Ind
o
n
es
ian Jou
r
n
al
o
f
E
le
ctric
a
l E
n
g
in
ee
r
ing
and
C
o
mp
u
t
er
S
c
ienc
e
V
ol
. 8
,
No.
3,
Dec
em
be
r
20
17
, p
p.
7
3
0
~
7
3
2
DO
I: 1
0.
11
5
91
/
i
j
ee
c
s
.v
8
.i
3
.
pp
7
3
0
-
7
3
2
730
Rec
ei
v
ed
J
un
e
29
,
20
1
7
; R
ev
i
s
ed
A
ug
us
t 1
5
,
20
1
7
;
A
c
c
ep
ted
S
e
pte
mb
er
23
,
20
1
7
NFC Sec
ured
O
f
flin
e Pa
s
s
w
ord
Storage
S
ent
h
il Kum
ar
M
*
,
V
M
ath
iv
anan
Dep
a
rtm
e
n
t
o
f
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
,
AM
E
T
Un
i
v
e
rs
i
ty
,
Ch
e
n
n
a
i
Ab
strac
t
In
th
i
s
p
a
p
e
r
i
s
a
l
l
a
b
o
u
t
c
o
n
s
tru
c
ti
n
g
a
d
e
v
i
c
e
c
a
l
l
e
d
“
O
n
e
-
W
O
RD
”
th
a
t
a
i
m
s
to
s
o
l
v
e
th
i
s
p
ro
b
l
e
m
.
O
n
e
-
word
i
s
a
n
o
ff
l
i
n
e
p
a
s
s
wor
d
k
e
e
p
e
r
a
i
m
e
d
a
t
s
a
v
i
n
g
a
n
d
e
n
c
r
y
p
t
i
n
g
th
e
p
a
s
s
word
s
i
n
a
m
o
r
e
s
e
c
u
re
m
a
n
n
e
r.
T
h
e
m
a
i
n
d
e
v
i
c
e
c
o
n
ta
i
n
s
t
h
e
e
n
c
r
y
p
t
e
d
p
a
s
s
word
s
wh
i
l
e
a
s
e
c
u
re
NFC
s
m
a
rtc
a
r
d
a
n
d
a
p
e
rs
o
n
a
l
p
i
n
-
c
o
d
e
a
l
l
o
ws
t
h
e
d
e
c
ry
p
ti
o
n
.
Ev
e
n
i
f
a
n
a
tt
a
c
k
e
r i
s
a
b
l
e
t
o
g
e
t
h
o
l
d
t
h
e
s
m
a
rtc
a
r
d
,
o
r t
h
e
d
e
v
i
c
e
i
t
i
s
c
o
m
p
l
e
te
l
y
u
s
e
l
e
s
s
wi
t
h
o
u
t
th
e
p
e
rs
o
n
a
l
c
o
d
e
.
Key
w
ords
:
NFC, Co
m
m
u
n
i
c
a
t
i
o
n
,
Sm
a
rt
c
a
rd
Copy
righ
t
©
2
0
1
7
In
s
titu
te
o
f
Adv
a
nc
e
d
Eng
in
e
e
ring
a
nd
Sc
ie
nc
e
.
All
righ
t
s
re
s
e
rve
d.
1.
Int
r
o
d
u
ctio
n
S
ec
urit
y
i
n
an
organ
i
z
at
i
o
na
l
en
v
i
r
o
nm
en
t
l
i
k
e
a
u
ni
v
ers
i
t
y
i
s
al
wa
y
s
a
s
ol
i
c
i
tud
e
.
A
c
c
ordi
n
g
to
t
he
N
ati
on
a
l
A
s
s
oc
i
ati
on
of
Cam
pu
s
Car
d
Us
ers
of
the
ap
prox
i
m
ate
l
y
23
1
s
c
ho
ol
s
the
y
ha
v
e
on
r
ec
ord
19
7
of
the
m
are
us
i
ng
m
ag
s
tr
i
pe
tec
hn
o
l
og
y
,
an
d
62
h
av
e
a
l
r
ea
d
y
m
ov
e
d
to
s
om
e
f
or
m
of
no
n
c
on
ta
c
t
tec
hn
o
l
og
y
[1
-
3].
