MSc Project Report: RFID & Mobile Fusion for ATM Transactions Analysis

Verified

Added on  2020/03/23

|10
|2275
|48
Report
AI Summary
This MSc project report explores the application of RFID and mobile fusion to enhance the security of ATM transactions. The report begins with an introduction to RFID technology, detailing its concept and components, including RFID tags, readers, and the overall system architecture. It then delves into a literature review, identifying the current trends and gaps in research, particularly concerning security vulnerabilities such as cloning, clandestine tracking, and data interception. The report examines how mobile devices can integrate with RFID systems to provide more secure and authenticated transactions, considering the encryption and certification processes. The report also discusses different layers of RFID systems and potential attacks, including physical, network/transport, and application layers. The report concludes with a discussion of the literature gap and provides a list of references and bibliography.
Document Page
Running head: MSC PROJECT
MSc Project
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1MSC PROJECT
Table of Content
Introduction......................................................................................................................................3
Concept of the technology-RFID.....................................................................................................3
Components of RFID system...........................................................................................................6
Literature Gap-.................................................................................................................................8
Reference list and Bibliography......................................................................................................9
Document Page
2MSC PROJECT
Contextual Review
Topic- RFID and mobile fusion for authenticated ATM transaction
Introduction
RIFD cards have brought a revolution in how the sector takes care of large sector deals
with a large number of products. It might have products in shopping mall, vehicles in an
assembly line of manufacturing unit of attendance. This small electronic device either is a small
electronic device actively or passively functions. As put forward by Deshmukh and Mohite
(2016), RIFD has emerged as the replacement to barcode that were used for making transaction.
It has been observed that technological invocation could provide solution to almost all diverse
problems. It is certain that money has become number in the digital field. It has been identified
that the introduction of utility cards, mobile banking as well as the intent banking has
revolutionized the way people deal with the money. The most of the previous work make
assumptions of the fact that the communication channels between an RFID reader and its
backbone server is secure and it does concentrate on the security improvement the RFID.
Likewise, many studies that have provided different facts and findings on this context; thus, to
conduct a critical analysis, almost 15 journals have been selected that are conducted in the same
topic.
Concept of the technology-RFID
It was found in a study conducted by Choi et al. (2011), mentioned that RFID remains as
the fundamental technology ubiquitous competing environment execution, together with USN.
Enriquez, Park and Hashimoto (2013) specified that presently, there is a new stream, which is
Document Page
3MSC PROJECT
known as the mobile RFID, which consists of a small binary code circuit within it, which
energize from 0 to 1 or the vice versa. With the help of the application, this card can be
manufactured with the capacity to preserve more data. The reader is device that emits EM waves
consistently and these waves when touches, the card start reflecting as well as carrying the data
back to the reader and this exists in the ATM centre. Hence, Miah and Gueaieb (2015)
commented that RFID technology is usually known as the bewitch innovation which carries the
ability to provide embedded information in a tag without any physical contact. On the contrary,
Srivatsa, Yashwanth and Parvathy (2010) mentioned that RFID is vulnerable to security breaches
like cloning and clandestine tracking could temper the information in the tag. Issues as well as
the solution proposal associated with the privacy and security of RFID are further discussed in
the paper.
In a study, Anand and FossoWamba (2013) proposed that mobile phone based RFID
architecture for secure electronic payments through RFID credit card that are based on the
difficulty of factorization. Nonetheless, there are many vulnerabilities that several vulnerabilities
that adversaries could exploit to send an attack. Furthermore, during the certification process in
the RFID device, the tag required to transmit a particular a fixed date like, ID and other relevant
details to the server-side for the identification. Nonetheless, Chu (2015) mentioned that the
adversaries might also be able to overhear and collect the information if the data is encrypted.
