Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID
|
|
- Samson Jennings
- 5 years ago
- Views:
Transcription
1 Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Jennifer King Research Specialist
2 Overview Quick overview of RFID Research Question Context of Inquiry Study + findings Implications for ubicomp and security
3 What is RFID?
4 Terminology RFID: Any technology that transmits specific identifying numbers using radio. [Garfinkel 05] Ubiquitous computing: Making many computers available throughout the physical environment, but making them effectively invisible to the user. [Weiser 93]
5 Evolving Uses of RFID Past: livestock tagging, inventory management Present: proximity cards, library books, supply chain, government issued ID, limited consumer products (Nike +ipod, car keys) Future: clothing, paper clips, currency, baggage...?
6 Our Research RFID is a (somewhat) new and disruptive technology, with the potential for changing how people interact with their environment. We wanted to explore how users think about RFID, if they understand how it works, and how they expect it to work We investigated this approach by examining RFenabled objects in two domains: consumer/commercial: credit cards public: e-passport, public transit 6
7 Related Work Handful of studies exploring use in consumer goods most have raised privacy issues user expectation that tags be disabled after point of purchase Makela et al., CHI 2007: Nokia paper exploring user perceptions of interaction with RFID tags & mobile phones 50 subjects, given RF-enabled phones and posters to interact with compared comprehension of 2d barcodes vs. RFID tags subjects struggled to interact with RF tag - lack of mental models with which to reference Poole et al. (unpublished): used mental models to explore perceptions of RFID 35 subjects, interviews utilizing photo elicitation most subjects confused about capabilities, often ascribing more power than possible (satellites) RFID has no interface -- invisibility, hidden capabilities made subjects paranoid/suspicious about uses raises issues of notice, choice, and consent (FIPs) 7
8 Concerns with RFID Privacy threats: Data - When static, data can be linked to individuals User awareness - user may not realize the object contains a transponder Signaling - object may not notify the user when data is read Security: Tracking/hotlisting - both real time as well as database compilation Eavesdropping/Skimming - reading without knowledge or consent Cloning - tag data can be copied/cloned and reused Increasing Ubiquity - more tags and more readers builds a ubiquitous infrastructure more opportunities for surreptitious reads when object is carried through public places
9 Evolving Uses Identification US e-passport (2006) PASS card (2008) Enhanced drivers licenses (Wash., 2008) Transit Automated tolls: EZ-Pass, FasTrak Transit cards (in US: NYC, Atlanta, Bay Area), widespread in Europe Payment Asia and EU: hybrid transit/payment cards US: credit cards
10 Future Uses product/item level tagging NFC in cell phones for payment and information VeriChip/human implantation 10
11 Current Issues With Gov t Uses of RFID Often no choice when it comes to gov t issued ID Problems with Federal govt s adoption of e- Passport No consideration of user s needs Despite privacy checks in place, PIA didn t address privacy concerns Poor understanding by gov t officials of what RFID is and how it works Lack of expertise in gov t at all levels Poor understanding of implications of what they are building
12 Our Study Investigated user mental models of RF technology and RFID specifically Exploratory research - main portion will be conducted later this year Thus, findings are preliminary Small sample - 9 subjects 3 novices, 3 intermediates, 3 experts - expect our larger sample to have far more novices Examined transit cards, credit cards, and e- Passport Wanted to study real-world objects in use today
13 Mental Models Norman (1983, 1988) Image source: 13
14 Mental Models cont d We applied this concept by attempting to elicit: users MM of RF technology generally MM of the RFID-enabled object we investigated explicitly Methods: short survey to get a baseline measure of subjects attitudes/knowledge of RFID included questions about other RF-enabled objects to triangulate fundamental understanding of how RF works structured interviews with subject discussing use of object, how they thought it worked, how it functioned within a larger system gave user documentation and/or marketing materials to review to see if official docs provided aid 14
15 Our Subjects Most had heard of the term RFID Half had no understanding of how it works Evaluated personal usage scenarios: Transit passes: majority comfortable Keyless entry to home: very mixed Credit card: over half uncomfortable Passport: majority uncomfortable or uncertain 15
16 Transit Cards Most easily understood by users the structure of the interaction (both card & FasTrak) with the reader conforms to user expectations Obvious benefits/efficiencies reduces time, no paper tickets, no need for change Saw little personal risk since information wasn t seen as valuable 16
