Smart Cards Research Papers - Academia.edu (original) (raw)

A smart card, chip card, or integrated circuit card (icc) is any pocket-sized card with embedded integrated circuits. Smart Cards are secure portable storage devices used for several applications especially security related ones involving... more

A smart card, chip card, or integrated circuit card (icc) is any pocket-sized card with
embedded integrated circuits. Smart Cards are secure portable storage devices used for several
applications especially security related ones involving access to system’s database either online or
offline. Smart cards are made of plastic, generally polyvinyl chloride, but sometimes polyethylene
terephthalate based polyesters, acrylonitrile butadiene styrene orpolycarbonate. This research is chiefly
to study the security principals of smart card and assess the security aspects’ affect on smart card
technology adoption.

Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In... more

Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In this study, we use network-wide data obtained from smart cards in the London transport system to predict future traffic volumes, and to estimate the effects of disruptions due to unplanned closures of stations or lines. Disruptions, or shocks, force passengers to make different decisions concerning which stations to enter or exit. We describe how these changes in passenger behavior lead to possible overcrowding and model how stations will be affected by given disruptions. This information can then be used to mitigate the effects of these shocks because transport authorities may prepare in advance alternative solutions such as additional buses near the most affected stations. We describe statistical methods that leverage the large amount of smart-ca...

An access control system has the role to verify and mediate attempts made by users to access resources in a system. An access control system maps activities and resources to legitimate users. This paper presents a distributed smart card... more

An access control system has the role to verify and mediate attempts made by users to access resources in a system. An access control system maps activities and resources to legitimate users. This paper presents a distributed smart card based access control system for a building. The system is Internet centered. Each door has a control access point and all these are connected to a server which will grant or not the access. A user requests access by using a smart card which memorizes the user's unique identity code.

Objective The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria.Methods Within a large boys’ school a smart card based system... more

Objective The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria.Methods Within a large boys’ school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials.Results The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical.Conclusion The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.

Health information systems (HIS) are often deployed with inadequate security mechanisms and with users being generally pointed out as the weakest link. The launch of the Portuguese digital national identification smart card, the citizen... more

Health information systems (HIS) are often deployed with inadequate security mechanisms and with users being generally pointed out as the weakest link. The launch of the Portuguese digital national identification smart card, the citizen card (CC), with strong authentication and digital signing capabilities, represents a new and viable economic opportunity for securing a HIS and at the same time foster the creation of a much more secure national health information infrastructure. Smart cards are being deployed in ...

The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone nowadays constitutes the full embodiment of the truly personal device users carry... more

The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone nowadays constitutes the full embodiment of the truly personal device users carry constantly with them, everywhere. They are therefore the ideal means by which the user can casually and conveniently interact with information systems. It can also act as a convenient and highly practical storage place for sensitive identity information. Moreover nowadays there ...

Embedded Systems has witnessed tremendous growth in the last one decade. Almost all the fast developing sectors like automobile, aeronautics, space, rail, mobile communications, and electronic payment solutions have witnessed increased... more

Embedded Systems has witnessed tremendous growth in the last one decade. Almost all the fast developing sectors like automobile, aeronautics, space, rail, mobile communications, and electronic payment solutions have witnessed increased use of Embedded technologies. Greater value to mobility is one of the prominent reasons for the rise and development of Embedded technologies.

ABSTRAK Saat ini sistem keamanan merupakan hal terpenting dalam kehidupan sehari – hari, seperti pada sistem keamanan rumah. Banyak sekali terjadi pencurian di rumah – rumah karena sistem keamanan rumah yang tidak terproteksi dengan baik... more

