A radio frequency identification application for car theft prevention in parking lot management systems

Currently, there are many parking lot management systems in use; however, most of them are unsuited to the problem of car theft. For example, a thief can drive a jalopy into a parking lot, and because the gate does not have any mechanism to detect whether the driver is the owner of the car, the gate will be open according merely to whether the driver pays the parking fee. A thief can drive away with a luxurious car away using his own parking ticket. We propose a new scheme to prevent the car theft. We adopt radio frequency identification technology conforming to EPCglobal Class 1 Generation 2 to our scheme design. Our scheme supplies an easy, cheap and high security parking environment for customers and the parking management system. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Ari Juels,et al.  RFID: security and privacy for five-cent wireless devices (abstract only) , 2004, WiSe '04.

[2]  S. Stankovski,et al.  Implementation of RFID Technology in Parking Lot Access Control System , 2007, 2007 1st Annual RFID Eurasia.

[3]  Yulin Zhang,et al.  A design of bi-verification vehicle access intelligent control system based on RFID , 2009, 2009 9th International Conference on Electronic Measurement & Instruments.

[4]  Chin-Ling Chen,et al.  Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..

[5]  Chin-Ling Chen,et al.  An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards , 2014, Secur. Commun. Networks.

[6]  Kouichi Sakurai,et al.  Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[7]  Daesung Kwon,et al.  Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards , 2009, Comput. Stand. Interfaces.

[8]  Paul Müller,et al.  Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[9]  Chin-Ling Chen,et al.  Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety , 2012, Journal of Medical Systems.

[10]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[11]  Mikhail Nesterenko,et al.  RFID security without extensive cryptography , 2005, SASN '05.

[12]  Hung-Yu Chien,et al.  Server‐less RFID authentication and searching protocol with enhanced security , 2012, Int. J. Commun. Syst..

[13]  Wei-Kuan Shih,et al.  Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment , 2009, Comput. Stand. Interfaces.

[14]  W. W. Peterson,et al.  Cyclic Codes for Error Detection , 1961, Proceedings of the IRE.

[15]  Soo-Young Kang,et al.  A study on secure RFID mutual authentication scheme in pervasive computing environment , 2008, Comput. Commun..

[16]  Jian Huang,et al.  An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[17]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[18]  Jung-Shian Li,et al.  A hidden mutual authentication protocol for low-cost RFID tags , 2011, Int. J. Commun. Syst..

[19]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[20]  N. Inanc,et al.  Smart Parking Applications Using RFID Technology , 2007, 2007 1st Annual RFID Eurasia.

[21]  Jung-Hui Chiu,et al.  Select-Response Grouping Proof for RFID Tags , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.