Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
ANDROID SECURE DEPLOYMENT & NFC BASED E-LIBRARY IMPLEMENTATION
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology.
2015 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

This thesis communicates a new approach for the future Library system using secure NFC technology. Today we can use NFC and Android based mobile phones to build modern library system in which user will instead of standing in the queue can directly borrow and return books. The NFC technology which will use in this thesis is capable of storing small amount of information. This storage will be used for maintaining the books records. Although the NFC works in close proximity but still there are possibilities of attacks. Due to contact less communication the victim cannot notice the attacks. There are different types of attacks which can occur including modification of data and listening to the communication by unknown user. Therefore in this thesis the author will look into how one can protect the system from these kinds of at-tacks. The motivation behind the thesis is to introduce scalable cloud based infrastructure as a backbone Library. Current systems using bar code technology are not secure. Therefore an infrastructure needs to be built which includes cloud based server for key distribution and data storage. Furthermore, this thesis includes a study of the encryption and decryption schemes for close proximity communications. A new novel algorithm has been introduced and implemented as an encryption scheme for this thesis work. The Huffman scheme has been modified and 16 bit keys have been used for the key exchange. The new approach is compared with the existing techniques and found that it is reliable as compared to other techniques.

Place, publisher, year, edition, pages
2015. , 50 p.
Series
IT, 15018
Keyword [en]
Cloud based Server, Attacks, Heterogeneous Networks, Authentication, RFID tags, NFC, Partial keys.
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:uu:diva-251590OAI: oai:DiVA.org:uu-251590DiVA: diva2:806725
Examiners
Available from: 2015-04-21 Created: 2015-04-21 Last updated: 2015-04-21Bibliographically approved

Open Access in DiVA

fulltext(1097 kB)418 downloads
File information
File name FULLTEXT01.pdfFile size 1097 kBChecksum SHA-512
4df585bfffb8496bf33b57d9d3aaee62a4cf0118e3c55fabf9a932c9a3ac12f761d95107feca2c61b08eaa32378fcc99ce46b5a4d617e10e806fdfe24f88167d
Type fulltextMimetype application/pdf

By organisation
Department of Information Technology
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 418 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 674 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf