Skip to main content
Log in

Intelligent RFID biometric enabled dual security lock in the banking environment

  • Original Article
  • Published:
Journal of Banking and Financial Technology Aims and scope Submit manuscript

Abstract

This paper describes an expert RFID biometric enabled dual system architecture which acts as a smart and digitized banking vault door locking system. The proposed system is novel, multipurpose and provides three levels of security. It is based on locker automation using RFID technology and software Android App technology that allows access only to the authorized owner of the bank vault to open it. Despite the legacy key system, the overall control of electronic smart door lock system utilizes the RFID tags via NFC, biometric traits via web portal and mobiles via Bluetooth as the procedure for authentication. Our proposed RFID technology-based access control authentication mechanism utilizes low cost irrevertible functions to control the vulnerable security attacks. Furthermore, the proposed lock system has a tag’s identification search complexity of only \({\mathcal {O}}(1)\).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Baidya J, Saha T, Moyashir R, Palit R (2017) Design and implementation of fingerprint based lock system for shared access. In: 2017 IEEE 7th annual computing and communication workshop and conference, pp 1–6

  2. Farooq U, Hasan MU, Amar M, Hanif A, Asad MU (2014) RFID based security and access control system. IACSIT Int J Eng Technol 6(4):309–314

    Article  Google Scholar 

  3. Wu DL, Ng WW, Yeung DS, Ding HL (2009) A brief survey on current RFID applications. IEEE Conf Mach Learn Cybern 4:2330–2335

    Google Scholar 

  4. Verma GK, Tripathi P (2010) A digital security system with door lock system using RFID technology. Int J Comput Appl 5(11):6–8

    Google Scholar 

  5. Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394

    Article  MathSciNet  Google Scholar 

  6. Omidiora EO, Fakolujo OA, Arulogun OT, Aborisade DO (2011) A prototype of a fingerprint based ignition systems in vehicles. Eur J Sci Res 62(2):164

    Google Scholar 

  7. Kawale A (2013) Fingerprint based locking system. Int J Sci Eng Res 4(5)

  8. Yugashini I, Vidhyasri S, Gayathri Devi K (2013) Design and implementation of automated door accessing system with face recognition. Int J Sci Mod Eng 1(12)

  9. Sayemul I, Saiduzzaman MD (2013) Design of a bank vault security system with password, thermal physical interrupt alarm. Int J Sci Eng Res 4(8)

  10. Ray R, Uddin MA, Islam SF (2016) GSM based bank vault security system. Int J Comput Sci Inf Secur 14(2):35

    Google Scholar 

  11. Ramani R, Selvaraju S, Valarmathy S, Niranjan P (2012) Bank locker security system based on RFID and GSM technology. Int J Comput Appl 57(18)

  12. Grewal K, Mishra R, Chaurasiya N, Singh P (2015) RFID based security and access control system using Arduino with GSM module. IJEEE 2(2)

  13. Crystalynne C, Badwal JS, Hipolito JR et al (2016) Development of microcontroller-based biometric locker system with short message service. Lect Notes Softw Eng 4(2):103

    Article  Google Scholar 

  14. Meng XL, Song ZW, Li XY (2010) RFID-based security authentication system based on a novel face-recognition structure. In: IEEE proceedings of WASE international conference on information engineering, vol 1, pp 97–100

  15. Wu DL, Ng WW, Chan PP, Ding HL, Jing BZ, Yeung DS (2010) Access control by RFID and face recognition based on neural network. In: IEEE international conference on machine learning and cybernetics, vol 2, pp 675–680

  16. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) \(LMAP\): a real lightweight authentication protocol for low cost RFID tags. In: Proceedings of 2nd workshop on RFID security, pp 1–12

  17. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) \(M^2AP\): a minimalist mutual authentication protocol for low cost RFID tags. In: Proceedings of UIC’06, vol 4159. Springer, Berlin, pp 912–923

  18. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) \(EMAP\): an efficient mutual authentication protocol for low cost RFID tags. In: Proceedings of IS’06, vol 4277. Springer, Berlin, pp 352–361

  19. Li T, Wang G (2007) Security analysis of two ultra-lightweight RFID authentication protocols. In: New approaches for security, privacy and trust in complex environments. Springer, Berlin, pp 109–120

  20. Li T, Deng R (2007) Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol. In: IEEE international conference on availability, reliability and security ARES 2007, pp 238–245

  21. Chien HY (2007) \(SAS1\): a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secur Comput 4(4):337–340

    Article  Google Scholar 

  22. Phan RCW (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol SASI. IEEE Trans Dependable Secur Comput 6(4):316–320

    Article  Google Scholar 

  23. Sun HM, Ting WC, Wang KH (2009) On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans Dependable Secur Comput 2:315–317

    Google Scholar 

  24. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low cost RFID tags: Gossamer protocol. In: Proceedings of WISA’08, vol 5379. Springer, Berlin, pp 56–68