ABSTRAK
Saat ini sistem keamanan merupakan hal terpenting dalam kehidupan sehari – hari, seperti pada sistem keamanan rumah. Banyak sekali terjadi pencurian di rumah – rumah karena sistem keamanan rumah yang tidak terproteksi dengan baik terutama pada pintu - pintu rumah. Biasanya pintu rumah hanya menggunakan kunci konvensional. Kemajuan teknologi saat ini memunculkan suatu inovasi untuk menciptakan suatu alat sistem keamanan yang canggih.
Berdasarkan realita tersebut, maka dalam penelitian ini dirancang sistem keamanan pintu ruangan dengan RFID berbasis ATmega 328 pada modul Arduino UNO. Penulis mencoba merancang dan merealisasikan suatu alat dalam miniatur yang berbasis mikrokontroler dengan judul ”RANCANG BANGUN KEAMANAN PINTU RUANGAN DENGAN RFID DAN PASSWORD MENGGUNAKAN ARDUINO UNO”
Hasil dari perancangan alat tersebut adalah suatu miniatur pintu ruangan yang dapat dikendalikan dengan berbasis Mikrokontroler ATmega 328. yang bekerja dengan catuan daya yang berkisar 5 Vdc dan 12 Vdc.
Kata kunci: Sensor RFID, ATmega 328, Tag Card, Pengaman Rumah
ABSTRACT
Current security system is of paramount importance in daily, as in the home security system. Lots of theft in the houses because a home security system is not well protected, especially on doors house. Usually the door using a conventional key only. Advances in technology now raises an innovation tool to create an advanced security system.
Based on this reality, so in this research will be designed door room security system with RFID based on ATmega 328 at Arduino UNO module. Authors tried to design and realize a device in miniature-based microcontroller with the title "DOOR ROOM SECURITY SYSTEM DESIGN WITH RFID AND PASSWORD USING ADUINO UNO"
Results of the design tool is a miniature door of the room that can be controlled by the ATmega 328 Microcontroller-based. working with a range of power ration 5 VDC and 12 VDC.
Keywords: RFID Censorship, ATmega 328, Tag Card, House Securiy

This paper summarizes an explorative study of the novel design and security that contribute to consumers' adoption of an integrated, single platform payment system encompassing card, Internet and mobile technologies in the ASEAN. The... more

This paper summarizes an explorative study of the novel design and security that contribute to consumers' adoption of an integrated, single platform payment system encompassing card, Internet and mobile technologies in the ASEAN. The attempt to survey these areas in an integrated fashion is a novel approach that differs from existing studies that mainly focus on adoption factors of these technologies in isolation as well as focuses on the novel design and the security elements. The empirical results from the quantitative analysis suggest that design, security, perceived usefulness as well as perceived ease of use are significant factors that contribute to consumers' intention to utilize a single platform payment System. Organizations will be able to utilize the study information for developing products and services that meet the consumers' single platform E-payment system while also fulfil their objective of corporate social responsibility.

Because the network is an open environment, a lot of care must be taken when transferring sensitive information especially when related with financial data. This depends on the principals to be trusted which is a problematic and since the... more

Because the network is an open environment, a lot of care must be taken when transferring sensitive information especially when related with financial data. This depends on the principals to be trusted which is a problematic and since the first step in network
security is the authentication, this paper presents a proposed modal for secure mobile banking (m-banking) applications using Kerberos (the network authentication protocol).
The aim of this paper is to establish a secure communication between the clients and mobile-bank application server in which they can use their mobile phone to securely access their bank accounts, make and receive payments, and check their balances.
The integration of smart card into classic Kerberos enhances the security for client authentication by storing the cryptographic keys and perform dual factor authentication.
Other enhancement to Kerberos is the PKINIT in which the shared key is mapped with public- private key. To build a robust client authentication the client uses his/her mobile phone to author Kerberos's messages, process the replay and establish secure
communication with the application server.

ABSTRACT The aim of this paper is to propose a solution for a potential vulnerability in mobile proximity payment. The mobile proximity payment is the evolution of the card payment whose reference standard is EMV (Europay, MasterCard and... more

ABSTRACT The aim of this paper is to propose a solution for a potential vulnerability in mobile proximity payment. The mobile proximity payment is the evolution of the card payment whose reference standard is EMV (Europay, MasterCard and VISA). A mobile proximity payment transaction is performed via radio waves so there is the possibility to intercept the communication with the point-of-sale and also to activate the payer device, in a range of 10 cm. The EMV protocol assumes that within a range of 10 cm card fraud is hard to perform, moreover IC card capable point of sale are considered safe a priori, while the card must authenticate itself. This allows a leak of card information. In this paper we describe a possible solution to this problem, adding a safe level to the EMV protocol in the case of mobile proximity payment transactions. Our solution is a Needham-Schroeder based protocol, that guarantees authentication and confidentiality between the entities involved in the payment.

