An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone

Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit ca...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chang, A.Y., Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 40
container_issue
container_start_page 36
container_title
container_volume
creator Chang, A.Y.
Dwen-Ren Tsai
Chang-Lung Tsai
Yong-Jiang Lin
description Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.
doi_str_mv 10.1109/CCST.2009.5335567
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5335567</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5335567</ieee_id><sourcerecordid>5335567</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-608be588df6ddfb0f56511ac2e5df4a29d623d95a25988bc7938d1e3b14f5a063</originalsourceid><addsrcrecordid>eNo9kMlOwzAYhM1SiVD6AIiLXyDFu-NjFbFJlTjQe-XYv6lR4hQ7RerbU4mKucxhZr7DIHRPyZJSYh7b9mOzZISYpeRcSqUv0C0VTAhBNVGXqGJU8ppowa7-A2XYNaoo0bRWUrMZqrSplRCKkxu0KOWLnCQka6iqUL9KOA77PP6Axw7yFEN0dgI8gNvZFMuAw5jxlG0q1k1xTAUfSkyfOFsfRxwyfB8guSOOHtJ5fWphSLbrT8xh7GIPeL8bE9yhWbB9gcXZ52jz_LRpX-v1-8tbu1rX0ZCpVqTpQDaND8r70JEglaTUOgbSB2GZ8Ypxb6Rl0jRN57ThjafAOyqCtETxOXr4w0YA2O5zHGw-bs8H8l9j22C8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chang, A.Y. ; Dwen-Ren Tsai ; Chang-Lung Tsai ; Yong-Jiang Lin</creator><creatorcontrib>Chang, A.Y. ; Dwen-Ren Tsai ; Chang-Lung Tsai ; Yong-Jiang Lin</creatorcontrib><description>Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.</description><identifier>ISSN: 1071-6572</identifier><identifier>ISBN: 1424441692</identifier><identifier>ISBN: 9781424441693</identifier><identifier>EISSN: 2153-0742</identifier><identifier>EISBN: 1424441706</identifier><identifier>EISBN: 9781424441709</identifier><identifier>DOI: 10.1109/CCST.2009.5335567</identifier><identifier>LCCN: 79-644630</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymous ; Authentication ; Communication channels ; Communication system security ; Credit cards ; Data security ; Mobile communication ; Mobile Computing ; Mobile handsets ; Privacy ; Radiofrequency identification ; RFID Security ; RFID tags</subject><ispartof>43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, p.36-40</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5335567$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5335567$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chang, A.Y.</creatorcontrib><creatorcontrib>Dwen-Ren Tsai</creatorcontrib><creatorcontrib>Chang-Lung Tsai</creatorcontrib><creatorcontrib>Yong-Jiang Lin</creatorcontrib><title>An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone</title><title>43rd Annual 2009 International Carnahan Conference on Security Technology</title><addtitle>CCST</addtitle><description>Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.</description><subject>Anonymous</subject><subject>Authentication</subject><subject>Communication channels</subject><subject>Communication system security</subject><subject>Credit cards</subject><subject>Data security</subject><subject>Mobile communication</subject><subject>Mobile Computing</subject><subject>Mobile handsets</subject><subject>Privacy</subject><subject>Radiofrequency identification</subject><subject>RFID Security</subject><subject>RFID tags</subject><issn>1071-6572</issn><issn>2153-0742</issn><isbn>1424441692</isbn><isbn>9781424441693</isbn><isbn>1424441706</isbn><isbn>9781424441709</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kMlOwzAYhM1SiVD6AIiLXyDFu-NjFbFJlTjQe-XYv6lR4hQ7RerbU4mKucxhZr7DIHRPyZJSYh7b9mOzZISYpeRcSqUv0C0VTAhBNVGXqGJU8ppowa7-A2XYNaoo0bRWUrMZqrSplRCKkxu0KOWLnCQka6iqUL9KOA77PP6Axw7yFEN0dgI8gNvZFMuAw5jxlG0q1k1xTAUfSkyfOFsfRxwyfB8guSOOHtJ5fWphSLbrT8xh7GIPeL8bE9yhWbB9gcXZ52jz_LRpX-v1-8tbu1rX0ZCpVqTpQDaND8r70JEglaTUOgbSB2GZ8Ypxb6Rl0jRN57ThjafAOyqCtETxOXr4w0YA2O5zHGw-bs8H8l9j22C8</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Chang, A.Y.