V
ari
ou
s
m
eth
od
s
ha
v
e
be
e
n
en
g
ag
ed
ov
er
th
e
y
e
ars
to
m
ee
t
the
s
ec
urit
y
ne
ed
s
of
un
i
v
ers
i
ti
es
.
S
om
e
of
the
m
eth
od
s
of
s
ec
urit
y
ha
v
e
i
nc
l
ud
ed
k
e
y
s
,
ba
dg
es
,
m
ag
s
tr
i
pe
c
a
r
ds
, s
m
artc
ards
, a
nd
c
urr
en
tl
y
the
em
ergi
ng
tre
nd
i
s
N
F
C
[4
-
5]
.
E
ac
h
of
th
es
e m
eth
od
s
ha
s
a
r
ol
e i
n
s
ec
urit
y
d
ep
e
nd
e
nt
on
c
os
t v
ers
us
s
ec
urit
y
2.
E
xis
t
ing
P
r
o
b
lem
Log
-
In
an
d
P
as
s
wor
ds
are
i
nt
eg
r
a
l
p
art
of
ou
r
da
i
l
y
l
i
v
es
.
T
he
y
wi
l
l
pr
e
v
e
nt
m
al
i
c
i
ou
s
us
ers
f
r
o
m
do
i
ng
h
arm
f
ul
th
i
ng
s
wi
th
ou
r
p
ers
on
a
l
d
ata
.
P
eo
pl
e t
e
nd
t
o u
s
e
the
s
a
m
e c
r
ed
en
ti
al
s
f
or
the
d
i
f
f
erent
w
e
bs
i
tes
th
e
y
v
i
s
i
t.
Ho
wev
er
r
ec
en
t
n
e
w
s
ha
s
t
au
g
ht
us
th
at
c
r
ed
en
ti
al
s
s
t
ored
b
y
w
e
bs
i
tes
are
c
om
pro
m
i
s
es
on
da
i
l
y
b
as
i
s
,
w
hi
c
h
m
ea
ns
tha
t
on
c
e
an
att
ac
k
er
ge
ts
y
ou
r
c
r
ed
en
ti
al
s
et,
h
e
c
an
us
e
i
t
on
oth
er
w
e
bs
i
tes
.
T
hi
s
i
s
w
h
y
us
i
n
g
di
f
f
erent
pa
s
s
w
ords
f
or
di
f
f
erent
w
eb
s
i
tes
i
s
i
m
po
r
tan
t.
Rem
e
m
be
r
i
ng
m
an
y
di
ff
erent
pa
s
s
w
ords
i
s
d
i
f
f
i
c
ul
t.
O
ne
op
t
i
o
n
i
s
s
of
tw
are
ba
s
e
d
p
as
s
wor
d
da
tab
as
e
[6
-
8].
B
ut
i
t
m
us
t
be
s
tored
o
n
y
o
ur
c
om
pu
ter
or
s
m
artpho
ne
m
e
m
or
y
,
w
h
i
c
h
i
s
s
ti
l
l
v
u
l
ne
r
a
bl
e
an
d
a
m
al
i
c
i
ou
s
us
er
c
an
ge
t
ac
c
es
s
to
the
d
ata
ba
s
e
wi
th
ou
t
y
o
u k
no
wi
ng
i
t.
3.
P
r
o
p
o
se
d
M
eth
o
d
O
ne
-
wor
d
i
s
an
of
f
l
i
ne
pa
s
s
wor
d
k
ee
pe
r
ai
m
ed
at
s
a
v
i
ng
a
nd
en
c
r
y
p
ti
ng
t
he
pa
s
s
wor
ds
i
n
a
m
ore
s
ec
ure
m
an
ne
r
.
T
he
m
ai
n
de
v
i
c
e
c
on
ta
i
ns
the
en
c
r
y
p
te
d
pa
s
s
w
ords
whi
l
e
a
s
ec
ure
NF
C
s
m
artc
ard
an
d
a
pe
r
s
on
a
l
pi
n
-
c
od
e
a
l
l
o
w
s
the
de
c
r
y
p
ti
o
n.