17 RFID Credit Cards Subjects saw little benefit to RFID didn t think the efficiency gains were worthwhile Concerned about security of payment system several mentioned ID theft Financial data seen as having a more personal impact Most wanted the security of signing for their purchases More comfortable with single use items (transit) than with payment cards 17
18 US e-passport No benefits to passport holder, seen as only benefiting gov t didn t see why it needed to be remotely readable Concerned about security due to: PII stored on document stakes seem higher, important, denotes citizenship lack of faith that gov t was looking out for their interests After examining official documentation, subjects could not articulate clear benefits or risks should users be made aware if risk is minimized? 18
19 Commonalities RFID (usually) = Convenience & Efficiency Where s the beep? - universal expectation of some sort of audible or visible feedback when chip is read Context of implementation is important does the expected use align with user benefits and with information shared/exposed? does the issuer benefit more than the user? 19
20 Notice & Consent None of the subjects were made aware of the presence of the chip by the object s issuer those who did know were made aware by friends or media reports After reviewing educational materials from each issuer, none had any better understanding of how RFID worked or if there were any risks 20
21 Implications for Security Actual risk varies between these 3 objects: epassport: weak encryption, gives non-static ID when queried, can be read when cover is open +1/4 transit cards: static ID but encrypted, bigger risk with transit data storage credit cards: not encrypted, static ID, readable by anyone with reader software In unprotected implementations, mitigating risk depends on your understanding of how RF works (absent clear guidelines) if you don t understand that readers don t have to beep, or the nuances of how RF works, you may not understand how or why to use a shield our novice and intermediate users lacked understanding, generally unable to assess potential risks 21
22 Implications for Ubiquitous Computing People don t get it. And it worries them. How do we introduce this technology to the public in ways that reveals how it works and what it is used for? How do you make use observable (vs. invisible)? esp. true concerning personal data Notice & consent issues: how do we manage the practicalities of N&C? how do we respect one s desire to opt-out? 22
23 Implications for Public Uses Should governments be incorporating this technology into gov t issued ID? Dept. of Homeland Security Privacy Advisory Committee, 2006: But for other applications related to human beings, RFID appears to offer little benefit when compared to the consequences it brings for privacy and data integrity. Instead, it increases risks to personal privacy and security, with no commensurate benefit for performance or national security. 23
24 Coming Soon... US PASS card (2008) WA state enhanced driver s license (released Jan. 08) Both use HF-RFID, read range ~30ft. UID only, no PII 24
25 Questions? Thanks! 25
Definition of RF-ID. Lecture on RF-IDs
Definition of RF-ID RF-ID: Radio Frequency Identification. Indicates the use of Electromagnetic waves to detect and identify TAGS (i.e. labels) purposely attached to objects Basic components (2) Interrogator
More informationMOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification
MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to
More informationRFID and Privacy an antagonism?
BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INORMATION, GERMANY RFID and Privacy an antagonism? Dr. Alexander Dix, LL.M. and Freedom of Information Member of the Art.29 Working Party Statement
More informationEmbedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-passport
Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-passport Marci Meingast Dept. of Electrical Engineering and Computer Science University of California Berkeley,
More informationRFID and privacy - Some industry perspectives (ICC, EICTA)
RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris 2005-10-05 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services.
More informationMULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID
garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at
More informationLayerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com
Layerone / 2006 RFID Technology, Security & Privacy Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com What are we talking about today? RFID history Technologies WiFi tags Privacy/ Security Who am
More informationUnderstanding the role governments and industry organizations play in RFID adoption. Mark Roberti, Founder & Editor, RFID Journal
Understanding the role governments and industry organizations play in RFID adoption Mark Roberti, Founder & Editor, RFID Journal Regulations for spectrum allocation RFID standards development organizations
More informationICAO. ICAO Council JTC1 ISO/IEC. Air Transport Committee SC17 TAG/MRTD WG3 ICBWG NTWG DOC ISO National Bodies.
