International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022
p-ISSN: 2395-0072
www.irjet.net
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-Commerce Suraj1, Vanishree K2 1UG
Student, RV College of Engineering, Bengaluru, Karnataka, India Dept of Information Science and Engineering, RV College of Engineering, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - Barcodes are visual form of representing data in 2. USABILITY OF QR CODE 2Professor,
machine readable form. The Quick Response(QR) codes are machine readable two-dimensional matrix barcodes used for hiding data. These QR codes are increasingly used in ecommerce and day to day logistics for identification of codes. Security of bar codes is becoming a top priority for the concerned organizations carrying out ecommerce businesses. As the QR code is very popular these days, their usability and attacks on QR code are described. Further, different types of barcodes are reviewed with the limitations. The scenarios are identified where a certain barcode is more profoundly used. The future enhancements for making QR codes more secure includes making the codes dynamic i.e. capable of storing changing information.
Static QR codes are non-modifiable after publishing. These are non expirable. Thus they are generally used to store non changing data. The data is not ingrained in the dynamic QR codes, thus the information stored in QR can be changed after publishing. It takes the user to a location which can be changed. Dynamic QR codes allow tracing the scanning metrics like device, location and time of the scanner. QR codes found special relevance in the Covid Pandemic enabling users to perform touchless retrieval of information. There are multiple resources businesses can access that will allow them to insert a landing page URL and create a QR code that will direct users to that URL with the click of a button. Nowadays the hotel menus, restaurants booking and entry passes for various events all are done using the scanning of QR codes through their handheld devices. But using this as leverage some attackers falsify the QR and hijack the devices and steal the personal information and use it for bad intentions.
Key Words: Item, Manifest, Staging Area, Line Haul, Trips, Bar code, QR Code
1. INTRODUCTION Quick Response codes are used to encode information like website URL, SMS message, vCard information, alphanumeric, numeric etc. The bar codes are designed to simplify the process to retrieve information by scanning the code on the camera. In the case of airlines business, the data leak of 4.5 million customers happened because of low security in the Quick Response codes of users boarding passes. The user’s personal data was compromised. QR codes are very popular because of their fast readability and greater storage capacity compared to other types of codes. Bar codes are increasingly used in almost all industries these days. Thus the research on this topic is being conducted by us, to make them more secure and reliable and can be used as per the requirement in different scenarios. In logistics they play a crucial role in transportation of the items and packages. They are widely used in logistics because they are easily generated and easy to read at any stages without affecting the actual package. The Security of Quick Response (QR) codes is becoming a major issue these days, due to technological advancements and rapid growth in the field of media and communication. It is really challenging to keep the data secure in the field of logistics where the items keep moving from one pallet to another in a rapidly fast manner.
© 2022, IRJET
|
Impact Factor value: 7.529
QR codes in the different aspects of business use cases have risk associated with the information stored. In order to tackle the risk, there are multiple algorithms introduced in the improvement of QR codes and better security measures such as digital signatures for watermarking and reduction of duplication of QR codes, Reed Solomon Correction Method algorithm to scan QR for partially visible QR code.
3. TYPES OF ATTACKS ON QR In the following, we consider the foremost prominent attack scenarios for QR codes and discuss to what extent we are able to prevent them. Phishing: during a barcode phishing attack, the attacker tries to urge sensitive information like the login details and also the mastercard number of a user by, e.g., encoding a malicious Web address inside the barcode that redirects the user to a fake online page which appears very just like the legitimate one. Malware propagation: it's discussed how QR codes may be utilized by attackers to redirect users to malicious sites that silently install malware by exploiting vulnerable applications on the device. this can be typically done through an exploit kit that fingerprints the device and selects the suitable exploit and malware. Barcode tampering and counterfeiting: Since QR codes will be wont to provide information a couple of good,
|
ISO 9001:2008 Certified Journal
|
Page 1020