Global Smart Card ID Using RFID: Realization of Worldwide Human Mobility for Universal Validation

  • Praveen Kumar SinghEmail author
  • Karan Dhawan
  • Neeraj Kumar
  • Bineet Kumar Gupta
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 597)


Today, human still carry number of cards to authenticate their identities across the globe. Smart cards possess potential to substitute all other existing IDs by smart card IDs at national and global level. Contemporary issues of terrorism and illegal migrants across many international borders too support the cause of seeking a viable solution. This paper has examined the evolution and necessity of human identification along with current worldwide scenario of existing national IDs. Integration of biometrics with smart card technology presents a strong authentication tool to the identity card holder. This paper offers an insight into the feasibility and technological aspects of this potential application. A recent trend of using radio-frequency identification (RFID) and biometric technologies for personal identification in e-passports and other applications too paves the way to explore a global identity solution [1]. However, apart from the technological challenges, there are policy and legal constraints imposed by various governments across the globe which acts as a barrier and has been briefly touched upon in this paper. In order to accommodate the massive global IDs, an IPv6-based numbering scheme has been proposed for identity registration and data access of every human across the globe in this research paper. The state-of-art technologies and IoT with its widespread usage facilitates this proposal of integrated global ID solution incorporating smart card with RFID and biometric technologies against a multipurpose universal ID framework [2]. This study has also highlighted the future promises and the major research impact of the proposed application.


Smart card RFID Biometrics IPv6 IoT E-ID Radio frequency LF HF UHF Database Cloud computing DNA ISO Standardization 



We would like to acknowledge the priceless suggestions offered by Prof. (Dr.) Mukul Misra, Director (Research & Consultancy) of Shri Ramswaroop Memorial University, Lucknow, India. We are also grateful to Col A. K. Singh, Ph.D., Vice Chancellor, Shri Ramswaroop Memorial University, Lucknow, India for his precious assistance in finalizing this paper. We record our earnest gratitude to Col V. K. Tiwari, Ph.D., Dr. Yashwant Singh, HoD, Faculty of Computer Science, Jammu University, India and Dr. Pradeep Kumar Singh, JP University of IT, India for their valuable propositions in this research study.