Going forward, two major concern of privacy with RFID tags helps in tracking and
inventorying. Clandestine tracking deals with the issue of closest RFID reader being able to scan
any RFID tags could respond to the reader without the discretion. Conversely, it is also observed
that clandestine inventorying remains as the method of collecting sensitive information from the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4MSC PROJECT
tags. Hence, due to the number of logic gates, the present tags are about 2000-100,00; and they
are constrained by the computing resource.
According to Deshmukh and Mohite (2016), due to the changes in the consumption habits, the
trending practices changed from conventional process to the entity store patterns. These have
dramatically transformed into the channels of online shopping pattern and most of the online
shopping is usually completed through the transaction through the credit card, Nevertheless, with
the help of conventional trading protocol, the number of credit card and the code could be faked
by the cardholders to perform all sort of transactions. For example, if the card is missing, the
system might not detect the implementation of the transaction. In the recent time, the use of
mobile devices has become very natural. This means these devices have the functionality to read
RIFD tags as well as they have higher computing performance. Nonetheless, at the time of
transaction process, they could take less time for the data encryption as well as the certification.
Hence, DiGiampaolo and Martinelli (2014) also commented that RIFD based smart stick
prototype has usually been developed to aid as well as guide the visually challenged people. In
other way, a study conducted by Ghodke et al. (2014), the enhanced is based on Radio
Frequency Identification which usually runs in Low Frequency Band.
Therefore, the envisioned device consists of a RFID and Low Frequency reader. Kitsos
(2016) proposed a more enhanced and a secure authentication protocol, which would help to
provide information to an authorized entity, which further implements the recognition
technology in an insecure communication channel; in fact, for the communication between the
database as well as the reader. Hence, Cicirelli, Milella and Di Paola (2012) also commented that
An Authentication Process Framework is also studied in the previous work, which remains as
Document Page
5MSC PROJECT
one of the significant ways to intervene an increasing concern of an unauthorized reader from
reaching the transponder, which could lead to the violation of information preserved in the tag.
Components of RFID system
It is identified that an RFID revolves around certain areas such as the RFID tag, which
conventionally contains the digital number related to the physical object, which is attached with
it. Furthermore, it is also studied in a research performed by Enriquez, Park and Hashimoto
(2013), RFID reader is concerned to a backend dataset and hence, the reader is equipped with the
antenna, a transceiver as well as a transceiver which helps to send the information or the radio
signal to query the tag as well as read the content. Miah and Gueaieb (2015) mentioned that
according to the energy resources as well as the computational abilities RFID tags are
differentiated into two categories- passive and active.
More specifically, the passive tags do not have any internal source of energy; thereby, it
has smaller size as well as the computational resource. Miah and Gueaieb (2014) investigated
that the highest reading distance of a tag could vary from a few centimeters to nearly ten meters.
A core requirement for previous system in general, is the capability to recognize the things and
the entities. It is also studied in the previous work that by meeting this requirement RFID
technology could bring in the advantage of user’s confidentiality under all circumstances.
Furthermore, due to the large development, the low cost tags have unfortunately been the subject
of many attacks increasing the serious concern. A study conducted by Chu (2015), classified the
threats and the possible attacks against the RFID system in four different layer. On the basis of
the classification, people summarize the possible attacks which can be launched against the
RFID system that are presented in the following.
Document Page
6MSC PROJECT
Physical layer- In this particular level, the adversary launches new attacks by gaining the
benefits of out of the sudden access to a tag as well as exploiting the loophole of RFID wireless
communication (Deshmukh and Mohite 2016). Such type of attacks may include thee physical
removal of the tag from the related products, description of the tag by the means of exposing to
the highest environmental condition. The attacks may also include the usage of electronic
jamming to prevent communication with the reader for a short period.
Network –Transport layer-In this stage or layer, the adversary launches attacks in a
manner RFID systems are communicating on the packets. Such type of attacks could include the
duplication of a valid tag, spoofing of tag as well as the imitation of a valid tag.
