Essays about: "rfid access"

Showing result 1 - 5 of 20 essays containing the words rfid access.

  1. 1. CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Sebastian Leclerc; Philip Kärrström; [2022]
    Keywords : RFID; NFC; CLONING ATTACK; ACCESS CONTROL SYSTEM; MIFARE;

    Abstract : The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. READ MORE

  2. 2. The smart mailbox : The modern day mailbox

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : JACOB TUNBERG; JONATAN BARRIEL; [2020]
    Keywords : Mechatronics; Internet of things; RFID; Barcode; Arduino; Mekatronik; Sakernas internet; RFID; Streckkod; Arduino;

    Abstract : We often check our virtual mailbox several times a day but often forget to check our actual mailbox. This project aims to create a smart mailbox. This is defined as a mailbox that can notify the recipient that mail has been delivered and give access to the right person. READ MORE

  3. 3. Multi-Factor Mobile based Access Control Solution

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : August Larsson; Alvin Ohlsson; [2020]
    Keywords : Indoor positioning Wi-Fi Fingerprinting Magnetic Fingerprinting; Technology and Engineering;

    Abstract : In this thesis, alternatives for replacing an RFID card + PIN based access controlsolution for office buildings with a mobile applications are evaluated. The proposedsolutions are based on a probabilistic fingerprinting approach where distributionsof RSSI are approximated and stored in a fingerprint database during an initialoffline phase. READ MORE

  4. 4. Relay Attack Resistant Passive Keyless Entry : Securing PKE Systems with Immobility Detection

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : ABEL VALKO; [2020]
    Keywords : Passive Keyless Entry; Relay Attack; Mafia Fraud; Access Control; Mechatronics; Nyckellös System; åtkomstkontroll; Relay Attack; IT-säkerhet; Mekatronik;

    Abstract : A significant security risk of modern vehicles is their vulnerability to relay attacks, due to challenge-response methods, such as those employed in Passive Keyless Entry (PKE) used by most commercial cars, being inherently exposed. This class of attacks are where communication between a vehicle and its key is relayed by an attacker over long range - thereby bypassing any encryption and unlocking the vehicle without requiring direct access to the key. READ MORE

  5. 5. Network Authentication to the Physical World

    University essay from KTH/Kommunikationssystem, CoS

    Author : Joakim Sandberg; [2018]
    Keywords : Authentication; Authorization; Accounting; Security applications; QR-code; door station; Validation Server; Authentication; Authorization; Accounting; Säkerhetsapplikationer; QR-kod; IoT; Door Station; Valideringsserver;

    Abstract : Quick Response (QR) codes have been used for both non-authentication purposes and authentication & authorization of a user. The visual representation of a QR code requires a reader/decoder to convert the code to a readable resource for an application. READ MORE