Electronic Machine Readable Passports: ICAO Standards Barry J. Kefauver Montevideo, Uruguay Summary The work on co-existing technologies began 10 years ago. A number of countries have devoted tremendous
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More informationPreface to the Third Edition. List of Abbreviations
Contents Preface to the Third Edition List of Abbreviations 1 Introduction 1 1.1 Automatic Identification Systems 2 1.1.1 Barcode Systems 2 1.1.2 Optical Character Recognition 3 1.1.3 Biometric Procedures
More informationPresentation Outline
Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity
More informationRFID HANDBOOK THIRD EDITION
RFID HANDBOOK THIRD EDITION RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION Klaus Finkenzeller Giesecke
More informationA comprehensive guide to digital badges.
A comprehensive guide to digital badges. This is your in-depth guide to what digital badges are and how they are used. A FREE RESOURCE FROM ACCREDIBLE.COM A Comprehensive Guide to Digital Badges 2 Introduction
More informationExecutive Summary. The process. Intended use
ASIS Scouting the Future Summary: Terror attacks, data breaches, ransomware there is constant need for security, but the form it takes is evolving in the face of new technological capabilities and social
More informationPrivacy engineering, privacy by design, and privacy governance
CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://
More informationRoadmap to Digital Transformation: Implications for Intelligence
Roadmap to Digital Transformation: Implications for Intelligence Presentation to the Office of the Director of National Intelligence February 26, 2008 Dr. Robert Atkinson President Information Technology
More informationRFID Frequency Overview to Application fit
RFID Frequency Overview to Application fit 1 The Radio Spectrum RFID tags exhibit different characteristics at different frequencies and it is highly unlikely that there will ever be one tag that can be
More informationTTÜ infotehnoloogiateaduskond Informaatikainstituut. Enn Õunapuu Vanemteadur
TTÜ infotehnoloogiateaduskond Informaatikainstituut Enn Õunapuu enn.ounapuu@ttu.ee Vanemteadur Towards a connected world TEDxBNMIT We are moving towards a more connected, instrumented and data driven world
More informationEvaluating OTDOA Technology for VoLTE E911 Indoors
Evaluating OTDOA Technology for VoLTE E911 Indoors Introduction As mobile device usage becomes more and more ubiquitous, there is an increasing need for location accuracy, especially in the event of an
More informationDesigning for End-User Programming through Voice: Developing Study Methodology
Designing for End-User Programming through Voice: Developing Study Methodology Kate Howland Department of Informatics University of Sussex Brighton, BN1 9QJ, UK James Jackson Department of Informatics
More informationHuman RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019
Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationLegislation & Standardization. Pawel Waszczur McMaster RFID Applications Lab McMaster University
1 Legislation & Standardization Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Electromagnetic Spectrum EM Spectrum Issues Wireless Devices using the EM Spectrum Licensed &
More informationThis research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota
Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan
More informationEavesdropping Attacks on High-Frequency RFID Tokens
Eavesdropping Attacks on High-Frequency RFID Tokens p. 1 Eavesdropping Attacks on High-Frequency RFID Tokens Gerhard P. Hancke July 11, 2008 Eavesdropping Attacks on High-Frequency RFID Tokens p. 2 What
More informationSTAUNING Trade-In Internet Sales Process with /Voic Templates to Non-Responsive Prospects 2018 Edition
STAUNING Trade-In Internet Sales Process with Email/Voicemail Templates to Non-Responsive Prospects 2018 Edition Contents 60-DAY INTERNET SALES PROCESS TRADE-IN LEADS... 2 DAY 1 AUTO-RESPONSE (TRADE APPRAISAL)...
