Open Access   Article Go Back

Double Security of RFID Credit Cards

M.A.A. Khan1 , A.A.S. Qureshi2 , M. Farooqui3

  1. College of CS and IT, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia.
  2. College of CS and IT, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia.
  3. College of CS and IT, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia.

Correspondence should be addressed to: mkhan@uod.edu.sa.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 42-46, May-2017

Online published on May 30, 2017

Copyright © M.A.A. Khan, A.A.S. Qureshi, M. Farooqui . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M.A.A. Khan, A.A.S. Qureshi, M. Farooqui, “Double Security of RFID Credit Cards,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.42-46, 2017.

MLA Style Citation: M.A.A. Khan, A.A.S. Qureshi, M. Farooqui "Double Security of RFID Credit Cards." International Journal of Computer Sciences and Engineering 5.5 (2017): 42-46.

APA Style Citation: M.A.A. Khan, A.A.S. Qureshi, M. Farooqui, (2017). Double Security of RFID Credit Cards. International Journal of Computer Sciences and Engineering, 5(5), 42-46.

BibTex Style Citation:
@article{Khan_2017,
author = {M.A.A. Khan, A.A.S. Qureshi, M. Farooqui},
title = {Double Security of RFID Credit Cards},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {42-46},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1261},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1261
TI - Double Security of RFID Credit Cards
T2 - International Journal of Computer Sciences and Engineering
AU - M.A.A. Khan, A.A.S. Qureshi, M. Farooqui
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 42-46
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
925 505 downloads 349 downloads
  
  
           

Abstract

Rapid advancement in RFID systems increase the need of sufficient computing power. Nowadays, more power is required to implement the encryption and decryption for the authentication during transactions. In addition, RFID tags have enough capacity to store the corresponding information. The radio waves are used in RFID technology to read the data from RFID tags. Information about the card and its owner is embedded in a tiny microchip in the e-card. The card can be read by remote machines, therefore this paper proposed double security check by introducing mobile user for the secure transaction. In addition, to provide more security to the credit card holder when his information is processed through RFID. Proposed RFID system is based on Secure Hash Algorithm and mobile communication devices such as cellular phones. It provides a secure certificate mechanism which uses a mobile phone, RFID reader and credit card containing RFID tag. Secure Hash Algorithm is used to obtain a secure and reliable way of transmitting data. The result shows that the proposed method improves the existing RFID security issues under the premise of safety, efficiency, and compatibility with the network.

Key-Words / Index Term

RFID, RFID Reader, RFID Tag, Secure Hash Algorithm, Credit card, Mobile security

References

[1] L. Castro, S.F. Wamba, “An Inside Look at RFID technology”, Journal of Technology Management & Innovation, Vol.2, Issue 1, pp.1-14, 2007.
[2] A. Sharma, D. Thomas, “Looking Backwards to Look Ahead: Lessons from Barcode Adoption for RFID Adoption and Implementation”, Journal of Information Systems Applied Research (JISAR), Vol. 7, Issue 4, pp. 1-13, 2014.
[3] K. Ahsan, H. Shah, P. Kingston “RFID Applications: An Introductory and Exploratory Study”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, pp. 1-7, 2010.
[4] W. Zhang, D. Li, “Research on barcode Image Binarization in Barcode Positioning”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, pp. 1-5, 2012.
[5] M. Kaur, M. Sandhu, N. Mohan, P.S. Sandhu, “RFID Technology Principles Advantages Limitations & Its Applications”, International Journal of Computer and Electrical Engineering, Vol. 3, No. 1, pp. 1-7, 2011.
[6] S. Jamal, A. Omer, A.S. Qureshi, “Cloud Computing Solution and Services for RFID Based Supply Chain Management”, Advances in Internet of Things, Vol. 3 No. 4, pp. 1-7, 2013.
[7] T.S. Heydt-Benjamin, D.V. Bailey, K. Fu, A. Juels, T.O. Hare. “Financial Cryptography and Data Security”, IFCA/Springer-Verlag Berlin Heidelberg, USA, pp.2-14 2007.
[8] J. Westhues “Hacking the prox card”, Springer, USA, pp.291-300. (2005)
[9] A. Juels, “RFID Security and Privacy: A Research Survey”, IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 1-14, 2006.
[10] B. Preneel, “Cryptographic HASH Functions: An Overview”, In the Proceedings of the 6th International Computer Security and Virus Conference (ICSVC), Belgium, pp.1-9, 1993.