E
v
e
n
i
f
an
at
tac
k
er
i
s
ab
l
e
t
o
ge
t
ho
l
d t
h
e s
m
artc
ard, or the
d
ev
i
c
e i
t
i
s
c
om
pl
ete
l
y
us
e
l
e
s
s
w
i
t
ho
u
t th
e p
ers
o
na
l
c
od
e.
T
o
en
ter
the
l
og
-
i
n
c
r
ed
en
t
i
al
s
on
the
w
e
bp
a
ge
,
th
e
us
er m
us
t f
i
r
s
t c
on
ne
c
t
the
de
v
i
c
e
to
the
P
C
us
i
ng
U
S
B
c
ab
l
e,
e
nte
r
a
4
-
d
i
gi
t
pi
n
nu
m
be
r
(
on
l
y
the
f
i
r
s
t
ti
m
e)
an
d
pl
ac
e
the
s
m
art
c
ard
wi
th
i
n
t
he
c
ar
d
s
l
o
t,
a
nd
s
h
ou
l
d
s
i
m
pl
y
s
p
ea
k
the
n
am
e
of
the
w
eb
s
i
te.
T
he
de
v
i
c
e
r
ec
og
n
i
z
es
the
webs
i
t
e
na
m
e,
us
i
n
g
a
n
an
droi
d
ap
p
a
nd
e
nte
r
s
t
he
us
ern
am
e
an
d
pa
s
s
w
or
d
au
t
om
ati
c
al
l
y
l
i
k
e a
k
e
y
bo
ar
d.
T
he
ad
v
a
nta
ge
s
of
ou
r
d
ev
i
c
es
are.
1)
It c
an
n
ot
b
e a
tt
ac
k
ed
b
y
v
i
r
us
es
or m
al
i
c
i
ou
s
pro
gram
s
2)
It i
s
i
m
po
s
s
i
bl
e
to
c
h
an
g
e t
he
f
i
r
m
w
are as
i
t
i
s
an
of
f
l
i
ne
de
v
i
c
e,
i
nc
r
ea
s
i
ng
r
ob
us
t
ne
s
s
of
th
e
s
ol
ut
i
on
.
3)
NF
C
s
m
artc
ard
ap
proac
h
al
l
o
w
s
m
ul
ti
p
l
e
us
ers
to
us
e
th
e
d
ev
i
c
e
ea
c
h
w
i
t
h
t
he
i
r
o
w
n
pi
ns
an
d s
m
artc
ard
Evaluation Warning : The document was created with Spire.PDF for Python.
IJE
E
CS
IS
S
N:
2
50
2
-
4
75
2
NF
C S
ec
ure
d Off
l
i
ne
P
as
s
wor
d S
torag
e
(
S
en
th
i
l
K
um
ar
M
)
731
4)
S
pe
ec
h
r
ec
og
n
i
ti
on
al
l
o
w
s
the
de
v
i
c
e
to
be
us
ed
i
n
an
y
c
om
pu
ter.
T
he
r
e
i
s
n
o
ne
ed
to
i
ns
ta
l
l
ad
d
i
ti
on
al
s
of
t
w
are.
NF
C S
ma
r
t
ca
r
d
T
he
de
v
i
c
e
i
s
c
on
s
tr
uc
ted
wi
th
NF
C
tr
an
s
p
on
d
er
c
hi
p
tha
t
en
ab
l
es
i
t
to
r
ea
d
an
d
w
r
i
t
e
the
s
m
art
c
ard.
T
he
c
ard
ho
l
ds
v
er
y
l
i
ttl
e
de
ta
i
l
s
r
eg
ardi
n
g
the
us
er,
an
d
t
hu
s
us
i
ng
i
t
gi
v
es
no
s
ec
urit
y
r
i
s
k
.
NF
C
i
s
a
s
e
c
ure
an
d
un
i
v
ers
al
c
on
tac
t
l
es
s
c
o
m
m
un
i
c
ati
on
tec
h
n
ol
o
g
y
e
v
o
l
v
ed
f
r
o
m
RF
ID.
NF
C
op
erates
i
n
th
e
13
.
