PegaxEducationWiki
☰
Menu
jtt
kotitehtaevaet
laboratoriotyoe
luennot
Johdatus tietoturvaan
Johdatus tietoturvaan
Johdatus tietoturvaan
Tietoturvan perusteet
Tietoturvan perusteet
Johdatus tietoturvaan
Johdatus tietoturvaan
Tietoturvan perusteet
muu_materiaali
netsec
exercises
ex1
ex2
ex3
ex4
decrypt.py
encrypt.py
hash.py
verify.py
ex5
ex5_example_answer
ex6
labworks
Laboratory work 1: Network monitoring (14p)
Laboratory Work: Intrusion detection (20p)
Laboratory work: firewalls (16p)
luennot
Secured Communications
CT30A8800 Secured communications
CT30A8800 Secured communications
CT30A9700 Network Security
Network Security
CT30A9700 Network Security
Symmetric cryptography
practical_assignment
old_courses
csa
Communication software and architecture
ASN.1
asn1-2009
assistant
Communications Software and architecture
Communications Software and architecture
Wireless Service engineering
ommunications software and architecture
Communication software and architecture
Communication software and architecture
Communications Software and architecture
Software Design Document
Specification & Description Language (SDL)
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications Software and architecture
Communication software and architecture
Communication software and architecture
CT30A5800 - COMMUNICATIONS SOFTWARE AND ARCHITECTURE
CT30A5800 - COMMUNICATIONS SOFTWARE AND ARCHITECTURE
Communications software and architecture
Communications software and architecture
Communications Software and architecture
SDL
Links
A Need for Standards
State Machines
Communications software and architecture
requirements model
Communications Software and Architecture
Communications Software and Architecture
Unified Modeling language (UML)
cspa
CSPA
Communication software and architecture
Communication software, Protocols and architecture
Communications Software Protocols and Architecture
Byte Count Coding
Code
Communications software, Protocols and Architecture
Common comments for phase1 specification
Communication Software, Protocols and architecture
Communications Software, Protocols and Architecture
cspa -- Communications Software, Protocols and Architectures
Exercises finding generic software requirements
CSA Exercises & Project Work Arrangements
CSA Exercises 0901
Communications Software Architecture Exercies
CSA Homework 2: Entity - Message - Interface Modeling
CSA Project Work
CT30A6000 - COMMUNICATIONS SOFTWARE, PROTOCOLS AND ARCHITECTURE
CSPA Implementation demonstration times
CSPA Development environment
Communications Software, Protocols and Architecture
CSPA Exercise 01: Introduction to development environment, eclipse and python
CSPA Exercise 02: Intro to Visual Paradigm and Sequence diagrams
CSPA Exercise 03: Modeling with State Machines
Exercise 04: Programming with state machines
CSPA Exercise 05: Communications system architecture, modeling
Exercise 06: Modeling abstract messages
Exercise 07: Specifications
Exercise 08 Concrete Message Coding
CSPA Exercise 09: TCP and BSD Socket usage
Exercise 09 code
Exercise 10: Introduction to concrete message coding
Exercise 10 code
CSPA Exercise 11: Chat system over tcp with PyQt
Exercise 11 Code
CSPA Exercises and Project Work Schedule
Communications software, protocols and architecture
Glossary
Review checklist
CSPA Project Work Groups
Homework 02: State Machines and Sequence Diagrams
Homework 03, messages
CSPA Homework 04, coding
CSPA Homework 05
CSA Homework: Communications system
Communication software and architecture
Communication software and architecture
Communication software and architecture
test
Communications software, protocols and architecture
Lectures
Communications Software, Protocols and architecture
CSPA Project Work
CT30A6000 - COMMUNICATIONS SOFTWARE, PROTOCOLS AND ARCHITECTURE
Python resources
Returning works
Communications Software Protocols and Architecture
CSPA
Specification
Communications Software, Protocols and Architecture
Communication Software, Protocols and Architecture
TCP Package
Communications Software Protocols and Architecture
Communications Software Protocols and Architecture
Util package
Visual Paradigm Instructions
langatontietoliikenne
Langaton Tietoliikenne
Analogiset järjestelmät
