CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Intra Debit Card System using RFID Technology

Published on January 2013 by Senthil Kumar Mathi, M. L. Valarmathi, T Dhivya
Amrita International Conference of Women in Computing - 2013
Foundation of Computer Science USA
AICWIC - Number 2
January 2013
Authors: Senthil Kumar Mathi, M. L. Valarmathi, T Dhivya
d96514f7-f078-480e-b0da-7dfb897c2bda

Senthil Kumar Mathi, M. L. Valarmathi, T Dhivya . Intra Debit Card System using RFID Technology. Amrita International Conference of Women in Computing - 2013. AICWIC, 2 (January 2013), 32-35.

@article{
author = { Senthil Kumar Mathi, M. L. Valarmathi, T Dhivya },
title = { Intra Debit Card System using RFID Technology },
journal = { Amrita International Conference of Women in Computing - 2013 },
issue_date = { January 2013 },
volume = { AICWIC },
number = { 2 },
month = { January },
year = { 2013 },
issn = 0975-8887,
pages = { 32-35 },
numpages = 4,
url = { /proceedings/aicwic/number2/9871-1313/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Amrita International Conference of Women in Computing - 2013
%A Senthil Kumar Mathi
%A M. L. Valarmathi
%A T Dhivya
%T Intra Debit Card System using RFID Technology
%J Amrita International Conference of Women in Computing - 2013
%@ 0975-8887
%V AICWIC
%N 2
%P 32-35
%D 2013
%I International Journal of Computer Applications
Abstract

RFID - Radio-Frequency IDentification is one of the technologies that is used for the past few decades for tracking and identification of an object. RFID tag contains unique information wirelessly with computer databases and network for tracking the objects easily. Prior to performing the read/write operation on RFID card, the reader has to make an authentication check. Usually a default key supplied by the manufacturer is used to do the above. This poses a security threat; anyone can now access the contents of the RFID tag. For handling this security threat, we propose a mechanism involving where the RFID reader tag communication has been enhanced by making use of an identity based authentication technology which involves a third party's authentication. We intend to deploy this security mechanism of the RFID reader and tag access in the scenario of educational institutions; an internal debit card system could be set up. This is particularly beneficial for students of small age to be able to carry out transactions involving the purchase of their uniforms, bags, stationary and other requirements at school. Parents wouldn't have to worry about going in person to take care of their ward's monetary needs.

References
  1. A. Juels, RFID Security and Privacy: A research Survey, IEEE Journal on Selected Areas in Communication, Vol. 24, No. 2, February.
  2. Liang Yan and Chunming Rong, Tag Content Access Control with Identity-based Key Exchange, ICNAAM Numerical Analysis and Applied Mathematics, International Conference, pp297-300, 2010.
  3. Jatin A Kanzaria, Maulik J Kapuria, Niket D Shah, Rahul A Tibrewal, Project report on Smart Office - A Complete RFID Solution, 2006.
  4. Vogt, H. Efficient Object Identification with Passive RFID Tags' International Conference on Pervasive Computing, LNCS, Springer-Verlag 2002.
  5. Raza N, Bradshaw V, Hague M, Applications of RFID technology, IEEE Colloquium RFID Technology, Page(s): 1-5. 1999.
  6. A book on Attacking RFID Systems by Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Auerbach Publications, 2009.
  7. A publication on Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information, Processing Standards Publication, November 26, 2001.
  8. W. Diffie and M. Hellman, New Directions in Cryptography' IEEE transactions on Information Theory, pp. 644-654, 1976
  9. Christoph G Gunther, and Asea Brown Boveri, An Identity-based key exchange protocol, Springer-Verlag, 1998.
  10. V. Cakulev, G. Sundaram, and Alcatel Lucent, IBAKE: Identity-Based Authenticated Key Exchange, draft-cakulev-ibake-04. txt, April 20, 2011.
  11. Vaibhaw Dixit, Harsh K. Verma, and Akhil K. Singh, Comparison of various Security Protocols in RFID, International Journal of Computer Applications (0975-8887), volume 24- No. 7, June 2011.
  12. Li Xiaoyong and Zhang Hui, Identity-based Authenticated Key Exchange Protocols, IEEE pp. V3. 85-87, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Advanced Encryption Standard Tag Content Access Control Identity Based Authenticated Key Exchange Electronic Product Code