Peeling Away Layers of an RFID Security System

Author(s):  
Henryk Plötz ◽  
Karsten Nohl
Author(s):  
Vijayakumar Jalagar ◽  
Shreekant G. Karkun

JURTEKSI ◽  
2021 ◽  
Vol 7 (2) ◽  
pp. 181-186
Author(s):  
Adi Mas Afandi

Abstrack: Motorcycle is one of the transportation tools that are widely used by the people. The community uses motorbikes as a means of daily transportation, whether it's for work, shopping or taking children to school. On the other hand, of course, theft of motor vehicles, especially motorbikes is increasing. Almost every day motorcycle theft occurs. From these problems, a double security system on a motorcycle is needed. The security system using RFID technology can only be accessed using one e-ID card. RFID technology installed on a motorcycle to provide additional security to avoid theft. Keywords: e-KTP; Motorcycle; RFID; Security System  Abstrak: Sepeda motor adalah suatu alat transportasi yang sering digunakan oleh masyarakat. Masyarakat menggunakan sepeda motor sebagai alat trasportasi sehari-hari, baik itu untuk bekerja, berbelanja maupun mengantar anak kesekolah. Pada sisi lain, tentunya pencurian kendaraan bermotor, khususnya sepeda motor semakin banyak. Hampir setiap harinya pencurian sepeda motor terjadi. Dari permasalahan tersebut, dibutuhkan sistem keamanan ganda pada sepeda motor. Sistem keamanan dengan menggunakan teknologi RFID hanya bisa diakses menggunakan satu buah e-ktp. Teknologi RFID yang dipasang pada sepeda motor guna memberikan kemanan tambahan agar terhindar dari pencurian. Kata kunci : e-KTP; RFID; Sepeda motor; Sistem Keamanan


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document