Smart Card ID: An Evolving and Viable Technology

In today’s world carrying a number of plastic smart cards to establish our identity has become an integral segment of our routine lives. Identity establishment necessitates a pre stored readily available data about self and to the administrator to authenticate it with claimer’s personal information. There is a distinct requirement of a technological solution for nationwide multipurpose identity for any citizen across the board. Number of options has been exercised by various countries and every option has its own pros and cons. However, it has been observed that in most of the cases Smart Card solution has been preferred by a user and administrator both. The use of Smart cards are so prevalent that be it any profession, without incorporating its application, identity of any individual is hardly considered complete. In this paper, the principle aim is to discuss the viability of Smart Card technology as an identity solution and its ability to perform various functions with strong access control that increases the reliability of Smart Cards over other technologies. It outlines the overview of smart card technology along with its key applications. Security concerns of smart card have been discussed through an algorithm with the help of a division integer proposition. Possibilities of upgrading it with evolving technology offer it as a universal acceptability of identification. Capability of storing desired amount of information by an administrator to compute multiple operations to authenticate a citizen dictates its widening acceptability and an endeavor has been made in this paper to explain it through a proposed system flow chart.

[1]  Le Minh Kieu,et al.  Passenger Segmentation Using Smart Card Data , 2015, IEEE Transactions on Intelligent Transportation Systems.

[2]  Himanshu Thapliyal,et al.  EE-SPFAL: A Novel Energy-Efficient Secure Positive Feedback Adiabatic Logic for DPA Resistant RFID and Smart Card , 2019, IEEE Transactions on Emerging Topics in Computing.

[3]  Albert Levi,et al.  Robust Two-factor smart card authentication , 2017, 2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).

[4]  Vanga Odelu,et al.  A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.

[5]  Chandan Kumar,et al.  An Approach for Storage Security in Cloud Computing- A Survey , 2013 .

[6]  Xiaolei Ma,et al.  Development of a Data-Driven Platform for Transit Performance Measures Using Smart Card and GPS Data , 2014 .

[7]  R Padmavathi,et al.  Digitalized Aadhar enabled ration distribution using smart card , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[8]  Fan Zhang,et al.  Understanding temporal and spatial travel patterns of individual passengers by mining smart card data , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[9]  Xiong Li,et al.  Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..

[10]  Dongho Won,et al.  Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction , 2016, Int. J. Distributed Sens. Networks.

[11]  Shahrel Azmin Suandi,et al.  FingerCode for identity verification using fingerprint and smart card , 2015, 2015 10th Asian Control Conference (ASCC).

[12]  Suhwan Kim,et al.  Differentiating ASK Demodulator for Contactless Smart Cards Supporting VHBR , 2015, IEEE Transactions on Circuits and Systems II: Express Briefs.

[13]  Keith Mayes,et al.  Smart Cards, Tokens, Security and Applications , 2010 .

[14]  Jean-Louis Lanet,et al.  Memory Forensics of a Java Card Dump , 2014, CARDIS.

[15]  T Daisy Premila Bai AN ADAPTABLE SECURE SMART CARD ARCHITECTURE FOR INTERNET OF THINGS AND CLOUD COMPUTING , 2016 .

[16]  Lai Tu,et al.  Estimation of Passenger Route Choice Pattern Using Smart Card Data for Complex Metro Systems , 2016, IEEE Transactions on Intelligent Transportation Systems.

[17]  Ali M. Al-Khouri Targeting Results: Lessons Learned from UAE National ID Program , 2011 .

[18]  Amir Moradi,et al.  Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations , 2015, CHES.

[19]  Debiao He,et al.  Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment , 2012, Wireless Personal Communications.

[20]  Asad M. Ali,et al.  Making Smart Cards Truly Portable , 2010, IEEE Security & Privacy.

[21]  Florian Mendel,et al.  On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks , 2014, IACR Cryptol. ePrint Arch..

[22]  Sven Türpe,et al.  Electronic Identity Cards for User Authentication—Promise and Practice , 2012, IEEE Security & Privacy.

[23]  Jia-Lun Tsai,et al.  Novel Anonymous Authentication Scheme Using Smart Cards , 2013, IEEE Transactions on Industrial Informatics.

[24]  M. Batty,et al.  Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data , 2016, PloS one.

[25]  Peter White,et al.  The Potential of Public Transport Smart Card Data , 2005 .

[26]  Catherine Morency,et al.  Smart card data use in public transit: A literature review , 2011 .

[27]  Mahmoud Mesbah,et al.  Use of Smart Card Fare Data to Estimate Public Transport Origin–Destination Matrix , 2015 .

[28]  S. Albert Rabara,et al.  Elliptic Curve Cryptography Based Security Framework for Internet of Things (IoT) Enabled Smart Card , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).

[29]  Chin-Chen Chang,et al.  An efficient multi-server password authenticated key agreement scheme using smart cards with access control , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[30]  Farid Benhammadi,et al.  Embedded Fingerprint Matching on Smart Card , 2013, Int. J. Pattern Recognit. Artif. Intell..

[31]  Ashok Kumar Das,et al.  Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..

[32]  Eun-Jun Yoon,et al.  Lightweight authentication with key-agreement protocol for mobile network environment using smart cards , 2016, IET Inf. Secur..

[33]  Nigel H. M. Wilson,et al.  Analyzing Multimodal Public Transport Journeys in London with Smart Card Fare Payment Data , 2009 .

[34]  Takamasa Iryo,et al.  Estimation method for railway passengers’ train choice behavior with smart card transaction data , 2010 .

[35]  Chunguang Ma,et al.  Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme , 2012, ICDCIT.