An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone

Allen Y. Chang, Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin
{"title":"An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone","authors":"Allen Y. Chang, Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin","doi":"10.1109/CCST.2009.5335567","DOIUrl":null,"url":null,"abstract":"Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"43rd Annual 2009 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2009.5335567","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
改进了使用射频识别的移动电话交易证书机制
由于RFID系统的快速发展,现在已经有足够的计算能力来实现交易过程中认证所需的加解密。此外,RFID标签有足够的容量来存储相应的信息。因此,启用RFID的信用卡可以改善传统信用卡在使用过程中出现的潜在安全问题,但是,受RFID标签生产成本的限制,其计算能力和存储容量有限。因此,它无法进行认证机制所需的复杂计算,即传统无线网络中采用的安全技术无法直接移植到非接触式RFID传输中。针对研究中提出的RFID安全问题,提出了许多解决方案。这些研究大多假设RFID读写器与后端数据库之间的通信基础设施是基于有线企业网络环境的,通常将其定义为安全通信通道。然而,在许多应用中,用户需要使用支持RFID的手持设备,如移动电话或pda,通过GSM、GPRS或wi-fi等无线通信协议与后端数据库连接。这些通信通道暴露在不安全的环境中,必须考虑安全问题。本文构建了一个基于移动通信设备(如手机)的RFID系统。我们提出了一个有效和安全的证书机制,使用移动设备作为RFID阅读器与包含RFID标签的信用卡。结果表明,在保证EPC网络的安全性、高效性和兼容性的前提下,可以改善现有的RFID安全问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Use of threat image projection (TIP) to enhance security performance Robustness against misuse - a new attribute of technical systems Face Identification based on TV videos Combining hand biometric traits for personal identification Evaluation methodology for analyzing usability factors in biometrics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1