</creator><creator>Dwen-Ren Tsai</creator><creator>Chang-Lung Tsai</creator><creator>Yong-Jiang Lin</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200910</creationdate><title>An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone</title><author>Chang, A.Y. ; Dwen-Ren Tsai ; Chang-Lung Tsai ; Yong-Jiang Lin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-608be588df6ddfb0f56511ac2e5df4a29d623d95a25988bc7938d1e3b14f5a063</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Anonymous</topic><topic>Authentication</topic><topic>Communication channels</topic><topic>Communication system security</topic><topic>Credit cards</topic><topic>Data security</topic><topic>Mobile communication</topic><topic>Mobile Computing</topic><topic>Mobile handsets</topic><topic>Privacy</topic><topic>Radiofrequency identification</topic><topic>RFID Security</topic><topic>RFID tags</topic><toplevel>online_resources</toplevel><creatorcontrib>Chang, A.Y.</creatorcontrib><creatorcontrib>Dwen-Ren Tsai</creatorcontrib><creatorcontrib>Chang-Lung Tsai</creatorcontrib><creatorcontrib>Yong-Jiang Lin</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chang, A.Y.</au><au>Dwen-Ren Tsai</au><au>Chang-Lung Tsai</au><au>Yong-Jiang Lin</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone</atitle><btitle>43rd Annual 2009 International Carnahan Conference on Security Technology</btitle><stitle>CCST</stitle><date>2009-10</date><risdate>2009</risdate><spage>36</spage><epage>40</epage><pages>36-40</pages><issn>1071-6572</issn><eissn>2153-0742</eissn><isbn>1424441692</isbn><isbn>9781424441693</isbn><eisbn>1424441706</eisbn><eisbn>9781424441709</eisbn><abstract>Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit card, however, the limitation of the production cost of RFID tag, its computing power and storage capacity is limited. Thus, it cannot perform sophisticated computation needed for the authentication mechanism, i.e., security technologies adopted from traditional wireless network cannot be transplanted to the contactless RFID transmission directly. Many solutions have been proposed to improve the RFID security issues raised in the research. Most of these studies assume the communication infrastructure between the RFID reader and the back-end database are based wired enterprise networking environment which is usually defined as the secured communication channel. However, there are many applications that users need to use RFID enabled handheld devices such as mobile phones or PDAs to link with the back-end database via wireless communication protocols like GSM, GPRS or wi-fi. These communication channels are exposed to unsafe environments and the security issues must be taken into account. In this paper, we construct an RFID system based on mobile communication devices such as cellular phones. We propose an effective and secured certificate mechanism using mobile devices as RFID readers together with the credit cards containing RFID tags. The result shows it can improve the existing RFID security issues under the premise of safety, efficiency and compatibility of the EPC network.</abstract><pub>IEEE</pub><doi>10.1109/CCST.2009.5335567</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1071-6572
ispartof 43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, p.36-40
issn 1071-6572
2153-0742
language eng
recordid cdi_ieee_primary_5335567
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Anonymous
Authentication
Communication channels
Communication system security
Credit cards
Data security
Mobile communication
Mobile Computing
Mobile handsets
Privacy
Radiofrequency identification
RFID Security
RFID tags
title An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T22%3A36%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20improved%20certificate%20mechanism%20for%20transactions%20using%20radio%20frequency%20identification%20enabled%20mobile%20phone&rft.btitle=43rd%20Annual%202009%20International%20Carnahan%20Conference%20on%20Security%20Technology&rft.au=Chang,%20A.Y.&rft.date=2009-10&rft.spage=36&rft.epage=40&rft.pages=36-40&rft.issn=1071-6572&rft.eissn=2153-0742&rft.isbn=1424441692&rft.isbn_list=9781424441693&rft_id=info:doi/10.1109/CCST.2009.5335567&rft_dat=%3Cieee_6IE%3E5335567%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424441706&rft.eisbn_list=9781424441709&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5335567&rfr_iscdi=true