Item 2 - Information Security and Privacy Protection Technology in RFID Applications Nai-Wei Lo Assistant Professor Department of Information Management.

Slides:



Advertisements
Similar presentations
Computer English For Computer Major Master Candidates
Advertisements

HISPC-Illinois II The Public-Private Partnership Moves Forward on Privacy and Security.
Graduate Research Support Program (GRSP). 2 Content of the presentation 1.Introduction 2.Objectives of the program 3.Expected Outcomes 4.Target groups.
Strengthening the IST Research Capacity of Sofia University SISTER project – WP2A tasks Sylvia Ilieva Department Software Engineering FMI, Sofia University.
An Excellent Proposal is a Good Idea, Well Expressed, With A Clear Indication of Methods for Pursuing the Idea, Evaluating the Findings, and Making Them.
1 Dr. Sangam Shrestha Asst. Professor, Asian Institute of Technology (AIT) / Research Fellow, Institute for Global Environmental Strategies (IGES) International.
1 NIH Grant-Writing Workshop Leora Lawton, Ph.D. Executive Director, Berkeley Population Center Summer 2015 Dlab Workshop Session 5: Human Subjects and.
Event / date: West Balkan NFPs-EEA Coordination meeting / 21 Oct 2014 Author: Anita Künitzer (ETC/ICM) Event / date: West Balkan NFPs-EEA Coordination.
HISTORY MARKET The Development of Concept Companies into Entrepreneurial Business SEED STAGE & EARLY STAGE VENTURE CAPITAL Funding Mentoring UNIQUENESS.
Department of Electrical Engineering, Southern Taiwan University of Science and Technology Chi-Jo Wang Professor and Associate Chair December 17, 2012.
LEARNING PRIORITY OF TECHNOLOGY PROCESS SKILLS AT ELEMENTARY LEVEL Hung-Jen Yang & Miao-Kuei Ho DEPARTMENT OF INDUSTRIAL TECHNOLOGY EDUCATION THE NATIONAL.
Learning by Doing (LBD) based Course Content Development (in Areas of CS and ECE) International Institute of Information Technology Hyderabad, India 1.
 ELECTRI Council Meeting  Information Technology Assessment for Line Electrical Contractors Vanessa Valentin, Ph.D. Assistant Professor Department of.
CHINA’S PROJECTS PROPOSALS FOR SESSION 2 Sun Yang Department of International Cooperation National Energy Administration, China
SIXTH FRAMEWORK PROGRAMME FP INCO-MPC-1 MEditerranean Development of Innovative Technologies for integrAted waTer managEment.
Technology and Innovation Development Award (TIDA) Presenter Dr Michael Ryan SFI.
Part II: Planning Your Research Project Module Six: Proposal Development RESEARCH PROJECT MANAGEMENT 1.
Presentation Content 2005/2006 Poverty Analysis Country Poverty Alleviation Strategy Koudemain Ste Lucie Programme - Brief Description -
RESIDENT PROJECTS ROBERT LEONHARD QUALITY IMPROVEMENT MANAGER.
Participation in 7FP Anna Pikalova National Research University “Higher School of Economics” National Contact Points “Mobility” & “INCO”
MINISTRY OF PLANNING AND INVESTMENT
Final Year Project 1 (FYP 1)
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Oracle Services Procurement
Pilot Grant Program EGAD Study OCCUPATIONAL & ENVIRONMENTAL HEALTH.
TRC Research Project (Student) Faculty Mentored Undergraduate Research Award Program (FURAP)
The Alberta Centre for Advanced Micro and Nano Technology Products Speeding the Path From Prototype to Commercial Product Ken Brizel CEO, ACAMP
Outline Voucher for Industry Association (VIA) Overview Cybersecurity VIA Program Details o Program Objectives o Project Eligibility o Funding Contributions.
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Data Coordinating Center University of Washington Department of Biostatistics Elizabeth Brown, ScD Siiri Bennett, MD.
1 Item 1 - Security technologies and applications of wireless sensor networks Chin-Laung Lei Department of Electrical Engineering National Taiwan University.
Southeast Asia Primary Learning Metric (SEA-PLM) II CONSULTATIVE MEETING.
Project Execution Methodology
Skolkovo PRESENTATION
Title of Full Proposal Name of Corresponding PI, Institution
Framework Policy on Continuing Care in First Nations Communities of Quebec Conference on clients with decreasing independence May 10, 2017.
AMBIENT ASSISTED LIVING JOINT PROGRAMME
Preparation of the Self-Study and Documentation
Information Session May 2016
Pre-planning Planning to plan (and adapt) Implementation starts Here!
System Planning To Programming
Chapter 2 Connecting Technology and Engineering through Mathematics and Science.
INITIAL CONSIDERATIONS
The International Plant Protection Convention
INDUSTRIAL ROBOTICS PROGRAMME White Paper Presentation Programme Manager:
Testing Plan Workshop Santa Cruz County BH
Future Fellowships: perspective from a SAC member
Update of 2017 Activities of the ENVIRONET NORM Project
Overview of the FEPAC Accreditation Process
Title of Full Proposal Name of Corresponding PI, Institution
Presentations for the IAF-PP Review Panel are restricted to a maximum of 10 slides Additional slides may be placed in an Annex deck.
International Collaboration Project on Information Security
Catalyst Fund - advancing global science partnerships for New Zealand
National Workshop on Planning for the GEOHealth Hub for Interdisciplinary Research and Training project overview and progress Kiros Berhane, PhD, Professor.
Proposal for Term Project Operating Systems, Fall 2018
UNCFSP/NLM HBCU ACCESS Project
Scanning the environment: The global perspective on the integration of non-traditional data sources, administrative data and geospatial information Sub-regional.
Project Title: Host Institution: <Name of Host Institution> PI:
Amendment Invoice AML/ASP Task Force Progress Report
Information Session October 13, 2016
FAA Center of Excellence for Technical Training and Human Performance
Technical and Advisory Meeting
AME Programmatic Letter-of-Intent
Phase 2 Objectives Prototype your complete solution in real environment, collecting sufficient data to make a decision regarding whether to continue.
Title of Full Proposal Name of Corresponding PI, Institution
S-STEM (NSF ) NSF Scholarships for Science, Technology, Engineering, & Mathematics Information Materials 6 Welcome! This is the seventh in a series.
GC University Lahore Quality Enhancement Cell
Title of Full Proposal Name of Corresponding PI, Institution
BACKGROUND Team Members Project /Sub-Project Title :
Presentation transcript:

Item 2 - Information Security and Privacy Protection Technology in RFID Applications Nai-Wei Lo Assistant Professor Department of Information Management National Taiwan University of Science and Technology International Collaboration Project for Information Security

2 Outline Background Background Goals of the project Goals of the project Major tasks and expected outcomes from international collaboration Major tasks and expected outcomes from international collaboration Manpower and budget expense Manpower and budget expense Key performance indicators and review points Key performance indicators and review points

3 Background RFID – a replacement for optical barcode RFID – a replacement for optical barcode Unique identificationUnique identification AutomationAutomation Applications Applications LogisticsLogistics Military usageMilitary usage Other applicable areasOther applicable areas Potential problems Potential problems SecuritySecurity PrivacyPrivacy

Goals of The Project

5 Project Goals To advance the technologies on data security and privacy protection of RFID systems in Taiwan. To advance the technologies on data security and privacy protection of RFID systems in Taiwan. Improve the diversification and quality of our research on RFID related area.Improve the diversification and quality of our research on RFID related area. To foster experts on RFID security and privacy issues through international collaboration project. To foster experts on RFID security and privacy issues through international collaboration project. Provide platform for RFID information exchange, techniques transfer, and even experts visiting internationally.Provide platform for RFID information exchange, techniques transfer, and even experts visiting internationally.

6 International Collaboration Goals: Team members will be sent to UC Berkeley to work with Berkeley scholars in order to learn state-of-the-art technologies and new concepts/ideas from them. By doing so, we hope to expand our research capacity in RFID related field, and also to share precious research results and collaboration experience with both academia and RFID industry in Taiwan. Goals: Team members will be sent to UC Berkeley to work with Berkeley scholars in order to learn state-of-the-art technologies and new concepts/ideas from them. By doing so, we hope to expand our research capacity in RFID related field, and also to share precious research results and collaboration experience with both academia and RFID industry in Taiwan. Research partner: Research partner: RFID security and privacy investigation team under Prof. Doug Tygar, UC Berkeley. Potential research targets: Potential research targets: Build RFID systems with enhanced privacy protection mechanism and/or augmented security scheme.Build RFID systems with enhanced privacy protection mechanism and/or augmented security scheme. Employ sensor networks with RFID systems on medical applications.Employ sensor networks with RFID systems on medical applications.

