Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

Intra Debit Card System using RFID Technology

Print
PDF
IJCA Proceedings on - Amrita International Conference of Women in Computing 2013
© 2013 by IJCA Journal
AICWIC - Number 2
Year of Publication: 2013
Authors:
Senthil Kumar Mathi
M. L. Valarmathi
T Dhivya

Senthil Kumar Mathi, M L Valarmathi and T Dhivya. Article: Intra Debit Card System using RFID Technology. IJCA Proceedings on Amrita International Conference of Women in Computing - 2013 AICWIC(2):32-35, January 2013. Full text available. BibTeX

@article{key:article,
	author = {Senthil Kumar Mathi and M. L. Valarmathi and T Dhivya},
	title = {Article: Intra Debit Card System using RFID Technology},
	journal = {IJCA Proceedings on Amrita International Conference of Women in Computing - 2013},
	year = {2013},
	volume = {AICWIC},
	number = {2},
	pages = {32-35},
	month = {January},
	note = {Full text available}
}

Abstract

RFID - Radio-Frequency IDentification is one of the technologies that is used for the past few decades for tracking and identification of an object. RFID tag contains unique information wirelessly with computer databases and network for tracking the objects easily. Prior to performing the read/write operation on RFID card, the reader has to make an authentication check. Usually a default key supplied by the manufacturer is used to do the above. This poses a security threat; anyone can now access the contents of the RFID tag. For handling this security threat, we propose a mechanism involving where the RFID reader tag communication has been enhanced by making use of an identity based authentication technology which involves a third party's authentication. We intend to deploy this security mechanism of the RFID reader and tag access in the scenario of educational institutions; an internal debit card system could be set up. This is particularly beneficial for students of small age to be able to carry out transactions involving the purchase of their uniforms, bags, stationary and other requirements at school. Parents wouldn't have to worry about going in person to take care of their ward's monetary needs.

References

  • A. Juels, RFID Security and Privacy: A research Survey, IEEE Journal on Selected Areas in Communication, Vol. 24, No. 2, February.
  • Liang Yan and Chunming Rong, Tag Content Access Control with Identity-based Key Exchange, ICNAAM Numerical Analysis and Applied Mathematics, International Conference, pp297-300, 2010.
  • Jatin A Kanzaria, Maulik J Kapuria, Niket D Shah, Rahul A Tibrewal, Project report on Smart Office - A Complete RFID Solution, 2006.
  • Vogt, H. Efficient Object Identification with Passive RFID Tags' International Conference on Pervasive Computing, LNCS, Springer-Verlag 2002.
  • Raza N, Bradshaw V, Hague M, Applications of RFID technology, IEEE Colloquium RFID Technology, Page(s): 1-5. 1999.
  • A book on Attacking RFID Systems by Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Auerbach Publications, 2009.
  • A publication on Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information, Processing Standards Publication, November 26, 2001.
  • W. Diffie and M. Hellman, New Directions in Cryptography' IEEE transactions on Information Theory, pp. 644-654, 1976
  • Christoph G Gunther, and Asea Brown Boveri, An Identity-based key exchange protocol, Springer-Verlag, 1998.
  • V. Cakulev, G. Sundaram, and Alcatel Lucent, IBAKE: Identity-Based Authenticated Key Exchange, draft-cakulev-ibake-04. txt, April 20, 2011.
  • Vaibhaw Dixit, Harsh K. Verma, and Akhil K. Singh, Comparison of various Security Protocols in RFID, International Journal of Computer Applications (0975-8887), volume 24- No. 7, June 2011.
  • Li Xiaoyong and Zhang Hui, Identity-based Authenticated Key Exchange Protocols, IEEE pp. V3. 85-87, 2010.