Double Security of RFID Credit Cards

Authors

  • MAA Computer Science, College of CS and IT, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia
  • AAS Qureshi Computer Science, College of CS and IT, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia
  • M Farooqui Computer Science, College of CS and IT, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia

Keywords:

RFID, RFID Reader, RFID Tag, Secure Hash Algorithm, Credit card, Mobile security

Abstract

Rapid advancement in RFID systems increase the need of sufficient computing power. Nowadays, more power is required to implement the encryption and decryption for the authentication during transactions. In addition, RFID tags have enough capacity to store the corresponding information. The radio waves are used in RFID technology to read the data from RFID tags. Information about the card and its owner is embedded in a tiny microchip in the e-card. The card can be read by remote machines, therefore this paper proposed double security check by introducing mobile user for the secure transaction. In addition, to provide more security to the credit card holder when his information is processed through RFID. Proposed RFID system is based on Secure Hash Algorithm and mobile communication devices such as cellular phones. It provides a secure certificate mechanism which uses a mobile phone, RFID reader and credit card containing RFID tag. Secure Hash Algorithm is used to obtain a secure and reliable way of transmitting data. The result shows that the proposed method improves the existing RFID security issues under the premise of safety, efficiency, and compatibility with the network.

References

L. Castro, S.F. Wamba, “An Inside Look at RFID technology”, Journal of Technology Management & Innovation, Vol.2, Issue 1, pp.1-14, 2007.

A. Sharma, D. Thomas, “Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation”, Journal of Information Systems Applied Research (JISAR), Vol. 7, Issue 4, pp. 1-13, 2014.

K. Ahsan, H. Shah, P. Kingston “RFID Applications: An Introductory and Exploratory Study”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, pp. 1-7, 2010.

W. Zhang, D. Li, “Research on barcode Image Binarization in Barcode Positioning”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, pp. 1-5, 2012.

M. Kaur, M. Sandhu, N. Mohan, P.S. Sandhu, “RFID Technology Principles Advantages Limitations & Its Applications”, International Journal of Computer and Electrical Engineering, Vol. 3, No. 1, pp. 1-7, 2011.

S. Jamal, A. Omer, A.S. Qureshi, “Cloud Computing Solution and Services for RFID Based Supply Chain Management”, Advances in Internet of Things, Vol. 3 No. 4, pp. 1-7, 2013.

T.S. Heydt-Benjamin, D.V. Bailey, K. Fu, A. Juels, T.O. Hare. “Financial Cryptography and Data Security”, IFCA/Springer-Verlag Berlin Heidelberg, USA, pp.2-14 2007.

J. Westhues “Hacking the prox card”, Springer, USA, pp.291-300. (2005)

A. Juels, “RFID Security and Privacy: A Research Survey”, IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 1-14, 2006.

B. Preneel, “Cryptographic HASH Functions: An Overview”, In the Proceedings of the 6th International Computer Security and Virus Conference (ICSVC), Belgium, pp.1-9, 1993.

Downloads

Published

2025-11-11

How to Cite

[1]
M. Khan, A. Qureshi, and M. Farooqui, “Double Security of RFID Credit Cards”, Int. J. Comp. Sci. Eng., vol. 5, no. 5, pp. 42–46, Nov. 2025.

Issue

Section

Research Article