Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Prof. Balasaheb Jadhav , Ayush Lodha, Piyush Lodha, Shefali Lohakare , Dipak Limbhore , Leon Thomas, Mustafa Limdiyawala
DOI Link: https://doi.org/10.22214/ijraset.2023.54022
Certificate: View Certificate
As we all know that in this digitalizing world, everything is getting advanced by the use of technology in some or the other way. Smart ID card is a unique system in which all the necessary things such as payments, attendance, events and many more such things can be embedded in a single card by the use of necessary security and proper technology such as RFID Chips, NFC Tags, and IoT along with the provision for parental control in the same.
I. INTRODUCTION
Smart ID card is a system in which all the necessary things such as payments and Attendance can be embedded in one single unit which can make life much easier to operate these necessary tasks. In this paper we will aim to make this system easy and user-friendly for all the citizens. We abide to make this Smart ID card a viable solution for all the transactions and makeuse of its features.
The traditional identification methods have evolved with technological advancements, and Smart ID Cards are one of the latest innovations in this regard. A Smart ID Card is a modern identification card that is equipped with a microchip and uses cutting-edge technology to enable efficient transactions and provide numerous benefits to users. The smart card technology has revolutionized the identification process by offering a complete solution for secure and efficient transactions. It enables users to access a wide range of services and benefits, such as cashless transactions, easy access to public services, and improved security. This technology is being adopted by various industries, including banking, healthcare, and government services, as it offers a secure and convenient way of identification. In this article, we will explore the benefits of Smart ID Cards and how they are transforming the way we identify ourselves and conduct transactions.
As a group, we have developed smart ID cards which can not only be used for college purposes but also for companies. Our smart ID card system has a payments system along with the attendance but with the payments system included we decided to put a cashback option in the form of points which can be further converted into various form of rewards such as tickets to the in-campus events, discounts for various items and many more.
Our ID System will also be available in each and every user’smobile, wherein the users will be able to keep a track of all the in-campus events with the help of calendar and make payments for the same Our ID card makes it easy for everyone to not only to mark attendance but also saves the time which is lost in marking manual attendance.
II. EASE OF USE
This paper is detailed study about smart ID card which is meant for the ease of students for marking the attendance and making payments. Our ID card will contain RFID/NFC tag which will store all the data of students and thereby perform some necessaryoperations like attendance and payments by the use of this data.
In short, smart ID cards provide a comprehensive solution for secure identification and efficient transactions. Due to their ease of use and versatility, they are quickly becoming an integral part of our daily lives.
III. SMART CARD: AN OVERVIEW
Our smart card has the capability to store and run certain conduct similar as marking attendance and making payments in the simplified way. Our smart card is integrated with RFID chip that's used for wireless communication. This identification card is an extremely movable device that makes the stoner’s work lightly wear it every day. RFID chips used in our card have certain storehouse size for storing stoner data. RFID chips used on our card are necessary to make contactless payment.
The RFID anthology reads the RFID chip through the law written in the RFID chip. RFID chips can be classified into unresistant and active RFID chips passive RFID includes external power force and can only be amped when the anthology is present. Passive RFID compendiums can cover an area of over to 3 measures. It can store 128 bytes data and thus has a small size.
It has a veritably high continuity and expires for life. They are cheaper in comparison to any other RFID compendiums Active RFID- It contains an internal battery that ensures power to operate. They give signals in a wide range up to 100 measures. Since they're always under the voltage of their shelf continuance is limited to 5 times.
Smart ID cards use advanced technologies such as Near Field Communication (NFC) and Radio Frequency Identification (RFID) to enable contactless transactions and access control. It can also be used for biometric authentication such as fingerprint and facial recognition. In short, smart ID cards provide a secure, efficient and convenient way to store and transfer personal information. They are being used more and more in various industries and are changing the way you identify yourself and conduct transactions.
A structural view of the chip card is shown in Fig. 1 over. To cover the smart card chip from bending, it generally consists of several plastic cards on top of each other. The plastic subcaste on this RFID chip is also visible when we take it view of its internal structure. Colorful operations, communication protocols and manufacturing specifications are defined by the International Organization for Standardization (ISO).
The following ISO norms presently live for smart cards norms that have been.
By using this system, the user is equipped with many actions and features to choose from. To make it effective all data to be provided is to be stored in the system in a secure manner. Transactions made through these cards are carried out using RFID chips that serve as wireless communication medium between the user and the recipient. RFID chips also contain a built-in small amount memory that allows it to retain certain information until it is processed.
The above illustration shows the internal armature of the RFID chip. A power force is needed in order to give power to do the necessary operations. The RFID system is divided into two types as follows, Transmitter and Receiver.
Transmitter sends the information and the receiver receives the information and after entering does some operations. An EEPROM (electrically erasable programmable read-only memory) is needed to store a small quantum of data. A regulator is used to control and communicate the data inflow in an RFID chip.
IV. SECURITY CONCERNS IN SMART CARD
Our goal is to provide users with a unique ID by adding RFID technology. This also increases security when making payments.
Make sure you have a secure system in place with a PIN or password to prevent theft or fraud. So, if your RFID card is lostor stolen, no intruder/scammer will be able to transact your money without its Safety is our top priority. To build a secure system, the payment portal will be disabled for at least 12 hours inthe event of multiple logins or multiple transaction failure.