56
MH
z
r
a
di
o
f
r
eq
ue
nc
y
ba
nd
an
d
t
he
c
om
m
un
i
c
ati
on
t
y
p
i
c
al
l
y
ha
p
pe
ns
at
1
0
c
m
or
l
es
s
er
di
s
tan
c
e
.
T
hu
s
the
c
om
m
un
i
c
ati
o
n
ha
p
pe
ns
on
l
y
w
h
en
th
e
c
ard i
s
v
er
y
c
l
os
e p
r
ox
i
m
i
t
y
to
th
e d
e
v
i
c
e
[9
-
1
0].
S
p
ee
ch Recog
n
it
ion
&
Bl
u
eto
o
t
h
T
he
de
v
i
c
e
us
es
bl
u
eto
o
t
h
to
c
o
m
m
un
i
c
ate
wi
th
an
ap
p
r
un
ni
n
g
on
an
a
nd
r
oi
d
s
m
artpho
ne
.
S
pe
ec
h
r
ec
og
ni
t
i
on
i
s
d
on
e
b
y
th
e
an
dr
o
i
d
ap
p
an
d
r
e
l
a
y
s
the
i
nf
orm
ati
on
to
ou
r
de
v
i
c
e
v
i
a
b
l
ue
too
t
h.
I
n
a
d
di
t
i
on
to
t
hi
s
,
t
he
ap
p
al
s
o
l
ets
th
e
us
er
to
c
o
n
tr
ol
an
d
c
on
f
i
gu
r
e
t
he
de
v
i
c
e.
Capacitiv
e T
o
u
ch G
UI
A
s
et
of
c
ap
ac
i
t
i
v
e
to
uc
h
b
utt
on
s
an
d
a
graph
i
c
s
di
s
p
l
a
y
al
l
o
w
s
t
he
us
er
to
en
t
er
the
p
i
n
nu
m
be
r
v
i
a
s
i
m
pl
e
to
uc
h
g
es
tures
.
T
he
de
v
i
c
e
s
tat
us
i
s
i
nd
i
c
a
ted
us
i
n
g
a
s
et
of
on
b
oa
r
d
c
o
l
or
LE
D
’
s
.
O
n
b
o
ar
d
S
t
o
r
ag
e & M
u
lt
iuser
S
u
p
p
o
r
t
T
he
de
v
i
c
e
ha
s
an
on
b
o
ard
Q
ua
d
-
S
P
I
f
l
as
h
m
e
m
or
y
,
w
h
i
c
h
i
s
us
e
d
to
s
to
r
e
the
en
c
r
y
pt
ed
pa
s
s
w
ords
as
wel
l
as
ot
he
r
au
di
o
f
i
l
es
.
T
h
e
de
v
i
c
e
c
an
be
us
ed
b
y
m
ore
tha
n
on
e
us
er.
E
ac
h
us
er
ne
e
ds
to
ha
v
e
a
u
ni
qu
e
s
m
artc
ar
d
an
d
P
I
N
nu
m
be
r
A
s
ur
v
e
y
on
qu
er
y
proc
es
s
i
ng
i
n m
ob
i
l
e d
ata
b
as
e i
s
d
i
s
c
us
s
ed
i
n
[1
1
]
.
US
B K
e
y
b
o
a
r
d
P
r
o
f
ile
T
he
de
v
i
c
e
i
s
eq
ui
p
pe
d
w
i
t
h US
B
c
o
nn
ec
t
i
v
i
t
y
th
at
i
m
p
l
em
en
ts
th
e U
S
B
k
e
y
bo
ard
prof
i
l
e
ac
c
ordi
ng
t
o
the
US
B
s
pe
c
i
f
i
c
ati
on
.
T
hi
s
he
l
ps
i
t
to
au
t
om
ati
c
al
l
y
t
y
p
e
the
c
ha
r
ac
t
ers
i
n
the
us
er
na
m
e
an
d p
as
s
w
or
d f
i
el
d o
f
th
e
l
og
i
n
pa
g
e.