Application layer- In this particular layer, the unauthorized users usually focus on the
exchanged application data set. This sort of attack could include the modification of the
information contained in the tag’s storage , entering the contents of tag without being authorized
(Enriquez, Park and Hashimoto 2013). The anonymous users send the malicious code injection
to the writable memory of a tag to damage middleware application through the exploitation of
SQL injection.
As put forward by Deshmukh and Mohite (2016), RFID works at the different
frequencies each determining the range of its operation. This means the card could be of active
types, passive types and the battery associated with the passive. It is identified that this
classification is according to the type of energizing the card employs. Conversely, the reader is
classified on the basis of the source of energy including both AC and DC. Thus, for such
completion, the transmitter as well as the receiver circuit is utilized to resemble the operation of
the card and reader pair.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7MSC PROJECT
Literature Gap-
It has been identified that most of the studies have mainly focus on the structural design
and feature of RFID systems but studies have hardly discussed about the importance of RFID on
the real world context. Hardly, a study has discussed about how this technology will help to deal
with real transaction. Moreover, the studies lack the evidences about how the organizations or
the authorized owners have faced the attacks from the anonymous users. In addition to this, the
previous works have only discussed about the challenges associated with such RFID systems and
but it does not provide the positive facts of the same.
Document Page
8MSC PROJECT
Reference list and Bibliography
Anand, A. and FossoWamba, S., 2013. Business value of RFID-enabled healthcare
transformation projects. Business Process Management Journal, 19(1), pp.111-145.
Choi, B.S., Lee, J.W., Lee, J.J. and Park, K.T., 2011. A hierarchical algorithm for indoor mobile
robot localization using RFID sensor fusion. IEEE Transactions on Industrial Electronics, 58(6),
pp.2226-2235.
Chu, J., 2015. Applications of RFID Technology [Book\/Software Reviews]. IEEE Microwave
Magazine, 16(6), pp.64-65.
Cicirelli, G., Milella, A. and Di Paola, D., 2012. RFID tag localization by using adaptive neuro-
fuzzy inference for mobile robot applications. Industrial Robot: An International Journal, 39(4),
pp.340-348.
Deshmukh, N.S. and Mohite, J.N., 2016. RFID & Mobile Fusion for Authenticated ATM
Transaction. Imperial Journal of Interdisciplinary Research, 2(10).
Deshmukh, N.S. and Mohite, J.N., 2016. RFID & Mobile Fusion for Authenticated ATM
Transaction. Imperial Journal of Interdisciplinary Research, 2(10).
DiGiampaolo, E. and Martinelli, F., 2014. Mobile robot localization using the phase of passive
UHF RFID signals. IEEE Transactions on Industrial Electronics, 61(1), pp.365-376.
Enriquez, G., Park, S. and Hashimoto, S., 2013. Wireless sensor network and RFID fusion
approach for mobile robot navigation. ISRN Sensor Networks, 2013.
Document Page
9MSC PROJECT
Ghodke, S.S., Kolhe, H., Chaudhari, S., Deshpande, K. and Athavle, S., 2014. ATM transaction
security system using biometric palm print recognition and transaction confirmation
system. International Journal Of Engineering And Computer Science, 3(4), pp.5332-5335.
Kitsos, P. ed., 2016. Security in RFID and sensor networks. CRC Press.
Miah, M.S. and Gueaieb, W., 2015. RFID-based mobile robot trajectory tracking and point
stabilization through on-line neighboring optimal control. Journal of Intelligent & Robotic
Systems, 78(3-4), p.377.
Miah, M.S. and Gueaieb, W., 2014. Mobile robot trajectory tracking using noisy RSS
measurements: An RFID approach. ISA transactions, 53(2), pp.433-443.
Srivatsa, K., Yashwanth, M. and Parvathy, A., 2010. RFID & Mobile Fusion for Authenticated
ATM Transaction. International Journal of Computer Applications, 3(5).
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]