Our system is encrypted. This means that RFID readers are checked once a month to ensure or verify that no other externaldevices are attached or connected to the RFID reader to revealpersonal information.
For added security, a user's parent or guardian can set transaction limits to prevent overspending it uses machine learning algorithms to detect suspicious activity and fraud. Our primary motivation for security is to allow access only to appropriate authorities so as not to violate confidentiality protocols.
Security is required, but privacy, authentication, confidentiality, integrity, and availability remain the same. A secure and encrypted system requires a cryptographic model that encrypts data and increases the security of operation. A message is considered encrypted if the information has been transformed into other data and can only be accessed by decrypting it back to its original form. Encrypting certain information requires a key to both encrypt and decrypt the data.As such, data encryption is required for each secure platform. Various techniques can be used to encrypt a given amount of data, including Symmetric and Asymmetric Data Encryption Models.
Asymmetric method: This method is also known as: public- Key-Cryptography and the data is encrypted using cryptographic asymmetric keys.
Symmetric Method: in this method, a single symmetric keyis used to encrypt the data.
In summary, smart ID cards are exposed to various security issues such as data privacy, card duplication, unauthorized access, and malware attacks. To ensure the security of smart ID cards, appropriate security measures such as data encryption, biometrics and anti-malware should be implemented.
V. SMART CARD APPLICATIONS
The invention of smart cards changed everyone's life. Everyday these smart cards are important part of our lives. Such as Credit/Debit cards, hotel key cards, etc. The main reason for the popularity is their flexibility, security, and ease of use. Smart cards can store a large amount of data by the use of a small chip known as a microcontroller, they give a person their unique identity.
Smart cards have different applications in each area. Serves as an employee or student card for marking attendance. Hotel keys and event ID cards are one application in which they can be used effectively.
Nowadays, Smart cards are being used in every industry like Railways, governments, or metros name it and you have it. Here are some applications where smart cards are being used daily.
VI. FUTURE SCOPE OF RESEARCH WORK
The future of smart cards is certainly very bright. They are widely accepted in Asia, Europe and occupy such continents due to their safety and convenience. Various countries like Italy, Germany and many other countries around the world willintroduce a national E-Id card in the coming years. Smart cards are now used worldwide in many applications including Healthcare A smart health card will help store various patient information such as medical, biological records and many more. This makes it easy for doctors to recognize problems thatpatients have faced in the past.
The future scope of smart ID cards is vast, with potential applications and advancements that can improve security, convenience and sustainability. As technology evolves, so will smart ID cards and it will be exciting to see what advancements and innovations they bring.
VII. RESULT
Currently ID card is used only for identification, which is good, but we can further innovate it\'s use by including payment and attendance in it. By adding payment and cashback points optionin id card it will be convenient for the user to handle money and by adding option for marking attendance it will comply the userto carry their ID cards. The above study suggests that the use of this technology i.e., smart card can revolutionize the school and corporate world. Itwill help the user to pay their bills with smart ID wallet and alsohelp in marking his or her participation in the respective sector.In fact, the smart card is a \"one-size-fits-all\" option for users. Thus, Smart ID cards provide a complete solution for efficient transactions and user benefits. They have numerous applications in various industries including government services, healthcare, education, transportation and finance. Smart ID cards can provide enhanced security, better convenience and more accurate identification through the use of biometric data and advanced technology. While there may be security concerns, these can be overcome by proper implementation and management of the card system. The future scope of smart ID cards is also promising, with potential advancements such as increased security, IoT integration, contactless payments and blockchain integration. Overall, smart ID cards provide a convenient, secure, and efficient solution for identification and transaction purposes, and their potential benefits make them a valuable tool in a variety of industries.
[1] J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems, in Usenix Conference Proceedings, pp. 191--202, Mar. 1988. [2] Roger Needham and Michael Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 1978. [3] . D. de Waleffe and J. J. Quisquater. CORSAIR: A smart card for public key cryptosystems. In A. J. Menezes and S .A. Vanstone, eds, Advances in Cryptology -- Crypto \'90, vol. 537 of Lectures Notes in Computer Science, Springer- Verlag, pp. 502-513, 1991. [4] Subramaniam, Hema & Hasan, Marina & Widyarto, Setyawan. (2013). [5] R. Chandramauli and P. Lee, \"Infrastructure Standards for Smart ID Card Deployment,\" in IEEE Security & Privacy, Vol. [6] M. Mesbah, A.A. Alsger and L. Ferreira, \"Use of smart card fare data to estimate public transport origin– destination matrix\" Transp. Res. Rec. J. Transp. Res. Board 2015, vol. 2535, pp.89-94. [7] Ashok Kumar Das, Kee-Young Yoo, Alavalapati Goutham Reddy and Eun-Jun Yoon, ?Lightweight authentication with key-agreement protocol for mobile network environment using smart cards?, IET Information Security 2016, vol 10, Issue 5, pp.274-280.
Copyright © 2023 Prof. Balasaheb Jadhav , Ayush Lodha, Piyush Lodha, Shefali Lohakare , Dipak Limbhore , Leon Thomas, Mustafa Limdiyawala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET54022
Publish Date : 2023-06-13
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here