Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone

With the new, state-of-the-art printing devices and equipment, there has been rapid growth in the counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, and they can easily imitate the original banknotes with fake ones. Conventional methods for validating currency require specialized devices for the authentication of banknotes. However, cost and lack of mobility of sophisticated banknote validation devices are big problems for general consumers. Modern digital solutions are attempting to complement the traditional security features through embedding radio frequency identification (RFID) chips in the banknotes, for example, Euro currency. Unfortunately, the requirement of specialized RFID readers for banknote validation impedes their widespread proliferation among consumers. To overcome this problem, a new method of banknote validation using an RFID chip and an NFC-enabled smartphone is presented. The consumer sends a banknote validation request to the Monetary Agency () using her or his smartphone and an Internet connection. The replies by sending a random challenge to the consumer’s smartphone. The RFID chip in the banknote receives the challenge, via the NFC, and calculates an equivalent response to the ’s challenge. If any of the messages are incorrect, authentication is denied. By the proposed method, consumers can easily and instantly check the originality of currency notes with the using their smartphones and an Internet connection. The proposed system is less expensive, computationally, than regular methods and preserves the privacy of people who carry banknotes.

[1]  Yu-Jung Huang,et al.  Efficient Implementation of RFID Mutual Authentication Protocol , 2012, IEEE Transactions on Industrial Electronics.

[2]  Chi Fai Cheung,et al.  Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication , 2010, Comput. Ind..

[3]  Florian Michahelles,et al.  Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.

[4]  M. Waldrop,et al.  Science 2.0. , 2008, Scientific American.

[5]  Sasa Radomirovic,et al.  Security of an RFID Protocol for Supply Chains , 2008, 2008 IEEE International Conference on e-Business Engineering.

[6]  Gerhard P. Hancke,et al.  Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.

[7]  Stefanos Gritzalis,et al.  Security analysis of the song-mitchell authentication protocol for low-cost RFID tags , 2009, IEEE Communications Letters.

[8]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[9]  Gary Andrechak,et al.  Hitachi -chip RFID Technology Compatible with Gamma Sterilization , 2008 .

[10]  Tim Hornyak,et al.  RFID powder. , 2008, Scientific American.

[11]  Muhammad Khurram Khan,et al.  One-Time Password System with Infinite Nested Hash Chains , 2010, FGIT-SecTech/DRBC.

[12]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[13]  Muhammad Khurram Khan,et al.  Detecting counterfeit-money using RFID-enabled mobile devices , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[14]  Mikhail Nesterenko,et al.  RFID security without extensive cryptography , 2005, SASN '05.

[15]  Robert H. Deng,et al.  Attacks and improvements to an RIFD mutual authentication protocol and its extensions , 2009, WiSec '09.

[16]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[17]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[18]  Rodrigo Roman,et al.  Real-time location and inpatient care systems based on passive RFID , 2010, Journal of Network and Computer Applications.

[19]  狄奥多·G·帕拉斯科瓦克斯 System and method for intelligent currency validation , 2006 .

[20]  Chris J. Mitchell,et al.  RFID authentication protocol for low-cost tags , 2008, WiSec '08.

[21]  Yu-Jung Huang,et al.  Hardware Implementation of RFID Mutual Authentication Protocol , 2010, IEEE Transactions on Industrial Electronics.

[22]  Ching-Nung Yang,et al.  Enhancing Privacy and Security in RFID-Enabled Banknotes , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[23]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[24]  Chin-Ling Chen,et al.  Anti-counterfeit ownership transfer protocol for low cost RFID system , 2008 .

[25]  Dijiang Huang,et al.  Towards Lightweight Secure Communication Protocols for Passive RFIDs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[26]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[27]  KimTai-Hoon,et al.  Mobile one-time passwords: two-factor authentication using mobile phones , 2012 .

[28]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[29]  Hassan M. Elkamchouchi,et al.  Mobile one-time passwords: two-factor authentication using mobile phones , 2012, Secur. Commun. Networks.