Credit card fraud, as the fastest growing crime of the new millennium, puts a great burden on the economy affecting both customers and financial institutions. It not only costs money, but also a great amount of time to restore the harm... more

Credit card fraud, as the fastest growing crime of the new millennium, puts a great burden on the economy affecting both customers and financial institutions. It not only costs money, but also a great amount of time to restore the harm done. Biometric verification systems and smart cards are among the alternative solutions. On the other hand, the intelligence community should update itself in terms of technology and awareness programs.

Smart cards rely on pseudorandom number generators to provide uniqueness and freshness in their cryptographic services i.e. encryption and digital signatures. Their implementations are kept proprietary by smart card manufacturers in order... more

Smart cards rely on pseudorandom number generators to provide uniqueness and freshness in their cryptographic services i.e. encryption and digital signatures. Their implementations are kept proprietary by smart card manufacturers in order to remain competitive. In this paper we look at how these generators are implemented in general purpose computers. How architecture of such generators can be modified to suit the smart card environment. Six variations of this modified model were implemented in Java Card along with the analysis of their performance and randomness. To analyse the randomness of the implemented algorithms, the NIST statistical test suite is used. Finally, an overall analysis is provided, that is useful for smart card designers to make informed decisions when implementing pseudorandom number generators.

and Services (ITCSE 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Information Technology Convergence and Services. The aim of the conference is to provide... more

and Services (ITCSE 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Information Technology Convergence and Services. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

This paper presents a healthcare model based on smart cards. The purpose of the proposed model is to facilitate information exchange and integration across medical organizations. Currently, in Saudi Arabia, all medical centers have their... more

This paper presents a healthcare model based on smart cards. The purpose of the proposed model is to facilitate information exchange and integration across medical organizations. Currently, in Saudi Arabia, all medical centers have their own healthcare system. Each time a patient visits a clinic; a new file is created for him. Clinical information history related to the previous consultations is not available. Confidential information is not protected by the traditional folder. Prescriptions provided by doctors are signed manually and not efficiently authenticated by pharmacies. Claims are transmitted to the insurance companies by fax which makes them subject to falsification. The existing approach of the ministry of health in maintaining information about patients is not efficient, because healthcare institutions are not linked to a central system. In the proposed solution, the smart card will be used to store medical history of a patient that contains all diagnosis and drug prescriptions done in different medical centers. It will be used also to store keys and perform all the cryptographic computations. The medical institutions should adhere to the government healthcare organization system managed by the ministry of health. The healthcare organization should play the trusted third party as certification authority (CA). The information exchanged by the medical institutions should be protected and secured.

This paper describes the design and the development of a prototype of an interfacing between PIC and smart card that is important in car security application. Smart card was used, as one of the cheaper way to prevent the car from robbery... more

This paper describes the design and the development of a prototype of an interfacing between PIC and smart card that is important in car security application. Smart card was used, as one of the cheaper way to prevent the car from robbery or theft. Each smart card supplied with machine ID that are set in the microcontrollerpsilas memory for authentication purposes. Here, the smart card function is similar to an external EEPROM chip; therefore for simplicity external EEPROM chip was used to replace the smart card. The software kits developed to help users to set an ID. Visual Basic 6.0 was used as interfacing with microcontroller chip 16F877A. Each registered user supplied with different smart cards of difference ID but with the same machine ID. This could be used in the system to ensure only the authenticated person can use the particular cars.

Highlights • Smart card data are used to define public transport passenger profiles. • The study is based on a coastal tourist destination during peak season. • The analysis focuses on travellers using a multipersonal transport fare. •... more

Highlights • Smart card data are used to define public transport passenger profiles. • The study is based on a coastal tourist destination during peak season. • The analysis focuses on travellers using a multipersonal transport fare. • Model-based clustering is used to identify passenger profiles. • The method provides useful information for public transport policy and management. Abstract Data collected through smart travel cards in public transport networks have become a valuable source of information for transport geography studies. During the last two decades, a growing body of literature has used this sort of data source to study the behaviour of public transport users in cities and regions around the world. However, its use has been scarce in contexts where public transport demand is highly influenced by the activities of the tourist sector. Therefore, it remains to be seen whether these data can be leveraged to optimize the supply of public transport. In this article, data drawn from the Camp de Tarragona automated fare collection system extracted during 2018 are used to study tourists' use of public transport in Costa Daurada (Catalonia, Spain). This is a popular coastal destination with a high concentration of visitors during the summer period. The analysis f ocuses on the use of the T-10, a multipersonal transport fare with no time limitations on its use which makes it appealing for tourists. Model-based clustering has been applied to identify different clusters of passengers according to their activity and spatial profiles. Differences between profiles are significant and, as a result, this study allowed the validation of a method that could be replicated in other contexts, as it provides highly useful information for public transport policy and mobility management.