More informationResponsible Data Use Policy Framework
1 May 2018 Sidewalk Toronto is a joint effort by Waterfront Toronto and Sidewalk Labs to create a new kind of complete community on Toronto s waterfront that combines cutting-edge technology and forward-thinking
More informationThe aims. An evaluation framework. Evaluation paradigm. User studies
The aims An evaluation framework Explain key evaluation concepts & terms. Describe the evaluation paradigms & techniques used in interaction design. Discuss the conceptual, practical and ethical issues
More informationEXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF
EXECUTIVE SUMMARY St. Louis Region Emerging Transportation Technology Strategic Plan June 2017 Prepared for East-West Gateway Council of Governments by ICF Introduction 1 ACKNOWLEDGEMENTS This document
More informationRFID, user identity and the public interest
RFID, user identity and the public interest lara srivastava senior policy analyst international telecommunication union ANEC General Assembly 1 June 2007, Brussels note: the views expressed in this presentation
More informationFinal Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou
Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer
More informationSTAUNING /Voic Templates to Non-Responsive Trade-In Prospects 2017 Edition
STAUNING Email/Voicemail Templates to Non-Responsive Trade-In Prospects 2017 Edition Contents 30-DAY INTERNET SALES PROCESS TRADE-IN LEADS... 2 DAY 1 AUTO-RESPONSE (TRADE APPRAISAL)... 3 DAY 1 FIRST PERSONAL
More informationThe future of IoT: Expert Survey results
The future of IoT: Expert Survey results The following paragraphs summarise the main findings of the foresight study on the future of the Internet of Things (IoT) and Ambient Intelligence (AmI). The study
More informationGuidelines on Short Range Devices. Spectrum Planning and Licensing
Guidelines on Short Range Devices Spectrum Planning and Licensing DTE 01/08/2014 INTRODUCTION Short-range radio devices (SRDs) are low powered transmitters which provide either unidirectional or bidirectional
More informationIndustry 4.0: the new challenge for the Italian textile machinery industry
Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has
More informationRFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott
RFID Presented by BESSER ASSOCIATES Instructor: Al Scott 1 COURSE OUTLINE Uses of RFID Basic RFID System ISM Frequency Bands Walmart Directive EPC RFID System How RF part of EPC System Works RF antennas
More informationLegislation & Standardization
Legislation & Standardization Understanding the role governments and industry organizations play in RFID adoption Peter Basl, PhD. baslpa@mcmaster.ca (905) 906-1443 McMaster RFID Applications Lab McMaster
More informationPolycarbonate Datapage Security: Hinge Construction
Polycarbonate Datapage Security: Hinge Construction Introduction Over the last two decades, polycarbonate (PC) has grown in use as a substrate for identification documents and become the performance material
More informationThe Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter
The Future of Smart Everyday Objects Advances in Human Computer Interaction 08.11.2007 Sven Steudter Overview Introduction Economical Chances Privacy, Definitions and Risks Social Challenges and Implications
More informationAutomotive Applications ofartificial Intelligence
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 7,6 cm) Automotive Applications ofartificial Intelligence Dr. David J. Atkinson Chassis
More informationNFC Forum NFC Use Cases
NFC Forum NFC Use Cases Peter Preuss Nokia Chairman NFC Forum Marketing Committee September 2009 THE NFC FORUM 2 History and Membership of the NFC Forum Established in 2004 Founded by Philips, Nokia and
More informationWhatever Happened to the. Fair Information Practices?
Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of
More informationRFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy Simson Garfinkel, Beth Rosenberg Click here if your download doesn"t start automatically RFID: Applications, Security, and Privacy Simson Garfinkel, Beth Rosenberg
More informationSmart Cards in the Public Sector
Smart Cards in the Public Sector Interoperability within, across & beyond transport David Sentinella Department for Transport, Local Government and the Regions Cards Nov 2001 Slide No. 1 What is a Smart
More informationContents and Preface of the RFID-Handbook
Contents and Preface of the RFID-Handbook RFID-Handbook, Wiley & Sons LTD 1999 Radio-Frequency Identification: Fundamentals and Applications Klaus Finkenzeller, Munich, Germany ISBN 0-471-98851-0 Contents
More informationPolicy implications 15h00 16h15
COMPLETE RFID Workshop Brussels 2009-10-28 1 COMPLETE Workshop Brussels, October 29, 2009 RFID: Economic Impact & Europe's Competitive Position The Cases of Item Level Tagging and Public Transportation
