By: Group 7

spectacularscarecrowΤεχνίτη Νοημοσύνη και Ρομποτική

17 Νοε 2013 (πριν από 3 χρόνια και 10 μήνες)

91 εμφανίσεις

By: Group 7

Presented by Wasan Amnatwipavee (
TP011279)

What is Ubiquitous Security?


Ubiquitous Security identifies users and the surroundings
properly to offer suitable services desired by “Individuals”
safely and securely that “dynamically” change security
levels according to the situation.


Assist all users (from all walks of life, young and old,
disabled) to enjoy the safe reliable service of ICT.


E.g. A person is identified through biometrics, while an object is
identified by RFID as an “individual” distinguished from others.
In addition, the network can detect autonomously a person’s
location or surrounding environment using video camera
systems, environmental sensors, or positioning systems such as
the global positioning system (GPS). The network can also
monitor the person’s health conditions and behaviour through
sensors placed on one’s body.


Presented by : Wasan Amnatwipavee
(
TP011279)



What does it do?


Prevent from intruder


Example


Finger scan device, Fire wall


Prevent from threads


Example


Anti
-
virus , Anti
-
spyware


Increase efficiency of services


Example


Identity card reader




Presented by : Wasan Amnatwipavee
(
TP011279)


Situations where ubiquitous
computing exist


Production/Distribution


Production objects are tagged with RFIDs in factories,
farms with various sensors embedded in the
environment to manage and monitor product quality,
location and to track path during distribution.


Transport


Embedded chips in roads to monitor vehicle movements
to prevent collisions, improve traffic flow this creating a
safe energy efficient traffic system.


Presented by : Wasan Amnatwipavee
(
TP011279)

References


Katsumasa Shinozuka, President and CEO (2007),
Ubiquitous Security


Towards Realization of a Safe
and Secure Digital World, accessed on 10 April 2008
from
http://www.oki.com/en/otr/210/downloads/otr
-
210
-
R19.pdf

.


Timothy K. Buennemeyer Randolph C. Marchany
Joseph G. Tront,Bradley Department of Electrical and
Computer Engineering,Virginia Polytechnic Institute
and State University,
accessed on 10 April 2008 from
http://www.vs.inf.ethz.ch/res/papers/privacy
-
principles.pdf



Presented by : Wasan Amnatwipavee
(
TP011279)

Presented by

Povanaswari Devindaran (TP010961)

The Flaws of Biometrics Security

Presented by : :Povanaswari
Devindaran

(TP010961)


[1] Not every biometric solution fits every security problem, and some companies, such as Keyware
Solutions of Woburn, MA, promote a layered approach using card and code systems with biometric
technologies.


The flaws in biometrics security technology features


Facial Recognition


Low light or a surgeon wearing a facemask reduces the effectiveness of facial recognition


Iris Scanning


can be uncomfortable for the person who must get close to the scanner.


Palm Recognition


measures the height of the fingers, distance between the joints and the shape of the knuckles, but
is less accurate than other approaches and little used in healthcare


Voice Recognition


A noisy emergency room environment makes voice verification less useful.


Fingerprint


Most widely used in health care security (HOSPITALS) but a slight changes on the finger print
such as cuts may cause recognition problems.


Flaws of Biometrics Security


[
1
]

“Biometrics

security

may

be

high

level

security

to

be

invaded

but

it

should

be

taken

into

consideration
.

This

is

because

a

well

secured

system

that

has

never

been

invaded

will

be

a

system

with

no

users
.

Such

system

is

useless
.


said

Danny

Chu

the

Keyware

Solutions

Managing

Director
.


According

to

Danny

Chu,

applying

security

features

in

a

system

is

akin

to

placing

roadblocks

in

front

of

intruders
.

Security

comes

in

how

many

roadblocks

you

put

in

front

of

intruders

and

how

widespread

the

roadblocks

are

for

intruders

to

get

over

them
.

Biometrics

is

another

roadblock

for

any

intruder
.
"



According

to

the

Ronald

E
.

Keener

biometrics

security

are

best

fitted

in

hospitals

because

doctors

and

nurses

require

speedy

access

in

other

departments

in

a

hospital

and

smart

card

and

password

features

of

security

is

messy

process

of

security

for

them
.


Presented by : :Povanaswari
Devindaran

(TP010961)

RFID another security solution


RFID


[2] Radio Frequency Identification (RFID) is the
quintessential Pervasive Computing technology.


[2] Information about RFID
-
tagged objects can be
transmitted for multiple objects simultaneously,
through physical barriers, and from a distance.


[2] In line with Mark Weiser’s concept of “ubiquitous
computing” [1], RFID tags could turn our interactions
with computing infrastructure into something hidden
and inspiring.

Presented by : Povanaswari
Devindaran

(TP010961)

RFID another security solution


RFID tags helps in counterfeiting of goods that comes
from all types such as pharmaceutical drugs, designer
items, money, travel bags, and many others.


RFID technology manages :
-


Supply chains


Mediates access to buildings


Children’s safety


RFID a good security solution for ubiquitous environment
because


Implementation cost is low compared to biometrics


Small in size and can be embedded


Can be carried in any form because of it ability to be
embedded. (Can be embedded in jewelry, and watches)



Presented by : Povanaswari
Devindaran

(TP010961)

Wearable Stuffs with RFID

Presented by : Povanaswari
Devindaran

(TP010961)

The

FLORA

(Fluorescent

Light

Organizing

Radio

Accessory)

-

RFID

Watches

Picture Taken From: http://www.we
-
make
-
money
-
not
-
art.com/yyy/abudd.jpg

Mybi Cards


cellphone styles with RFID shopping
capabilities

Picture Taken From:
http://www.weblogsinc.com/common/images/63366673
44488645.jpg?0.16142709965392676

References


[1] Ronald E.Keener (2000),
Put Your Finger on the Right
Solution
-

Technology Information, Health Management
Technology (Dec, 2000), accessed on 2
nd

April 2008 from
http://findarticles.com/p/articles/mi_m0DUD/is_12_21/ai_
68643926


[2] Melanie R. Rieback, Patrick N.D. Simpons, Bruno
Crispo, Andrew S. Tanenbaum, RFID Malware: Design
Principles and examples (Feb 2006), accessed on 24
th

April
2008 from
http://www.cs.vu.nl/~ast/publications/pmc
-
2006.pdf


Presented by : Povanaswari
Devindaran

(TP010961)

Presented by Goh Da Suan

It is just biometric?

No


Why?

-
Easily gain access to others information

-
Privacy and security

-
non
-
cancelable

Presented by :
Goh

Da

Suan

What is the solution?


Combination of different security method


Use biometric as a key to decrypt the information

o
Biometric encryption


-
Fingerprint Recognition


-
Optical Recognition


-
Facial Structure Recognition


-
Voice Recognition


-
Signature Recognition


-
Keystroke Recognition

Presented by :
Goh

Da

Suan

Reference


Biometric Encryption,
accessed on 20 April 2008 from
http://www.emory.edu/BUSINESS/et/biometric/Biometrics.htm


Biometric Encryption: A Positive
-
Sum Technology that Achieves
Strong Authentication, Security AND Privacy,
Ph.D. Ann Cavoukian,
Ph.D. Alex Stoianov,
accessed on 21 April 2008 from
http://www.ipc.on.ca/images/Resources/up
-
1bio_encryp.pdf


Presented by :
Goh

Da

Suan