Quick Response (QR) codes have been used for both non-authentication purposes and authentication & authorization of a user. The visual representation of a QR code requires a reader/decoder to convert the code to a readable resource for an application. READ MORE