  25. Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol. In: International conference on network-based information systems NBIS’09, pp 260–267

  26. Lee YC, Hsieh YC, You PS, Chen TC (2009) A new ultralightweight RFID protocol with mutual authentication. In: Proceedings of WASE’09, vol 2, pp 58–61

  27. Kulseng L, Yu Z, Wei Y, Guan Y (2010) Lightweight mutual authentication and ownership transfer for RFID systems. In: IEEE Proceedings INFOCOM2010, pp 1–5

  28. Yang Y, Gu J, Lv C, Jiang Q, Ma W (2012) Security analysis of Kulseng et al.’s mutual authentication protocol for RFID systems. IET Inf Secur 6(4):239–248

    Article  Google Scholar 

  29. Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705

    Article  Google Scholar 

  30. Avoine G, Carpent X (2013) Yet another ultralightweight authentication protocol that is broken. In: Radio frequency identification. Security and privacy issues, pp 20–30

  31. Jeon IS, Yoon EJ (2013) A new ultra-lightweight RFID authentication protocol using merge and separation operations. Int J Math Anal 7(52):2583–2593

    Article  Google Scholar 

  32. Wang S, Liu S, Chen D (2014) Security analysis and improvement on two RFID authentication protocols. Wirel Pers Commun 82(1):1–13

  33. Zhuang X, Zhu Y, Chang CC (2014) A new ultralightweight RFID protocol for low-cost tags: \(R^{2}AP\). Wirel Pers Commun 79(3):1787–1802

    Article  Google Scholar 

  34. Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Syst Secur 13(1):7

    Article  Google Scholar 

  35. Kaul SD, Awasthi AK (2017) Security flaws in two recently proposed RFID authentication protocols. Int J Comput Appl 50:1–8

    Google Scholar 

  36. Luo H, Wen G, Su J, Huang Z (2016) SLAP: succinct and lightweight authentication protocol for low-cost RFID system. Wirel Netw. https://doi.org/10.1007/s11276-016-1323-y

    Article  Google Scholar 

  37. Stinson DR, Paterson M (2018) Cryptography: theory and practice. CRC Press, Boca Raton

    Book  Google Scholar 

  38. Forouzan BA (2007) Cryptography & network security. McGraw-Hill, New York

    Google Scholar 

  39. Chi L, Zhu X (2017) Hashing techniques: a survey and taxonomy. ACM Comput Surv (CSUR) 50(1):1–36

    Article  Google Scholar 

  40. Mujahid U, Muhammad N, Shami MA (2015) RCIA: a new ultralightweight RFID authentication protocol using recursive hash. Int J Distrib Sens Netw 11(1):642180

    Article  Google Scholar 

  41. Mujahid U, Muhammad N, Sarwar S (2017) A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP. Wirel Pers Commun 94(3):725–744

    Article  Google Scholar 

  42. Aghili S, Mala H, Kaliyar P, Conti M (2019) SecLAP: secure and lightweight RFID authentication protocol for medical IoT. Future Gener Comput Syst 101:621–634

    Article  Google Scholar 

  43. Naveed AM, Chua KC, Sikdar B (2017) Physically secure mutual authentication for IoT. In: 2017 IEEE conference on dependable and secure computing. IEEE, New York, pp 310–317

  44. Varadharajan V (1989) Verification of network security protocols. Comput Secur 8(8):693–708

    Article  Google Scholar 

  45. Armando A, Alessandro DB et al (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification. Springer, Berlin, pp 281–285

  46. Molnar D, Wagner D (2004) Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM conference on computer and communications security. ACM, New York, pp 210–219

  47. Bassil R, El-Beaino W, Itani W, Kayssi A, Chehab A (2012) PUMAP: a PUF-based ultralightweight mutual-authentication RFID protocol. Int J RFID Secur Cryptogr 1(1/2):58–66

    Google Scholar 

  48. Kardas S, Celik S, Yildiz M, Levi A (2012) PUF-enhanced offline RFID security and privacy. J Netw Comput Appl 35(6):2059–2067

    Article  Google Scholar 

  49. Dehkordi MH, Farzaneh Y (2014) Improvement of the hash-based RFID mutual authentication protocol. Wirel Pers Commun 75(1):219–232

    Article  Google Scholar 

  50. Akgn M, Alayan MU (2015) Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Netw 32:32–42

    Article  Google Scholar 

  51. Asadpour M, Dashti MT (2015) Scalable, privacy preserving radio frequency identification protocol for the internet of things. Concurr Comput Pract Exp 27(8):1932–1950

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by Royal Bank of Canada, Mitacs Elevate Program and University of Toronto.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonam Devgan Kaul.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaul, S.D., Hatzinakos, D. Intelligent RFID biometric enabled dual security lock in the banking environment. J BANK FINANC TECHNOL 4, 159–173 (2020). https://doi.org/10.1007/s42786-020-00022-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42786-020-00022-1

Keywords

Navigation