{"title":"A Novel Gesture Detection Technique to Increase Security in NFC Contactless Smartcards","authors":"Daniel Pérez Asensio, A. P. Yuste","doi":"10.1109/COMPSAC48688.2020.00051","DOIUrl":null,"url":null,"abstract":"Using a testing platform, composed by off-the-shell and commercial products, this paper describes and implements a Near Field Communication (NFC) authentication system based on encrypted and biometric features. With Radio Frequency Identification (RFID) tags and readers, operating in the HF band, a novel gesture recognition pattern is designed and tested. In addition to the biometric signature, an encryption mechanism is implemented following the design of previous work by other authors. Finally, it is evaluated the security of the system, summarizing the results obtained.","PeriodicalId":74502,"journal":{"name":"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC","volume":"171 1","pages":"1808-1813"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSAC48688.2020.00051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Using a testing platform, composed by off-the-shell and commercial products, this paper describes and implements a Near Field Communication (NFC) authentication system based on encrypted and biometric features. With Radio Frequency Identification (RFID) tags and readers, operating in the HF band, a novel gesture recognition pattern is designed and tested. In addition to the biometric signature, an encryption mechanism is implemented following the design of previous work by other authors. Finally, it is evaluated the security of the system, summarizing the results obtained.