S
ec
u
r
e U
S
B M
as
s S
t
o
r
ag
e De
v
ice
T
he
de
v
i
c
e
c
an
a
l
s
o
be
us
e
d
as
a
m
as
s
s
torage
pe
r
i
ph
eral
,
us
ed
t
o
s
tore
tex
t
f
i
l
es
i
n
an
en
c
r
y
pt
ed
m
an
ne
r
.
T
o
tr
an
s
f
er
the
f
i
l
e
to
t
he
P
C,
th
e
us
er
m
us
t
be
au
the
n
ti
c
at
ed
be
f
ore
an
y
f
i
l
e
tr
an
s
f
er
i
s
po
s
s
i
bl
e.
E
v
e
n
i
f
an
att
ac
k
er
i
s
ab
l
e
to
c
ap
t
ure
the
f
i
l
e,
he
w
i
l
l
s
ee
on
l
y
the
en
c
r
y
p
te
d
da
ta
a
nd
no
t
t
he
ori
gi
n
al
da
ta
ge
ne
r
at
i
ng
a
d
i
g
i
ta
l
s
i
gn
atu
r
e
b
as
ed
o
n
ne
w
c
r
y
pt
og
r
ap
hi
c
s
c
he
m
e
f
or
us
er
au
t
he
n
ti
c
ati
o
n
an
d
s
ec
urit
y
i
s
ex
p
l
a
i
ne
d
i
n
[
12
]
.
T
he
a
uth
en
t
i
c
ati
o
n
proc
es
s
i
n
v
ol
v
es
pi
n
nu
m
be
r
an
d
N
F
C s
m
artc
ard v
erif
i
c
at
i
on
.
4.
Imp
lem
ent
atio
n
of
Har
d
w
ar
e S
u
b
s
ys
t
em
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N:
2
50
2
-
4
75
2
IJE
E
CS
V
ol
.
8,
N
o.
3,
Dec
e
m
be
r
20
17
:
7
3
0
–
7
3
2
732
5.
Co
n
clus
ion
NF
C
i
s
m
os
tl
y
c
on
ti
nu
e
i
ts
pa
th
of
be
i
n
g
h
i
gh
l
y
ut
i
l
i
z
ed
i
n
ev
er
y
f
i
e
l
ds
b
ec
au
s
e
of
i
ts
ea
s
y
to
us
e
f
or
pe
op
l
e.
I
t
i
s
al
s
o
v
er
y
b
en
d
ab
l
e
w
h
en
c
o
m
pa
r
ed
to
i
de
n
ti
f
i
c
at
i
on
de
v
i
c
es
of
the
prev
i
ou
s
,
a
l
l
o
w
i
ng
v
ario
us
t
y
pe
s
of
i
de
n
ti
f
i
c
ati
on
.
T
he
r
es
ul
t
i
s
NF
C
wi
l
l
b
e
w
i
de
l
y
us
ed
f
or
i
de
nti
f
i
c
at
i
on
an
d
m
ul
ti
pl
e p
r
oto
c
ol
s
wi
l
l
b
e u
t
i
l
i
z
ed
i
n t
h
e f
utu
r
e.
Ref
er
en
ce
s
[1
]
Sm
a
rt
Card
Al
l
i
a
n
c
e
.
EM
V
a
n
d
NFC
c
o
m
p
l
e
m
e
n
ta
r
y
te
c
h
n
o
l
o
g
i
e
s
t
h
a
t
d
e
l
i
v
e
r
s
e
c
u
re
p
a
y
m
e
n
t
s
a
n
d
v
a
l
u
e
a
d
d
e
d
fu
n
c
ti
o
n
a
l
i
ty
.
2
0
1
2
.
[2
]
d
e
v
e
l
o
p
e
r.a
n
d
ro
i
d
.c
o
m
,
A
c
c
e
s
s
e
d
o
n
Se
p
t,
2
0
1
4
.
[3
]
Eri
c
k
M
a
c
i
a
s
a
n
d
J
o
s
h
W
y
a
tt
.
Te
x
a
s
i
n
s
tru
m
e
n
t
s
-
n
f
c
a
c
ti
v
e
a
n
d
p
a
s
s
i
v
e
p
e
e
r
-
to
-
p
e
e
r
c
o
m
m
u
n
i
c
a
ti
o
n
.
