Users Authentication and Privacy control of RFID Card

Ikuesan R. Adeyemi,Norafida Bt. Ithnin
DOI: https://doi.org/10.48550/arXiv.1210.1647
2012-10-05
Abstract:Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed a conceptual framework that that can be used to mitigate the unauthorized use of RFID Card. This concept will mitigate the single point of the RFID card failure: unauthorized use.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the security and privacy issues in radio - frequency identification (RFID) technology, especially during the use of RFID cards. Specifically, the paper focuses on the authentication problem of RFID cards on the user side, which is one of the main sources of system attacks. It is mentioned in the paper that unauthorized use of RFID cards constitutes a single - point failure and may lead to threats to the security and privacy of the system. To address these challenges, the author has studied various known attack methods and their mitigation measures, and proposed a conceptual framework aiming to mitigate unauthorized RFID card use through the following methods: 1. **Biometric Authentication**: Integrate the fingerprint - matching process to enhance the security of the card and ensure that only authenticated users can use the card. 2. **Faraday Shielding**: Use Faraday shielding to prevent unauthorized reading and protect the card from the influence of external electromagnetic interference. 3. **Detachable Design**: Design a detachable RFID card, allowing users to control the use state of the card, further improving security. By analyzing various existing attack mitigation measures, the paper proposes a conceptual framework aiming to solve the problem of unauthorized use of RFID cards at the physical level. This framework is divided into three stages: tag design and manufacturing, fingerprint matching and storage, system integration and testing. The ultimate goal is to effectively reduce the security and privacy risks of RFID cards in practical applications through these measures.