Abstract

Notice of Violation of IEEE Publication Principles<br><br>"Evolution in RFID Credit Card Security by using Wireless Sensing Network"<br>by Rohit Sharma, Prakaj Singh and Ravikant Saini in the Proceedings of the 2011 International Conference on Management of e-Commerce and e-Government, November 2011<br><br>After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.<br><br>This paper contains duplicate text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper titles) and without permission.<br><br>"Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing"<br> by Yanjing Yang, Robert H. Deng, Jianying Zhou, Ying Qiu<br>in Information Security Practice and Experience, April 2009<br><br>"Vulnerabilities in First-Generation RFID-enabled Credit Cards"<br><br>by Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels and Tom O'Hare<br>in The New York Times, 2007<br><br> <br/> The main idea of this paper is to integrate RFID technology and WSN to build an intelligent & secured RFID credit card system. Two scenarios of integration have been implemented. In the first one, we not extended the read range of the RFID system by adding wireless facility to RFID readers. Each RFID reader is equipped with a wireless module which can transmit data to and from the reader. RFID reader acts as sensor node: it reads the identification of an object and sends it to the host application via an ad-hoc network. The second scenario of integration provides RFID readers with sensing ability. Several motion sensors are installed near each reader to detect the presence of a tagged object and to command the reader activity.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.