More information1040 DPI High Resolution Full-page epassport Reader Regula 8703
1040 DPI High Resolution Full-page epassport Reader Regula 8703 The world`s first mobile true high resolution full-page epassport reader featuring 1040 DPI resolution. Automatic reading and authenticity
More informationInfineon at a glance
Infineon at a glance 2017 www.infineon.com We make life easier, safer and greener with technology that achieves more, consumes less and is accessible to everyone. Microelectronics from Infineon is the
More informationTÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers
TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers Questions From which date exactly will this Directive be in power? Answers Member States must publish and apply the
More informationInvestigating the Effect of Temperature in RFID Technology
Paper ID #18531 Investigating the Effect of Temperature in RFID Technology Dr. Tae-Hoon Kim, Purdue University Northwest Dr. Lash B. Mapa, Purdue University Northwest Lash Mapa is a Professor in Industrial/Mechanical
More informationRFID ACCESS CONTROL. SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO
RFID ACCESS CONTROL SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO 1 INTRODUCTION RFID (RADIO - FREQUENCY IDENTIFICATION) systems use RF signals for identification of people, animals and
More informationOil Spill Response User Manual
Oil Spill Response User Manual Seattle Audubon Puget Sound Seabird Survey August 2018 Contents Section 1: Oil Observations Reporting Guidance Introduction to the program. Section 2: Contact Information
More informationHUMAN FACTORS IN VEHICLE AUTOMATION
Emma Johansson HUMAN FACTORS IN VEHICLE AUTOMATION - Activities in the European project AdaptIVe Vehicle and Road Automation (VRA) Webinar 10 October 2014 // Outline AdaptIVe short overview Collaborative
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES. Draft COMMISSION DECISION
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, C(2007) Draft COMMISSION DECISION of [ ] amending Decision 2006/771/EC on harmonisation of the radio spectrum for use by short-range devices EN
More informationDistributed spectrum sensing in unlicensed bands using the VESNA platform. Student: Zoltan Padrah Mentor: doc. dr. Mihael Mohorčič
Distributed spectrum sensing in unlicensed bands using the VESNA platform Student: Zoltan Padrah Mentor: doc. dr. Mihael Mohorčič Agenda Motivation Theoretical aspects Practical aspects Stand-alone spectrum
More informationBasics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009
Basics of RFID technology Thomas Holtstiege Technical Manager EECC October 2009 About the European EPC Competence Center (EECC) First European EPCglobal accredited performance test center Active since
More informationI C T. Per informazioni contattare: "Vincenzo Angrisani" -
I C T Per informazioni contattare: "Vincenzo Angrisani" - angrisani@apre.it Reference n.: ICT-PT-SMCP-1 Deadline: 23/10/2007 Programme: ICT Project Title: Intention recognition in human-machine interaction
More informationArticle. The Internet: A New Collection Method for the Census. by Anne-Marie Côté, Danielle Laroche
Component of Statistics Canada Catalogue no. 11-522-X Statistics Canada s International Symposium Series: Proceedings Article Symposium 2008: Data Collection: Challenges, Achievements and New Directions
More informationTRB Workshop on the Future of Road Vehicle Automation
TRB Workshop on the Future of Road Vehicle Automation Steven E. Shladover University of California PATH Program ITFVHA Meeting, Vienna October 21, 2012 1 Outline TRB background Workshop organization Automation
More information1. First printing, TR , March, 2000.
MERL { A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com Book Review: Biometrics William T. Freeman MERL, Mitsubishi Electric Research Labs. 201 Broadway Cambridge, MA 02139 TR-2000-07 March
More informationForeword The Internet of Things Threats and Opportunities of Improved Visibility
Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks
More informationCross-Border Interoperability Report Overview CANUS CIWG Meeting
Cross-Border Interoperability Report Overview CANUS CIWG Meeting June 21, 2016 Eric Torunski CITIG Executive Director Barry H. Luke NPSTC Deputy Executive Director Presentation Overview Current Cross Border
More informationRFID-ECE4803 Lecture 2. Prof. Manos M. Tentzeris
RFID-ECE4803 Lecture 2 Prof. Manos M. Tentzeris (etentze@ece.gatech.edu) Data Rate bit/sec 1G 100M 10M 1M Communication by Applications 802.15.3c mm-wave 802.15.3 UWB WPAN 802.15.1 Bluetooth 802.15.4 ZigBee
More informationClimate Asia Research Overview
Climate Asia Research Overview Regional research study: comparable across seven countries The Climate Asia research was conducted in seven countries: Bangladesh, China, India, Indonesia, Nepal, Pakistan
More informationEffective Iconography....convey ideas without words; attract attention...
