Essays about: "RFID CARD"

Showing result 1 - 5 of 10 essays containing the words RFID CARD.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  2. 2. CLONING ATTACKS AGAINST NFC-BASED ACCESS CONTROL SYSTEMS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Sebastian Leclerc; Philip Kärrström; [2022]
    Keywords : RFID; NFC; CLONING ATTACK; ACCESS CONTROL SYSTEM; MIFARE;

    Abstract : The wireless communication methods Near Field Communication (NFC) and Radio FrequencyIdentification (RFID) are today used in different products such as access cards, smartphones, andpayment cards. An effective attack against this type of technology is cloning attacks. READ MORE

  3. 3. Multi-Factor Mobile based Access Control Solution

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : August Larsson; Alvin Ohlsson; [2020]
    Keywords : Indoor positioning Wi-Fi Fingerprinting Magnetic Fingerprinting; Technology and Engineering;

    Abstract : In this thesis, alternatives for replacing an RFID card + PIN based access controlsolution for office buildings with a mobile applications are evaluated. The proposedsolutions are based on a probabilistic fingerprinting approach where distributionsof RSSI are approximated and stored in a fingerprint database during an initialoffline phase. READ MORE

  4. 4. Network Authentication to the Physical World

    University essay from KTH/Kommunikationssystem, CoS

    Author : Joakim Sandberg; [2018]
    Keywords : Authentication; Authorization; Accounting; Security applications; QR-code; door station; Validation Server; Authentication; Authorization; Accounting; Säkerhetsapplikationer; QR-kod; IoT; Door Station; Valideringsserver;

    Abstract : Quick Response (QR) codes have been used for both non-authentication purposes and authentication & authorization of a user. The visual representation of a QR code requires a reader/decoder to convert the code to a readable resource for an application. READ MORE

  5. 5. Wristband Design for Pool Safety System : Redesign of Multifunctional Wearables for Drowning Detection

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik och samhälle

    Author : Jonas Larsson; Johan Carlén; [2017]
    Keywords : Industrial design engineering; pool safety; human-centred design; wristband design; wearables; Teknisk design; poolsäkerhet; användarcentrerad design; armbandsdesign; wearables;

    Abstract : Every year, people are injured or even drowns in pools all over the world. Even in pools with monitoring lifeguards, accidents happen. One reason for submerge injuries or drownings is that they often are silent, which make incidents hard to detect. READ MORE