Wireless communications (langaton tietoliikenne) Course contents
Langaton Tietoliikenne
GPRS ja EDGE
Matkapuhelintekniikat
Langaton tietoliikenne: MAC
Matkapuhelinverkot
Langaton tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
oldintro
wse
wse2013
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
NOTE
wse2014
Touch Zones
Wireless Service Engineering
rfid_security
RFID security
Report for European Union on RFID
secured_communications
Secured Communications
ElGamal
Secured Communications
CT30A8800 Secured communications
ECDSA
Domain parameters
Exercises 2009 - 2010
CT30A8800 Secured communications
CT30A8800 Secured communications
Course material
lectures_2009
Introduction to lightweight security protocols
CT30A8800 Secured communications
CT30A8800 Secured Communications
Practical assigment
Secured communications Practical assignment 2010
CT30A8800 Secured communications
Seminars
Seminars
CT30A8800 Secured communications
Symmetric cryptography
tietoturvanperusteet
2009
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Luennot
Tietoturvan perusteet
Tietoturvan perusteet
TIETOTURVAN PERUSTEET
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet
Tietoturvan Perusteet
2010
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
courses
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturva kirjallisuutta
Luennot
Luennot
Luennot
Tietoturvan perusteet -luentomateriaali 2007 (pdf)
Tietoturvan perusteet
Yleiset tietoturvaongelmat ohjelmissa
TIETOTURVAN PERUSTEET
TIETOTURVAN PERUSTEET
Palomuurit
Tietoturvan perusteet
Tietoturvan perusteet
salaus
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietosuoja
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
other
sai_rfid_security
ssotc-prelecture
Introduction to lightweight security protocols
Wireless service engineering
theses
dsc
Guide for Doctorate studies and thesis work
msc
tietoturva
harjoitukset
calc_key.py
Tietoturvahyökkäykset mediassa
Tietoturvahyökkäykset mediassa
Tiedon salaus Pythonilla
Lohkosalaimen teko Pythonilla
Matematiikkaa
Python Cryptography Toolkit
Sähköinen allekirjoitus pythonilla
Diffie-Hellman avaimenvaihto
Python Cryptography Toolkit - Tiedon salaus
Epäsymmetrinen salaus
Snort
harjoitukset2011
Sähköinen allekirjoitus pythonilla
Snort
aes_crypt.py
aes_decrypt.py
cbc.py
check_md5.py
ecb.py
Tietoturvahyökkäykset mediassa
hash.py
Matematiikkaa
Diffie-Hellman avaimenvaihto
Lohkosalaimen teko Pythonilla
rsa_sign.py
salaa_ja_avaa
Python Cryptography Toolkit - Tiedon salaus
Tiedon salaus Pythonilla
Python Cryptography Toolkit
Wireshark - verkkoliikenteen kaappaus
luennot
Tietoturva
Tietoturva
Tietoturva
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturva
Tietoturva
Tietoturva
Tietoturva
Lisämateriaalia
Tietoturva
Tietoturvan perusteet
Tietoturva
Tietoturva
Steganografia
Tietoturva
Tietoturva
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturva
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturva
TIETOTURVAN PERUSTEET
Tietoturvan Perusteet
Harjoitustyö 2013
Laboratoriotyö 1
Linkkejä
wse
wse2008
Wireless service engineering
Wireless Service Engineering
Wireless Service engineering
Bluetooth SDP
bthildon.py
Wireless Service Engineering
Basement 6218 Connectivity with N810
Wireless service engineering
WSE Demonstration Day Schedule
Wireless Service Engineering
Wireless Service Engineering
dl-services
WSE Exercises
Exercises, Introduction
Exercises, Environment
Exercises, GUI
Exercises, libosso
Exerciseses Bluetooth with Python
Connectivity
Exerciseses Bluetooth with Python 2
N810 and Connectivity
WSE Project Work Groups
Example Code for GUI programming
Instructions
Resources
Mobile environment used at course
Resources
Packaging
Wireless Service engineering
WSE Project Work, Phase 1 specification and design feedback
Practical assignment Phase I
Project Work Implementation
Problems in development
WSE Resource and links
Wireless Service Engineering
Wireless service engineering
Wireless Services engineering
Source Code
hah
Wireless Service engineering
Wireless service engineering
Wireless Service Engineering
Wireless Service Engineering
Wireless Service Engineering
NOTE
wse2010
Wireless service engineering
Architectures
Wireless Service Engineering
Wireless Service engineering
Bluetooth
Bluetooth 2.
