Smart card security mechanism with dynamic key
Main Article Content
Abstract
As a currently popular technology, the use of smart cards continues to increase in various fields and the rapid development of technology. Therefore, data security stored on a smart card needs to focus on avoiding misuse of data by unauthorized parties. However, it is not enough for the security mechanism to be carried out only during the communication process of sending data. Then, the mechanism for securing data on the smart card also needs to be done. In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the smart card according to predetermined rules. Dynamic keys are a new mechanism proposed to authenticate smart cards using a different key on each card. This technique ensures that the keys used to access each smart card are different so that the risk of data duplication and modification threats can be minimized. In addition, this mechanism is a low-cost security privacy protection. The test results show that the data security technique using dynamic keys ensures that read and write access to the smart card can only be done if the keys match the rules.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
References
[2] H. Taherdoost, S. Sahibuddin, and N. Jalaliyoon, “Smart Card Security; Technology and Adoption,” Int. J. Secur., vol. 5, no. 2, pp. 74–84, 2011.
[3] D. S. K. Putra, M. A. Sadikin, and S. Windarta, “S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card,” in 2017 15th international conference on quality in research (QiR): international symposium on electrical and computer engineering, 2017, pp. 230–234.
[4] A. Y. Ananta et al., “Smart monitoring system for teaching and learning process at the university,” in IOP Conference Series: Materials Science and Engineering, 2020, vol. 732, no. 1.
[5] A. K. Das, A. K. Sutrala, V. Odelu, and A. Goswami, “A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks,” Wirel. Pers. Commun., vol. 94, no. 3, pp. 1899–1933, 2017.
[6] W. Yang et al., “Securing mobile healthcare data: A smart card based cancelable Finger-Vein Bio-Cryptosystem,” IEEE Access, vol. 6, pp. 36939–36947, 2018.
[7] M. Arnone, T. Delmastro, G. Giacosa, M. Paoletti, and P. Villata, “The Potential of E-ticketing for Public Transport Planning: The Piedmont Region Case Study,” Transp. Res. Procedia, vol. 18, pp. 3–10, 2016.
[8] I. M. Insan, P. Sukarno, and R. Yasirandi, “Multi-Factor Authentication Using a Smart Card and Fingerprint (Case Study: Parking Gate),” Indones. J. Comput., vol. 4, no. 2, pp. 55–66, 2019.
[9] K. Markantonakis, M. Tunstall, G. Hancke, I. Askoxylakis, and K. Mayes, “Attacking smart card systems: Theory and practice,” Inf. Secur. Tech. Rep., vol. 14, no. 2, pp. 46–56, 2009.
[10] A. Kundarap, A. Chhajlani, R. Singla, M. Sawant, M. Dere, and P. Mahalle, “Security for Contactless Smart Cards Using Cryptography,” in International Conference on Network Security and Applications, 2010, pp. 558–566.
[11] R. N. Akram, K. Markantonakis, and K. Mayes, “Pseudorandom number generation in smart cards: An implementation, performance and randomness analysis,” in 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), 2012.
[12] L. Malina, V. Benes, J. Hajny, and P. Dzurenda, “Efficient and secure access control system based on programmable smart cards,” in 2017 40th International Conference on Telecommunications and Signal Processing (TSP), 2017, pp. 32–36.
[13] NXP, “MIFARE Classic EV1 1K - Mainstream contactless smart card IC for fast and easy solution development.” pp. 1–36, 2018.
[14] A. M. Sison, B. T. Tanguilig, B. D. Gerardo, and Y. C. Byun, “Implementation of Improved DES Algorithm in Securing Smart Card Data,” in Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity, Berlin, Heidelberg: Springer, 2012, pp. 252–263.
[15] Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I. Setiawan, “Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC),” in Journal of Physics: Conference Series, 2018, vol. 954, no. 1.