2014.
[4
]
G
e
ra
l
d
M
a
d
l
m
a
y
r,
Chri
s
ta
n
K
a
n
tn
e
r.
NF
C
d
e
v
i
c
e
s
:
Se
c
u
ri
t
y
a
n
d
Pr
i
v
a
c
y
.
Av
a
i
l
a
b
i
l
i
t
y
Re
l
i
a
b
i
l
i
t
y
a
n
d
Se
c
u
ri
ty
.
2
0
0
8
[5
]
M
a
x
i
m
i
l
i
a
n
En
g
e
l
h
a
r
d
t,
F
l
o
ri
a
n
Pf
e
i
ff
e
r
,
Kl
a
u
s
F
i
n
k
e
n
z
e
l
l
e
r
a
n
d
Erw
i
n
Bi
e
b
l
.
Ex
te
n
d
i
n
g
ISO
/I
EC 1
4
4
4
3
ty
p
e
A
e
a
v
e
s
d
ro
p
p
i
n
g
ra
n
g
e
u
s
i
n
g
h
i
g
h
e
r
h
a
rm
o
n
i
c
s
.
2
0
1
3
[6
]
Nik
o
l
a
o
s
Al
e
x
i
o
u
,
Sty
l
i
a
n
o
s
Ba
s
a
g
i
a
n
n
i
s
a
n
d
So
p
h
i
a
Pe
tri
d
o
u
.
Se
c
u
ri
ty
a
n
a
l
y
s
i
s
o
f
NFC
re
l
a
y
a
tt
a
c
k
s
u
s
i
n
g
p
ro
b
a
b
i
l
i
s
ti
c
m
o
d
e
l
c
h
e
c
k
i
n
g
.
2
0
1
4
[7
]
An
to
n
i
o
J
J
a
ra
,
Al
b
e
rt
o
F
Al
c
o
l
e
a
,
M
i
g
u
e
l
A
Za
m
o
ra
a
n
d
An
to
n
i
o
FG
Sk
a
rm
e
t
a
.
Ev
a
l
u
a
ti
o
n
o
f
t
h
e
s
e
c
u
ri
t
y
c
a
p
a
b
i
l
i
ti
e
s
o
n
n
f
c
-
p
o
were
d
d
e
v
i
c
e
s
.
2
0
1
0
[8
]
ww
w
.n
a
c
c
u
.o
rg
,
Ac
c
e
s
s
e
d
o
n
Se
p
t,
2
0
1
4
[9
]
ww
w
.n
c
p
c
.o
rg
,
A
c
c
e
s
s
e
d
o
n
S
e
p
t,
2
0
1
4
[1
0
]
M
a
n
i
c
k
a
s
a
n
k
a
ri
N,
Ari
v
a
z
h
a
g
a
n
D
&
Ve
n
n
i
l
a
G
.
A
s
u
rv
e
y
o
n
q
u
e
ry
p
ro
c
e
s
s
i
n
g
i
n
m
o
b
i
l
e
d
a
ta
b
a
s
e
.
In
d
i
a
n
J
o
u
rn
a
l
o
f
S
c
i
e
n
c
e
a
n
d
T
e
c
h
n
o
l
o
g
y
.
2
0
1
4
;
7
:
32.
[1
1
]
G
a
n
e
s
h
k
u
m
a
r
K
a
n
d
Ari
v
a
z
h
a
g
a
n
D.
G
e
n
e
ra
ti
n
g
a
d
i
g
i
ta
l
s
i
g
n
a
tu
re
b
a
s
e
d
o
n
n
e
w
c
ry
p
to
g
ra
p
h
i
c
s
c
h
e
m
e
fo
r
u
s
e
r
a
u
t
h
e
n
ti
c
a
ti
o
n
a
n
d
s
e
c
u
r
i
ty
.
In
d
i
a
n
J
o
u
rn
a
l
o
f
Sc
i
e
n
c
e
a
n
d
T
e
c
h
n
o
l
o
g
y
.
2
0
1
4
;
7
(S6
)
:
1
-
5.
Evaluation Warning : The document was created with Spire.PDF for Python.