Survey On Automated Fare Collection And Document Verification |
||
|
|
|
© 2021 by IJCTT Journal | ||
Volume-69 Issue-4 |
||
Year of Publication : 2021 | ||
Authors : Bhuvaneswari S, Rishi S, Prathip Kumar K, Vishnu Raj K | ||
DOI : 10.14445/22312803/IJCTT-V69I4P111 |
How to Cite?
Bhuvaneswari S, Rishi S, Prathip Kumar K, Vishnu Raj K, "Survey On Automated Fare Collection And Document Verification," International Journal of Computer Trends and Technology, vol. 69, no. 4, pp. 63-65, 2021. Crossref, https://doi.org/10.14445/22312803/IJCTT-V69I4P111
Abstract
Near Field Communication (NFC) is an upcoming technology which offers a wide range of services, from access keys for offices and houses to payment and trusted applications.NFC devices have become the need of the hour for the data transmission that takes place within shorter ranges i.e. the distance of 4cm. It involves the usage of the Internet for the payment transmission to occur. Security is the important parameter to consider when the internet is involved because there is a high percentage of risk during money transfer and data breach can take place if no proper security mechanisms are implied. Hence the NFC devices should be employed with proper security protocols. This paper discusses various NFC applications and their security protocols.
Keywords
Survey, Fare Collection
Reference
[1] Fan Dang, Ennan Zhai, Zhenhua Li, Pengfei Zhou, Aziz Mohaisen, Kaigui Bian, Qingfu Wen, Mo Li,’Pricing Data Tampering in Automated Fare Collection with NFC-equipped Smartphones’, IEEE Transaction on Mobile Computing,IEEE, Vol.No:18 ,2019.
[2] Akshay Uttama Nambi S.N.,Prabhakar T.V ,.Jamadagni H.S. ,Kishan Ganapathi, Pramod B.K., Rakesh C.M., Sanjay Naik R. ,’Near Field Communication – Applications and Performance Studies, International Conference on Information Processing,SpringerLink,Vol.No:292,2018.
[3] Nahar Sunny Suresh Shobha, Kajarekar Sunit Pravin Aruna, Manjrekar Devesh Parag Bhagyashree, Kotian Siddhanth Jagdish Sarita ,’NFC and NFC payments: A review’,International Conference on ICT in Business Industry & Government (ICTBIG),pp.no:2-8,2016.
[4] Walter Austin Hufstetler; Maria Jose Hito Ramos; Shuangbao Wang, ‘NFC Unlock: Secure Two-Factor Computer Authentication Using NFC’, IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS),pp.no:507- 510,2017.
[5] Vedat Coskun; Busra Ozdenizci; Kerem Ok; Mohammed Alsadi, ‘ NFC loyal system on the cloud’,7th International Conference on Application of Information and Communication Technologies,pp.no:21-25,2014.
[6] Anusha Mandalapu,Daffney Deepa V,Anish Dev J,Laxman Deepak Raj, ’An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies,International Conference and Workshop on Computing and Communication (IEMCON),pp.no:29-34,2015.
[7] Romeo L. Jorda; Joshua Renz A. Coballes; Lejan Alfred C. Enriquez; Mark Lester S. Millan; Angelo J. Mora,Melbert Neil G. Teodoro,Nilo M. Arago,August C. Thio-ac,Lean Karlo S. Tolentino,’Comparative Evaluation of NFC Tags for the NFCControlled Door Lock with Automated Circuit Breaker’,IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM),pp.no:260-265,2018.
[8] Jonghyun Baek; Heung Youl Youm,’Secure and Lightweight Authentication Protocol for NFC Tag Based Services’,10th Asia Joint Conference on Information Security,pp.no:63-68,2015.
[9] Nurbek Saparkhojayev, Aigul Dauitbayeva, Gulnaz Baimenshina, Aybek Nurtayev, ‘NFC-enabled Access Control and Management System’,International Conference on Web and Open Access to Learning, pp.no: 208-212,2014.
[10] Maali Alabdulhafith, Raghav V. Sampangi, Srinivas Sampalli, ‘NFC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection’, 5th International Workshop on Near Field Communication (NFC), pp.no:512-518,2013