Double Security of RFID Credit Cards
Keywords:
RFID, RFID Reader, RFID Tag, Secure Hash Algorithm, Credit card, Mobile securityAbstract
Rapid advancement in RFID systems increase the need of sufficient computing power. Nowadays, more power is required to implement the encryption and decryption for the authentication during transactions. In addition, RFID tags have enough capacity to store the corresponding information. The radio waves are used in RFID technology to read the data from RFID tags. Information about the card and its owner is embedded in a tiny microchip in the e-card. The card can be read by remote machines, therefore this paper proposed double security check by introducing mobile user for the secure transaction. In addition, to provide more security to the credit card holder when his information is processed through RFID. Proposed RFID system is based on Secure Hash Algorithm and mobile communication devices such as cellular phones. It provides a secure certificate mechanism which uses a mobile phone, RFID reader and credit card containing RFID tag. Secure Hash Algorithm is used to obtain a secure and reliable way of transmitting data. The result shows that the proposed method improves the existing RFID security issues under the premise of safety, efficiency, and compatibility with the network.
References
L. Castro, S.F. Wamba, “An Inside Look at RFID technology”, Journal of Technology Management & Innovation, Vol.2, Issue 1, pp.1-14, 2007.
A. Sharma, D. Thomas, “Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation”, Journal of Information Systems Applied Research (JISAR), Vol. 7, Issue 4, pp. 1-13, 2014.
K. Ahsan, H. Shah, P. Kingston “RFID Applications: An Introductory and Exploratory Study”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, pp. 1-7, 2010.
W. Zhang, D. Li, “Research on barcode Image Binarization in Barcode Positioning”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, pp. 1-5, 2012.
M. Kaur, M. Sandhu, N. Mohan, P.S. Sandhu, “RFID Technology Principles Advantages Limitations & Its Applications”, International Journal of Computer and Electrical Engineering, Vol. 3, No. 1, pp. 1-7, 2011.
S. Jamal, A. Omer, A.S. Qureshi, “Cloud Computing Solution and Services for RFID Based Supply Chain Management”, Advances in Internet of Things, Vol. 3 No. 4, pp. 1-7, 2013.
T.S. Heydt-Benjamin, D.V. Bailey, K. Fu, A. Juels, T.O. Hare. “Financial Cryptography and Data Security”, IFCA/Springer-Verlag Berlin Heidelberg, USA, pp.2-14 2007.
J. Westhues “Hacking the prox card”, Springer, USA, pp.291-300. (2005)
A. Juels, “RFID Security and Privacy: A Research Survey”, IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 1-14, 2006.
B. Preneel, “Cryptographic HASH Functions: An Overview”, In the Proceedings of the 6th International Computer Security and Virus Conference (ICSVC), Belgium, pp.1-9, 1993.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