Major Tasks and Expected Outcomes from International Collaboration

8 Major Tasks Plan and build RFID systems with enhanced privacy protection mechanism and/or augmented security scheme Plan and build RFID systems with enhanced privacy protection mechanism and/or augmented security scheme Increase RFID security and privacy under low energy consumption considerationIncrease RFID security and privacy under low energy consumption consideration Explore new RFID security and privacy mechanisms for specific RFID applicationsExplore new RFID security and privacy mechanisms for specific RFID applications Develop RFID tag integrity test schemeDevelop RFID tag integrity test scheme Develop RFID tracking denial techniqueDevelop RFID tracking denial technique Invent new protocols for RFID applicationsInvent new protocols for RFID applications Employ sensor networks with RFID systems on medical applications, such as: Employ sensor networks with RFID systems on medical applications, such as: Elder healthcare systemsElder healthcare systems Patient auxiliary systemsPatient auxiliary systems

9 Expected Outcomes NoOutcomeNumber Expected Date 1. Report on current status of RFID application security and privacy of available solutions 1 July, Report on progress of solution design - Problem modeling - Our proposed solution - Current implementation status 1 Nov, Prototype of RFID application with developed security scheme (alpha) 1 Dec, Conference paper submission 1 Dec, Note on advanced issues and scheme improvement 1 March, 07

10 Collaboration: Expected Outcome and Milestones A report on the current landscape of RFID security and privacy research (Oct. ‘ 06): A report on the current landscape of RFID security and privacy research (Oct. ‘ 06): A report on specific RFID research issues and initial findings from the collaborative research (Dec. 06). A report on specific RFID research issues and initial findings from the collaborative research (Dec. 06). Research publications ( ‘ 07). Research publications ( ‘ 07). Release of RFID application prototype ( ‘ 07). Release of RFID application prototype ( ‘ 07). Industry workshop/summer school on “ RFID Security and Privacy ” ( ‘ 07). Industry workshop/summer school on “ RFID Security and Privacy ” ( ‘ 07).

Manpower and Budget Expense

12 Manpower Functional PositionName AffiliationTitle PITzong-Chen Wu National Taiwan University of Science and Technology Professor CO-PIShiuh-Pyng Shieh National Chiao Tung University Professor CO-PI Nai-Wei Lo National Taiwan University of Science and Technology Assistant Professor Investigator Da-Wei Wang Institute of Information Science Academia Sinica Associate Research Fellow Investigator Jung-Hui ChiuChang Gung University Associate Professor Investigator Chuan-Kai Yang National Taiwan University of Science and Technology Assistant Professor Full-time Research Assistant (Master Degree 1 person TBD Part-time Research Assistant (Ph.D Student) 3 persons TBD Part-time Research Assistant ( Master Student) 4 persons TBD

13 Budget Expense for the First Year Budget Expense for the First Year Item List Budget Amount Percentage 1. Personnel Expense 1. Personnel Expense1,993, % 2. Equipment Expense 2. Equipment Expense300,0007.6% 3. Travel Expense ( International Conference, etc ) 3. Travel Expense ( International Conference, etc )300,0007.6% 4. Int ’ l Collaboration Expense 4. Int ’ l Collaboration Expense1,094, % 5. Operation Expense 5. Operation Expense247,7006.3% 6. Overhead 6. Overhead314,8008% Total Amount 4,250,000

Key Performance Indicators and Review Points

15 Timetable of Project Schedule : Report generated 1. Identify and select the research topics XXXX1XX 2. Collect and analyze related research papers and prototypes XXXXXX2+ 3.Build research environment and learn necessary skills XXXX 4.Send researchers to work with UC Berkeley scholars on site XX X Collect related information about combining RFID technology with sensors for medical applications XX X4 + Complete Percentage( % ) 40 % 80 % 100 %

16 Review Points Review Point Proposed Date Finished Work Description 1 July, 2006 Establish the detail research direction and work target for the first year. 2 Sept., 2006 Complete the research methodology structure. 3 Dec., 2006 Consolidate the research results through collaboration with UCB and modify prototype design based on new findings. 4 March, Finalize research results for the first year and write research reports. 2.Complete the design of prototype system.

17 Thank you! Q&A