Bluetooth
Bluetooth SDP
bthildon.py
Cellular technologies
Wireless Service Engineering
Basement 6218 Connectivity with N810
Wireless service engineering
Context-Awareness
WSE Demonstration Day Schedule
Wireless Service Engineering
Wireless Service Engineering
Device capabilities
dl-services
Environment
WSE Exercises
Exercises, Introduction
Exercises, Environment
Exercises, GUI
Exercises, libosso
Exerciseses Bluetooth with Python
Connectivity
Exerciseses Bluetooth with Python 2
N810 and Connectivity
WSE Project Work Groups
Example Code for GUI programming
Graphical User Interfaces (GUI)
Instructions
LibOSSO
Resources
Mobile environment used at course
Maemo4.1 development environment
Maemo Connectivity
Resources
Mobile Payment
Environment background
Packaging
Wireless Service engineering
Personal Area Networks
WSE Project Work, Phase 1 specification and design feedback
Practical assignment Phase I
Project Work Implementation
Problems in development
WSE Resource and links
Wireless Service Engineering
Security
Wireless service engineering
Service Discovery
Wireless Services engineering
Services
Source Code
hah
Wireless Service engineering
Touch Zones
Wireless communication medium
Wireless service engineering
Wireless Service Engineering
Wireless Service Engineering
Wireless Services
Wireless devices & their development issues
Wireless Local Area Networks
Wireless Service Engineering
WSE2010 Course Overview
NOTE
wse2011
Wireless Service Engineering
wse2012
Architectures
Arduino
Background
Bluetooth
Device capabilities
Cellular technologies
Context-Awareness
Location
Personal Area Networks
Mobile Payment
Security
Service Discovery
Wireless Services
Services
Touch Zones
Wireless communication medium
Wireless devices & their development issues
Wireless Local Area Networks
Wireless Service Engineering
Wireless Service Engineering
NOTE
wse2013
Arduino
Bluetooth
Device capabilities
Context-Awareness
Location
Personal Area Networks
Mobile Payment
Security
Service Discovery
Wireless Services
Visions
Touch Zones
Wireless communication medium
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
NOTE
wse2014
Arduino
Bluetooth
Device capabilities
Context-Awareness
Wireless Service Engineering: Location
Personal Area Networks
Mobile Payment
Overview of the project
Security
Service Discovery
Wireless Services
Visions
Touch Zones
Wireless communication medium
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
Wireless Service Engineering - Exercises
You are here:
start
»
wse
»
wse2013
»
touch_zone
Touch Zones
RFID
Radio Frequency IDentification
Based on magnetic field induction
Plenty of standards
ISO IEC 105536, 14443, 15693
Many other ISO standards for different application areas
ETSI 308-220, 302
RFID system = RFID transmitter(tag) + RFID reader
Passive systems → tag has no power source
Power gained from incoming radio signal & magnetic field (faradays law)
Tags are either Read Only
(RO)
or Read & Write
(RW)
Reader may have several antennas
May read several tags at the same time
Frequency
3 frequency areas
Low - 100 - 500 KHz (passive)
Medium - 10 -15
MHz
(passive)
Low & Medium frequeny systems require almost contact
High (passive / active)
UHF: 433.5 - 434.5
~850 - 950
MHz
Microwave : 2.4
GHz
- 5.8
GHz
Several bands used in these areas
High frequency sytems have longer range
Data rates
Data rates vary
Electromagnetic fields cause problems
Application areas
User authentication (RFID based keys)
Product authentication
Electronic Product Code (EPC)
EAN barcode compliment/replacement
Product tracking
Logistics
Fabrication protection
Security
Unauthorised reading
Eavesdropping
Tag destroying
Tag fabrication
Privacy loss
Nokia Mobile RFID kit for Nokia 5140 & 5140i
Through express on RFID shells
Do it yourself - Auth with RFID
Required - RFID tag & RFID reader
Connect reader to PC's serial port
Move tag close to reader
Read tag data through serial connection
Store tag information to DB besides with user id
Create PAM module
Reads the serial line at login & compares it with data stored on DB
Create nice UI to add & remove users to / from system
NFC
Near Field Communication
Magnetic field induction to enable communication between two devices
13.56
MHz
unregulated RF band
Standardised by ECMA International
ECMA-340 NFC Interface & Protocol (NFCIP-1)
EMCA-352 NFCIP-2
Standards for interface & protocol tests also
Communication
Range is 0 - 20 cm
Employs half duplex
Listen before talk policy
Speeds of 106, 212 or 424 Kbps
P2P networking
Initiator initiates & controls the data exchange
Target is the responding device
Operation modes
2 operation modes
Active mode
Both devices generate own RF field for communication
Passive mode
Only one device (Initiator) generates RF field
Target device uses load modulation to transfer data
Saves battery of battery operated target devices
Aim → simplify communications
Connection forming & data transfer requires
Start App & move devices close to each other
Compatible with FeliCa & MIFARE contactless smartcard protocol
FeliCa developed by Sony & MIFARE is a Philips spinoff
MIFARE: Over 1 Billion smartcard chips & 10 million reader modules sold
Nokia 3220, 6131 & 6212 have NFC shells -
Mobile future?
NFC scenarios
Set up communication between 2 devices
Move devices close to each other
Devices transmit their Bluetooth data over NFC
Based on over NFC transmitted data connection is formed
Transfer content
Take picture with camera
Touch TV with camera to transfer picture to TV
Active advertisement
Touch tag on advertisement with mobile phone
Mobile phone connects to WAP page defined on the tag
Touch a tag of phone number & mobile phone calls that number
Electriciy man - Nokia Fied force solution demo
Payment system & mobile tickets
Considerations
How can we benefit from touch zone technologies
Does the use of touch zone actually add value to service?
Do we ease the use of the service or not?
Is the technology supported by the devices intended for use on our service?
Should we use plain RFID or NFC?
Last modified:
2013/07/01 14:42
Log In
Show pagesource