Effective Iconography...convey ideas without words; attract attention... Visual Thinking and Icons An icon is an image, picture, or symbol representing a concept Icon-specific guidelines Represent the
More informationGlobal harmonization of short-range devices categories
Recommendation ITU-R SM.2103-0 (09/2017) Global harmonization of short-range devices categories SM Series Spectrum management ii Rec. ITU-R SM.2103-0 Foreword The role of the Radiocommunication Sector
More informationUbiquitous Computing. Spring 2010
Ubiquitous Computing Spring 2010 - Making Sense of Sensing Systems: Five questions for designers and Researchers - Distributed mediation of ambiguous context an aware environments - RFID: A key to Automating
More informationThe SONNETS Innovation Identification Framework
The SONNETS Innovation Identification Framework The project leading to this application has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement
More informationRENAULT CMF1 BCM BCM_CMF1_01
Document: User Manual / Functional Description Project: RENAULT CMF1 BCM BCM_CMF1_01 Date: October 1, 2014 Number of pages: 10 Name: Department: Phone: Date: Sign: Author: Jérôme Lee I B&S CF PG3 CFRF
More informationShould privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009
Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 1 Today s presentation Databases solving one problem & creating another What is a privacy impact
More informationA UHF Radio Frequency Identification (RFID) System for Healthcare: Design and Implementation
A UHF Radio Frequency Identification (RFID) System for Healthcare: Design and Implementation A. C. Polycarpou 1, G. Gregoriou 1, A. Dimitriou 2, A. Bletsas 3, J. N. Sahalos 1,2 Cyprus Academic Research
More informationBloodhound RMS Product Overview
Page 2 of 10 What is Guard Monitoring? The concept of personnel monitoring in the security industry is not new. Being able to accurately account for the movement and activity of personnel is not only important
More informationTHE FIRST TO RESPOND. THE LAST TO GO HOME.
THE FIRST TO RESPOND. THE LAST TO GO HOME. MOTOROLA APX Mobile Radios Safety Redefined. GET MORE INFORMATION. WITH LESS INTERACTION. During a high-speed pursuit or commanding a Fireground scene, communication
More informationPreparatory paper: food for thought
CNS SYMPOSIUM 2-3 October 2018 EUROCONTROL s Brussels HQ Preparatory paper: food for thought 1 Introduction EUROCONTROL will host a two-day interactive CNS Symposium on October 2 nd and 3 rd, 2018. This
More informationWireless Environments & Privacy
Wireless Environments & Privacy Patricia S. Taylor Eastern Illinois University & Robert E. McGrath NCSA, University of Illinois EDRA Vancouver, BC -- May 2005 Introduction Views from a Social Scientist
More informationELT0040 RFID ja NFC. Enn Õunapuu ICT-643
ELT0040 RFID ja NFC Enn Õunapuu enn.ounapuu@ttu.ee ICT-643 What Is NFC? NFC or Near Field Communication is a short range high frequency wireless communication technology. NFC is mainly aimed for mobile
More informationContextual Design Observations
Contextual Design Observations Professor Michael Terry September 29, 2009 Today s Agenda Announcements Questions? Finishing interviewing Contextual Design Observations Coding CS489 CS689 / 2 Announcements
More informationInstallation Instructions RF identification system Read/write head ANT430 ANT431
Installation Instructions RF identification system Read/write head ANT430 ANT431 UK 80262949 / 00 04 / 2017 Contents 1 Preliminary note...4 1.1 Symbols used...4 2 Safety instructions...4 2.1 General...4
More informationAssociate Professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)
Foundations of Secure e-commerce (bmevihim219) Dr. Levente Buttyán Associate Professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu
More informationWireless systems. includes issues of
Wireless systems includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs. digital, bits & bytes software applications, operating system organization
More informationJapan s FinTech Vision
Japan s FinTech Vision First Comprehensive Industrial Finance Division Economic and Industrial Policy Bureau Ministry of Economy, Trade and Industry 1 FinTech: New Finance to Support the Fourth Industrial
More informationUnderstanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30
Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM
More informationPN5180 The best full NFC frontend on the market
PN580 The best full NFC frontend on the market Product support package Public MobileKnowledge January 206 Agenda Watch recording Session 27 th January: PN580 product support package Where to find PN580
More information2001 HSC Notes from the Examination Centre Design and Technology
2001 HSC Notes from the Examination Centre Design and Technology 2002 Copyright Board of Studies NSW for and on behalf of the Crown in right of the State of New South Wales. This document contains Material
More informationIS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar
IS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar Given the recent focus on self-driving cars, it is only a matter of time before the industry begins to consider setting technical
More information2. ROADSIDE TOLL COLLECTION SECTION 01.
