Abstract
Contactless Smartcards are typically used in fields of electronic ticketing, transport and access control. More recently, they have been for electronic payment transactions. This apparent reluctance to the use of contactless smartcards in fields that involve money transactions as well as many other fields and applications is because contactless technology is erroneously believed to be less secure than contact technology. Research has shown that contactless smartcards are not fundamentally less secure than contact cards. However certain security threats are inherently facilitated by contactless smart cards and contactless technology. The various security issues in contactless technology are Eavesdropping, Denial of Service, Covert Transactions, and Man-in-the-Middle.
In this paper, we explore the possibility of using cryptography as a solution to the security issues in contactless technology. We provide the effectiveness of cryptography on these issues, the limitations we have to impose on our applications in order to use cryptography, and further enhancements that are possible to reduce, if not eliminate, the severity of security threats in contactless technology which will further enable use of contactless smart cards in more fields hitherto unexplored.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Handschuh, H.: Contactless technology Security Issues. Information Security bulletin 9, 95–100 (2004)
Nohl, S.K., Evans, D., Plötz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: USENIX Security Symposium, San Jose, CA, July 31 (2008)
Rankl, W., Effing, W.: Smart Card Handbook, 2nd edn. John Wiley & Sons, New York (2000)
Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password based protocols secure against dictionary attacks. In: IEEE Security & Privacy, Oakland, CA, USA, pp. 72–84. IEEE, Los Alamitos (May 1992)
Mohammed, L.A., Ramli, A.R., Prakash, V., Daud, M.B.: Smart Card Technology: Past, Present, and Future. International Journal of The Computer, the Internet and Management 12(1), 12–22 (2004)
Fancher, C.H.: In your Pocket: Smartcards, IEEE Spectrum. In: Ullmann, M., Kugler, D., Neumann, H., Stappert, S., Vogeler, M. (eds.) Proceedings of Password Authenticated Key Agreement for Contactless Smart Cards, RFIDSEC 2008, February, pp. 47–53 (1997/2008)
Guillou, L.C., et al.: The smart Card: A Standardized Security Device Dedicated to Public cryptology. In: Simmons, G.J. (ed.) Contemporary Crypto-logy. The Science of Information Integrity, pp. 561–613. IEEE Press, Los Alamitos (1992)
Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively, Technical Report No.640, University of Cambridge, ISSN 1476-2986
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kundarap, A., Chhajlani, A., Singla, R., Sawant, M., Dere, M., Mahalle, P. (2010). Security for Contactless Smart Cards Using Cryptography. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_56
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)