Article Preview
Top1. Introduction
With the expeditious growth in smart cards and payment technology in today’s time, human life has become much easier and smart driven. Smart cards are the small plastic cards with chip embedded to them along with CPU, RAM and ROM for processing and storage (Rankl & Effing, 2004). According to a report, the smart card market will grow at 8.7% Compound Annual Growth Rate (CAGR) by 2023 (Report Buyer, 2018). There are many entities involved in smartcards, such as card holder, terminal, data owner, card manufacturer, card issuer and software manufacturer (Schneier & Shostack, 1999). Smart cards have been used to identify users and can also be used for logical and physical access as they are the cost effective multi-function cards (Taherdoost et al., 2011). With the ease provided by smart cards, they are now broadly used from secure payment applications like credit and debit cards, public transport system (Markantonakis et al., 2008) to user identification and authentication applications like smart health cards (Aubert & Hamel, 2001; Hsu et al., 2011), employee cards (Chen, 2016), membership cards (Conlon & Whitacre, 2005), IoT (Vanderhoof, 2017; Gupta & Quamara, 2018); mobile based applications as Subscriber Identity Module(SIM) card for making paid television connections, purchasing goods, etc. For the smart card-based applications, to control the access dynamic security policies were proposed (Gupta & Quamara, 2018b).
Smart cards are frequently used in applications that require strong authentication and security protection in comparison to other machine-readable data storage techniques like bar- code and magnetic-stripe. The self-containment property makes them impervious to attack as they don’t rely upon the potentially vulnerable external resources. Smart card offers vital system safety modules that are needed for nearly any form of network information exchange (Smart Card Basics, 2018). Smart cards protect against security threats from negligent storage of user password to sophisticated system hacks. There have also been some suggested schemes that use user biometrics such as face recognition (Parmar & Mehta, 2014), iris matching (Nedjah et al., 2017), fingerprint matching (Nedjah et al., 2017b) for user data security. The main driving factor in the success of smart card is its ability to perform security sensitive operations and maintain the integrity of the data stored in the card. For example, the cost to control password reset in an organization is very high, but in such an environment smart cards are a cost-effective solution. However, in terms of storage and computing capacity, their resources are obligatory. Also, for power supply and clock mechanism card depend on the card readers (Moore et al., 2002). With the increase in the number of its application, several opportunities have been generated for the attackers to extricate the secret information (Messerges et al., 2002).