2. ROADSIDE TOLL COLLECTION 1 SECTION 01. Toll System Configuration Cash Tolls Violation Enforcement/Video Toll Collection Systems 2 Toll System Configuration Open (barrier tolls) Tolls collected as vehicles
More informationEthical and social aspects of management information systems
Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How
More informationV I S O c o r e I n s p e c t
V I S O c o r e I n s p e c t S o f t wa r e s o l u t i o n f o r s e c u r e d o c u m e n t v e r i f i c at i o n Passports and ID cards prove our identity. In order to improve and facilitate the verification
More informationTechnologies that will make a difference for Canadian Law Enforcement
The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,
More informationTech Report Abstracts of recent published South African patents May 2014
Tech Report Abstracts of recent published South African patents May 2014 Title: ELECTRONICALLY MONITORED SAFETY LOCKOUT DEVICES, SYSTEMS AND METHODS Patent No: 2013/03234 Applicant: Master Lock Company
More informationCommunication with FCC s Office of Engineering Technology Regarding ISM Compliance of Power-Optimized Waveforms
Communication with FCC s Office of Engineering Technology Regarding ISM Compliance of Power-Optimized Waveforms Document ID: PG-TR-081120-GDD Date: 11 November 2008 Prof. Gregory D. Durgin 777 Atlantic
More informationLocation Based Technologies
Location Based Technologies I have often wondered whether people really understand Location Based Services (LBS) technology and whether they would like a bit more insight into how exactly location based
More informationCO-ORDINATION MECHANISMS FOR DIGITISATION POLICIES AND PROGRAMMES:
CO-ORDINATION MECHANISMS FOR DIGITISATION POLICIES AND PROGRAMMES: NATIONAL REPRESENTATIVES GROUP (NRG) SUMMARY REPORT AND CONCLUSIONS OF THE MEETING OF 10 DECEMBER 2002 The third meeting of the NRG was
More informationPhysical Affordances of Check-in Stations for Museum Exhibits
Physical Affordances of Check-in Stations for Museum Exhibits Tilman Dingler tilman.dingler@vis.unistuttgart.de Benjamin Steeb benjamin@jsteeb.de Stefan Schneegass stefan.schneegass@vis.unistuttgart.de
More informationWe would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page.
Fluent in Fintech Whether you are developing, procuring, or investing in financial technology we understand the opportunities and challenges your business can face and we are keen to support ambitious
More informationMoving Industry 4.0 from Concept to Implementation and Value
Powder & Bulk Solids Moving Industry 4.0 from Concept to Implementation and Value Image courtesy of Festo AG & Co. KG By John S. Forrester, Managing Editor, Powder & Bulk Solids November 28, 2016 Much
More informationPublic Engagement Experiences in Local Road Systems Decision- Making in Minnesota. Guillermo E. Narváez, Ph.D. Humphrey School of Public Affairs
Public Engagement Experiences in Local Road Systems Decision- Making in Minnesota Guillermo E. Narváez, Ph.D. Humphrey School of Public Affairs Acknowledgements Prof. Kathy Quick Prof. Jerry Zhao Emily
More informationFlexible Electronics: Revolutionary Products and Career Opportunities for Creative Engineers
Flexible Electronics: Revolutionary Products and Career Opportunities for Creative Engineers TAPPI - PIMA Student Summit 2011 Michael Ciesinski President January 15, 2011 Microelectronics changed the world
More informationMobile Security Fall 2015
Mobile Security Fall 2015 Patrick Tague #8: Location Services 1 Class #8 Location services for mobile phones Cellular localization WiFi localization GPS / GNSS 2 Mobile Location Mobile location has become
More information