Abstract

Currently, the RFID (Radio\\Frequency Identification) applications, such as banking (card payment), toll cards, access cards and package delivery do not use location information for authentication. These applications depend only on the information available in the RFID card to authenticate. This results in various security issues, such as unauthorized reading and relay attacks on RFID systems. Using the location information, a new level of security layer can be introduced into the authentication mechanism. The location information can be used by a back end server, such as a bank server to analysee the current location and compare it with predefined authorized locations for that particular card. In case of positive match, authorization is granted to the payment gateway to proceed with the transaction. This approach protects the tag owners from unauthorized transactions or misusage of RFID card. The location information can also be used by payment gateway to authenticate the card payment machines to be legal and in the registered premises. In case the machine is not in the registered premises, then the machine can be blocked. This makes the machine steal proof, as the machine would be useless in any other location. Keywords: Access Card, GPS, Location Based Authentication, RFID

Highlights

  • Low cost, small size and the ability of allowing computerized identification of objects make Radio\Frequency IDentification (RFID) systems increasingly ubiquitous in both public and private domains

  • They build a new tree-based protocol to provide scalable private authentication, with reader work O, O rounds of interaction, and O tag storage, where N denotes the number of tags, and the N tags are considered as leaves in a balanced binary tree[7]

  • We show the security against the available attacks in RFID system as following Table 2

Read more

Summary

Introduction

Small size and the ability of allowing computerized identification of objects make Radio\Frequency IDentification (RFID) systems increasingly ubiquitous in both public and private domains. Prominent RFID applications include supply chain management (inventory control), e-passports, credit cards, driver’s licenses, vehicle systems (toll collection or car key), access cards (building, parking or public transport), and medical implants. In these applications, the secure information, such as card number, owner credentials, are stored in the card. Using a RFID reader, this information can be retrieved and analysed. Existing card authentication mechanism can introduce different types of relay attacks, such as ‘Ghost-and-Leech’ attack. Existing mechanisms are available, such as encrypting the tag data and decrypting the data in the reader.

Weak Attacks
Strong Attacks
Related Work
Location privacy
Availability
Tracking attack
Man-in-the-middle attack
Efficiency Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call