The paper proposes a multi-party key exchange scheme with Perfect Forward Secrecy (PFS) which ensures that a session key derived from a set of long-term public and private keys used in the protocol to authenticate, does not compromise the... more

The paper proposes a multi-party key exchange scheme with Perfect Forward Secrecy (PFS) which ensures that a session key derived from a set of long-term public and private keys used in the protocol to authenticate, does not compromise
the secrecy of session key. In this protocol, each group establishes connection by communicating through a trusted third party. The trusted party acts as a group controller generates a public key and broadcasts it among the groups. Each group generate their public keys and send to trusted party. After receiving all the keys the group controller shares it among all the parties to generate the session key. Similarly, each group manager of individual group communicates with the members of the corresponding group. The security of the proposed scheme is analysed rigorously and proved to be resistant against non-repudiation attack, replay attack, chosen cipher attack, man-in-the middle attack. The scheme has wider applications such as, sending encrypted e-mail in a military environment to multiple users, securing submitted bids information in online tender, contract signing by many organizations, etc.

Smart mobility systems make it possible to collect a huge amount of information about passenger’s movements that can reveal users’ behaviour and social relations. In the light of the above, these systems should adopt adequate... more

Smart mobility systems make it possible to collect a huge amount of information about passenger’s movements that can reveal users’ behaviour and social relations.
In the light of the above, these systems should adopt adequate privacy-oriented solutions in order to avoid the risk of transforming mobility architecture into generalized territorial surveillance systems.
Adopting a case study approach, the article analyses the role played by data management, data anonymization, and pseudonymization in reducing the potential negative impact of e-ticketing technologies on individual and social privacy.
In a context characterized by public subsidies provided by regional governments to transport companies, the author shows how privacy-oriented strategies adopted by regional governments are an important factor to induce mobility policies that focus on service quality and citizen privacy protection.
Finally, the case study shows the importance of the adoption of a multi-stakeholder approach to define privacy-oriented mobility systems in line with the idea of a participatory and inclusive smart community.

Among the fast growing usage of new technologies, smart card technology has an outstanding growth and making its way worldwide into the hands and wallets of everyone. In fact, smart cards greatly improve the comfort and security of any... more

Among the fast growing usage of new technologies, smart card technology has an outstanding growth and making its way worldwide into the hands and wallets of everyone. In fact, smart cards greatly improve the comfort and security of any transaction. It is important to note that consumer acceptance and confidence are vital for the further development of smart card technology or in other words, we can say that acceptance has been viewed as a function of user involvement in smart card systems development. Understanding the factors that influence user acceptance of information technology is of interest both to researchers in a variety of fields as well as procurers of technology for large organizations. Adoption of smart card technologies should not be made simply, knowing the customers perception of and behavioral intention to use technology should be a key in the decision making process. The purpose of this study is to develop an adoption model of using smart card technology.

A building security management system based on single board computer is currently under development. In this paper, a part of the system which is an automatic door access system using contactless smart card for identification is... more

A building security management system based on
single board computer is currently under development. In this
paper, a part of the system which is an automatic door access
system using contactless smart card for identification is
discussed. Running test shows that the system is working as
expected. The system can identify multiple users each with
different card. More specific access such as access by day,
hour, even minute can be implemented. Alarm is used as
indicator if the door is unlocked or any forced intrusion is
happening. The corresponding system is going to be integrated
in a building security management system to provide safer
work environment

This article looks at one of the evolving crimes of the digital age; identity theft. It argues and explains that if three key technologies were implemented together namely biometrics, smart cards, and PKI, then they can deliver a robust... more

This article looks at one of the evolving crimes of the digital age; identity theft. It argues and explains that if three key technologies were implemented together namely biometrics, smart cards, and PKI, then they can deliver a robust and trusted identification and authentication infrastructure. The article concludes that such infrastructure may provide the foundation for e-government and ecommerce initiatives as it addresses the need for strong user authentication of virtual identities.