G. Khan
Same as FLC
uP/Instrumentation, Networking, Software
The project explores the possibility of wireless data communication using WIFI, RFID or NFC (Near Field). The wireless communication is between a smart tag/card (such as e-health card) and a server. The data communication process between the smart card and server will include an initial authentication step to provide authorization to begin the transmission of personal data that is located at a smart card or tag. The project will assess the security exposures of the process to minimize the intercepting and hacking of data during data exchange. This includes but not limited to looking into ISO/IEC 15693 and 18000 standards as well as smart card technology (ISO/IEC 7816 and ISO/IEC 14443) to find the optimal and secure way for wireless private data transfer containing personal and/or medical information. A prototype will be built to confirm and demonstrate the findings related to authentication and data security.
This project focuses on wireless data communication using RFID/WIFI from personal devices to wireless infrastructures and/or between personal wireless devices which includes devices with and without a power source. The data communication process will have an authentication step to begin authorization of the transmission of data located on a device. This project will address the security concerns of RF data communication and different types of wireless and other technologies such as cryptographic functions.
1. Investigation of state of the art authentication techniques.
2. Purpose and implement secure data transfer methodology over unsecure RF
channels.
3. Design and implement a prototype RF wireless system consisting of various
devices such as, smart card or RFIS tag, RF reader or server and adversary
wireless devices.
4. Implement a suitable mutual authentication technique for data transfer.
5. Demonstrate a secure data transfer in the presence of malicious third
part
devices.
1. Investigate and study mutual authentication techniques
2. Study some candidate cryptographic functions and investigate their usage
in terms of software and hardware implementations.
3. Study RFID systems for its suitability in this application.
4. Identify light-weight authentication techniques for RFID or similar wireless
systems.
5. Study various types of third party attacks during authentication and secure
data exchange
5. Establish a prototype RF (wireless system) to implement some candidate
authentication methods.
6. Implement your authentication methodologies and verify their viability.
7. Test the system security by exposing it to various types of malicious
attacks.
1. Investigate and study mutual authentication techniques, cryptographic
functions and smart RF systems suitable for the application.
2. Study various types of third party attacks during authentication and secure
data exchange
3. Select some light-weight authentication techniques for RFID or similar
wireless systems for implementation.
4. Develop a prototype RF (wireless system) by using various off-the-shelf
wireless devices such as RFID readers, Zigbee devices, etc.
5. Implement some promising authentication methodologies and verify their
viability for the application.
6. Test the system security by exposing it to various types of malicious
attacks.
1. Investigate and study mutual authentication techniques and smart RF
systems suitable for the application.
2. Study various types of third party attacks during authentication and secure
data exchange
3. Select some light-weight authentication techniques for smart card wireless
systems.
4. Develop a prototype RF (wireless system) by using off-the-shelf RFID devices.
5. Implement a promising authentication methodology on an RFID system and
verify its viability for the application.
6. Test the system security by exposing it to various third part attacks.
1. Investigate and study various ciphers or cryptographic functions such
as hash functions, XTEA, etc that are suitable for the application.
2. Study secure data exchange methodologies over an unsecure channel.
3. Select some light-weight authentication techniques for a suitable RFID
system implementation.
4. Develop a prototype RF (wireless system) by using various off-the-shelf
Zigbee wireless devices.
5. Implement a promising authentication methodology on the Zigbee systems
and verify its viability for the application.
6. Test the system security by exposing it to various unsecure conditions.
1. Combine the investigation results from student A and B to indentify
the best mutual authentication technique and cipher for implementation.
2. Identify the best secure data exchange methodology over an unsecure channel.
3. Identify a light-weight authentication protocol for RFID systems and Zigbee
type implementation.
4. Test the prototyped RF (wireless system) by using various system testing
methods.
5. Implement the authentication protocol and verify its suitability.
6. Test the system security by exposing it to various malicious 3rd party
attacks.
7. Setup a demo system with the help of student A and B.
COE768, COE718
Mon Sep 4 16:57:49 EDT 2017