  1. 1.
    Vowe, S., Waldmann, U., Poller, A., Türpe, S.: Electronic identity cards for user authentication promise and practice. IEEE Secur. Priv. 10(1), 48–53 (2012 Jan/Feb) Google Scholar
  2. 2.
    Lingeswaran, K., Arul Das, S.V.: GPS based automated public transport fare collection systems based on distance travelled by passenger using smart card. Int. J. Sci. Eng. Res. (IJSER) 2(3) (2014) Google Scholar
  3. 3.
    Singh, P.K., Kumar, N., Gupta, B.: Evolution of a framework for multipurpose ID: opportunities and challenges. Int. J. Adv. Stud. Comput. Sci. Eng. (IJASCSE) 6(10), 1–7 (2017)Google Scholar
  4. 4.
    Weinstein, R.: RFID: a technical overview and its application to the enterprise. IT Prof. 7(3), 25–30 (2005)Google Scholar
  5. 5.
    Markantonakis, K., Mayes, K.: An introduction to smart cards and RFIDs in secure smart embedded devices platforms and applications, pp. 4–22, Springer Science (2014)Google Scholar
  6. 6.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. (51), 541–552 (2002)Google Scholar
  7. 7.
    Turjman, F., Alturjman, S.: Confidential smart-sensing framework in the IoT era. J. Super Comput. (2018) (Springer)
  8. 8.
    Zhang, S., Liu, X., Wang, J., Cao, J.: Tag size profiling in multiple reader RFID systems. In: Proceedings IEEE Conference of Computers and Communication, pp. 1–9 (May 2017)Google Scholar
  9. 9.
    Chu, J.: Applications of RFID technology [Book/Software Reviews]. IEEE Microw. Mag. 16(6), 63–64 (2015)Google Scholar
  10. 10.
    Imani, M., Qiyasi Moghadam, A., Zarif, N., Arabnia, H.R.: A comprehensive survey on addressing methods in the internet of things (2018) (Unpublished)Google Scholar
  11. 11.
    Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. Inf. Secur. IET 5(3), 145–151 (2013) (IET)Google Scholar
  12. 12.
    Alabady, S.A., Al-Turjman, F., Din, S.: A novel security model for cooperative virtual networks in the IoT era. Int. J. Parallel Prog. (2018) (Springer)
  13. 13.
    Li, K., Qi, G.J., Ye, J., Hua, K.A.: Linear subspace ranking hashing for cross-modal retrieval. IEEE Trans. Pattern Anal. Mach. Intell. 39(9), 1825–1838 (2017)Google Scholar
  14. 14.
    Singh, P.K., Kumar, N, Gupta, B.: Smart card ID: an evolving and viable technology. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 9(3), 115–124 (2018)Google Scholar
  15. 15.
    Taherdoost, H.: Appraising the smart card technology adoption; case of application in university environment. Science Direct, Research and Development Department, pp. 104–105, Ahora Ltd Management Consultation Group, Kuala Lumpur, Malaysia (May 2017)Google Scholar
  16. 16.
    Beaver, M.: RFID technology in university ID cards, and The implications of RFID technology in university ID cards, S&T’s Peer to Peer: Undergraduate Res. J. 1(1) (2016) (Published by Scholars’ Mine)Google Scholar
  17. 17.
    Reynolds, F., Nath, B., Want, R.: RFID technology and applications. IEEE CS and IEEE Comput. Soc. 5(1), 20–22 (2006)Google Scholar
  18. 18.
    Sandhu, P., Kaur, M., Mohan, N., Sandhu, M.: RFID technology principles advantages limitations & its applications. Int. J. Comput. Electr. Eng. 3(1), 1771–1836 (2011)Google Scholar
  19. 19.
    Liu, X.: Multi-category RFID estimation. IEEE/ACM Trans. 25(1), 264–277 (2017) Google Scholar
  20. 20.
    Liu, X.: Multi-category RFID estimation. IEEE/ACM Trans. Netw. 25(1), 264–277 (2017)Google Scholar
  21. 21.
    Landaluce, H., Perallos, A., Onieva, E., Arjona, L., Bengtsson, L.: An energy and identification time decreasing procedure for memory less RFID tag anti collision protocols. IEEE Trans. Wirel. Commun. 15(6), 4234–4247 (2016)Google Scholar
  22. 22.
    Al-Kassab, J., Rumsch, W.-C.: Challenges for RFID cross-industry standardization in the light of diverging industry requirements. IEEE Syst. J. 2(2) (2008)Google Scholar
  23. 23.
    Zhang, S., Liu, X., Wang, J., Cao, J.: Tag size profiling in multiple reader RFID systems. In: IEEE Conference Computer Communication, pp. 1–9 (May 2017)Google Scholar
  24. 24.
    Jain, A.K., Ross, A.: Bridging the gap: from biometrics to forensics, Philos. Trans. R. Soc. B 370(1674), 1–10 (2015)Google Scholar
  25. 25.
    Bella, G., Bistarelli, S., Martinelli, F.: Biometrics to enhance smartcard security. Lecture Notes in Computer Science, vol. 3364 (2005)Google Scholar
  26. 26.
    Das, A. K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. Inf. Secur. 5(3), 147–150 (2013) (IET)Google Scholar
  27. 27.
    Labati, D.R., Genovese, A., Munoz, E.: Biometric recognition in automated border control: a survey. ACM Comput. Surv. 49(2), A1–A39 (2016)Google Scholar
  28. 28.
    Lai, Y.L.: Cancellable iris template generation based on indexing-first-one hashing. Pattern Recogn. (64), 105–117 (2017)Google Scholar
  29. 29.
    Ramanathan, U.: Considering social implications of biometric registration: a database intended for every citizen in India. IEEE Technol. Soc. Mag. 34(1), 10–16 (2015)Google Scholar
  30. 30.
    Lo, N.W., Tsai, J.L., Wu, T.C.: Novel anonymous authentication scheme using smart cards. IEEE Trans. Ind. Inf. 9(4), 2006–2011 (2013)Google Scholar
  31. 31.
    Arjona, L., Landaluce, H., Perallos, A., Onieva, E.: Scalable RFID tag estimator with enhanced accuracy and low estimation time. IEEE Signal Process 24(7), 982–986 (2017)Google Scholar
  32. 32.
    Daisy Premila Bai, T., Albert Rabara, S., Vimal Jerald, A.: An adaptable secure smart card architecture for internet of things and cloud computing. IJRET (5), 163–169 (2016)Google Scholar
  33. 33.
    Duan, L., Zhang, X., Wang, Z.J., Duan, F.: A feasible segment by ALOHA algorithm for RFID systems. Wirel. Pers. Commun. 96(2), 2633–2649 (2017)Google Scholar
  34. 34.
    Ross, A.A., Nanda Kumar, K., Jain, A.K.: Handbook of Multi Biometrics. Springer (2006)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Praveen Kumar Singh
    • 1
    Email author
  • Karan Dhawan
    • 2
  • Neeraj Kumar
    • 3
  • Bineet Kumar Gupta
    • 1
  1. 1.Department of Computer ApplicationShri Ramswaroop Memorial UniversityBarabankiIndia
  2. 2.Faculty of Electronics EngineeringIndian Institute of TechnologyNew DelhiIndia
  3. 3.Department of CS & ITBabasaheb Bhimrao Ambedkar University (a Central University) Satellite Campus, TeekarmafilAmethiIndia

Personalised recommendations