Users Authentication and Privacy control of RFID Card

Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed a conceptual framework that that can be used to mitigate the unauthorized use of RFID Card. This concept will mitigate the single point of the RFID card failure: unauthorized use.

[1]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[2]  Robert E. Wolfe,et al.  An Algorithm to Produce Temporally and Spatially Continuous MODIS-LAI Time Series , 2008, IEEE Geoscience and Remote Sensing Letters.

[3]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[4]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[5]  Alex S. Taylor,et al.  Visible and controllable RFID tags , 2010, CHI EA '10.

[6]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Ya-ling Zhang,et al.  An Authentication Protocol for RFID Tag and Its Simulation , 2011, J. Networks.

[8]  Bruno Crispo,et al.  RFID Guardian Back-end Security Protocol , 2008 .

[9]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Gerhard P. Hancke Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[11]  Min-Shiang Hwang,et al.  Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection , 2006 .

[12]  Aikaterini Mitrokotsa,et al.  Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.

[13]  Ian R. Kerr The Internet of People? Reflections on the Future Regulation of Human-Implantable Radio Frequency Identification , 2013 .

[14]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[15]  B. Vollmer Biometrics, RFID Technology, and the ePassport: Are Americans Risking Personal Security in the Face of Terrorism? , 2006 .

[16]  Tina Quach,et al.  Radio Frequency Integrated Circuits (RFIC) Symposium , 2005, Radio Frequency Integrated Circuits Symposium.

[17]  Shlomi Dolev,et al.  Low Overhead RFID Security , 2007 .

[18]  Julio C. Hernandez-Castro,et al.  Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks , 2009 .

[19]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[20]  Deirdre K. Mulligan,et al.  Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond , 2007, J. Commun..

[21]  Klaus Finkenzeller,et al.  Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .

[22]  Bing Liang Security and Performance Analysis for RFID Protocols , 2010 .

[23]  J. W. Yum,et al.  Smart card with an integrated electrical switch for secure operation , 2010, 2010 International Workshop on Antenna Technology (iWAT).

[24]  Mohd Rizal Mohd Isa,et al.  Fingerprint Biometrics Authentication on Smart Card , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[25]  M. Babaie,et al.  Efficient Detecting of RFID Tag Cloning Attacks using Chaos Theory , 2010 .

[26]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[27]  Chao Li,et al.  A two-factor authentication design of fingerprint recognition system based on DSP and RF card , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[28]  Yanjun Zuo Survivable RFID Systems: Issues, Challenges, and Techniques , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[29]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[30]  Monica Nogueira Uses of RFID Technology in U.S. Identification Documents , 2009 .

[31]  Shantanu Rao A secure architecture for the use of RFID at home , 2007 .

[33]  Surinder Mohan Bhaskar Is RFID Technology Secure and Private , 2008 .

[34]  Paweł Rotter Security and Privacy in RFID Applications , 2009 .

[35]  Avishai Wool,et al.  RFID-based electronic voting: What could possibly go wrong? , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[36]  Y.-C. Lee,et al.  A New Ultralightweight RFID Protocol with Mutual Authentication , 2009, 2009 WASE International Conference on Information Engineering.

[37]  Paul A. Moskowitz,et al.  A Privacy-Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[38]  Georgios Kambourakis,et al.  A secure and efficient authentication protocol for passive RFID tags , 2009, 2009 6th International Symposium on Wireless Communication Systems.

[39]  Torstein Haver,et al.  Security and Privacy in RFID Applications , 2006 .

[40]  Jill A Fisher,et al.  Implanting inequality: Empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices , 2010, International Journal of Technology Assessment in Health Care.

[41]  Frank Thornton,et al.  RFID Security , 2005 .

[42]  J.A. del Alamo,et al.  An equivalent circuit model for a Faraday cage substrate crosstalk isolation structure , 2004, 2004 IEE Radio Frequency Integrated Circuits (RFIC) Systems. Digest of Papers.

[43]  Marlin H. Mickle,et al.  Intellectual Property and Ubiquitous RFID , 2008 .