RFID – Privacy and Security CSCI E-170 Fall 2004 Anagha Gala, Dilip Kamath, Vijay Arora.

Slides:



Advertisements
Similar presentations
Socioeconomics knowledge cafe Wrap-up. Agreed the list of socioeconomic themes/issues that have dependencies with RWI research priorities Standardization.
Advertisements

[Biomedical Telemedicine ] Usability, Privacy and Security CSCI E-170 Fall 2004 Final Project Lee & Oghra.
Jaap-Henk Hoepman TNO ICT, Groningen, the Netherlands  Digital Security (DS) Radboud University Nijmegen, the Netherlands 
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
TRUST in Future Internet COSTS R&D, Deployment, Incentives, Inertia, RoI, … business as usual? NEEDS Security Technologies & Socio-economic bases, …
E-Passports Threatens Your Privacy Nathan Sweet CSCE 390 Dr. Valtorta
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Do We Really Need Denise Huang. Agenda ITV: What’s new Industry overview Consumers’ attitudes and usage patterns What are the demands? Challenges from.
Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues.
Security for Data Transfers Protecting Customer Data.
Review 23 April. Group exercise  What lessons have you learned?  Write full sentences until I tell you to stop.  Examples: Code can affect behavior.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Social Sciences and Cycling Cultures: What can Social Science research contribute to doubling cycling numbers? Dr Peter Cox Network Meeting, TUWien 10/6/2014.
Briefly describe the environmental, economic and ethical issues related to manufacturing paper.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
Walsall Health Library Service’s Experience with Implementing RFID Presented by: Richard Parker, Head of Knowledge and Library Services, Walsall Health.
RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven.
Andrew Lippman Media Lab January, 2008 Spectral Opportunities.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
RFID and privacy RFID Security: theory and practice Lorentz Center, March 2008.
RFID and Privacy Dan White RFID Technical Evangelist Engineering & Development Retail Solutions Division.
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
HUMAN RIGHTS AND M(&)E Lessons from The Center for Evaluation Innovation’s Case Studies on Evaluation in Human Rights Organizations Meeting of the Security,
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
AS/A Level ICT Rising year 12 lesson July ICT is a dynamic subject ICT is always evolving. As technology develops, there are new possibilities for.
Changes to the Law. Factors Driving Changes in Law  Throughout Canadian history, people have fought to change existing laws and bring new laws into effect.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
TUESDAY 19 TH OCTOBER a) Give you the time to consolidate your understanding of each of the 4 phases of the accelerated learning cycle. b) Share.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
STAGE #5: CLOSING 5 Process Stages of Project Management.
LEJASCIEMS SECONDARY SCHOOL Self -defence club Devoloping Confident Global Learning Communities.
Project 2.A Extending NS-2 to support encryption/decryption Date: 04/07/2005 Course: CSCI 5931 Name: Sam Tran Tuan Nguyen.
Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE APR 2015 Audio:
This Guide demonstrates how to setup the Client initially.
SERIT TA 7 Contribution for the Preparation of Horizon 2020 Mission 6 : Ensure privacy and freedom.
Formative Assessment in Action The Process of Formative Assessment Slide 1 (Heritage, 2010) Handout
MAKING OUT OF. VS. Who Moved My Cheese? IT Budgets ARE Larger than Facility Budgets Facility Operators need less but better information Big Brother.
System Security: Cryptography Technologies CPE Operating Systems
#SINET Connection Mike Fleck Co-founder Simple, transparent data security at the web tier.
University of Southern California Center for Systems and Software Engineering Core Capability Drive-Through Preparation Pongtip Aroonvatanaporn CSCI 577b.
Item 2 - Information Security and Privacy Protection Technology in RFID Applications Nai-Wei Lo Assistant Professor Department of Information Management.
I&S Meeting 26 September 2011 Draft PIA Tool. © 2011 GS1 Agenda Introduction PIA Requirements Background RFID PIA Tool demonstration Next steps for PIA.
BIG DATA Initiative SMART SubstationBig Data Solution.
The Climate Lab Lesson 4.
Web Technology Solutions
Tim Carter Sales Director Sybase Confidential Propriety.
Surface Mining Control and Reclamation Act of 1977
The Rise of Social Media
Applications of Cryptography
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
Tim Carter Sales Director Sybase Confidential Propriety.
Why did the Romans have good Public Health?
BACK SOLUTION:
Privacy Project Framework & Structure
By the end of this lecture, participants will:
Technology Lesson 1.1 Words To Know.
ارائه دهنده : رضا دادآفرين مرداد ماه 1389
Secure Execution Crypto Microprocessor
The Big 6 Research Model Step 3: Location and Access
Big Data and Privacy Panel Prof. Ravi Sandhu
Ideas for RFID and IoT Standardization ?
Ideas for RFID and IoT Standardization ?
World-Leading Research with Real-World Impact!
For More Details:
IT and Society Week 2: Privacy.
Ideas for RFID and IoT Standardization ?
RFID (Radio-Frequency Identification)
Presentation transcript:

RFID – Privacy and Security CSCI E-170 Fall 2004 Anagha Gala, Dilip Kamath, Vijay Arora

01/11/2005RFID Privacy and Security2 Objective Understand the technology and its impact on society in detail Understand the technology and its impact on society in detail Discuss privacy issues that impact usage and acceptance Discuss privacy issues that impact usage and acceptance Demonstrate securing information on RFID tag using AES standard encryption (Rijndael) Demonstrate securing information on RFID tag using AES standard encryption (Rijndael)

01/11/2005RFID Privacy and Security3 Approach Collaborated to research on different areas Collaborated to research on different areas Developed application in lab environment by extending setup at work place Developed application in lab environment by extending setup at work place Pooled our findings and observations Pooled our findings and observations Consolidated report Consolidated report

01/11/2005RFID Privacy and Security4 RFID Information Security using Encryption Lab description Lab description Experiment Demonstration Experiment Demonstration Findings / Lessons learnt Findings / Lessons learnt

01/11/2005RFID Privacy and Security5 Invasion of Privacy Myth vs Reality Myth vs Reality Is Big Brother really watching you ? Is Big Brother really watching you ? Practical limitations of RFID Practical limitations of RFID Need for simple and usable solutions Need for simple and usable solutions Encryption for long-term tags Encryption for long-term tags Killing for short-term tags Killing for short-term tags Need for privacy protection laws Need for privacy protection laws

01/11/2005RFID Privacy and Security6 Q&A