DOI QR코드

DOI QR Code

Contactless Smart Card as a Cache for Geocaching

  • 투고 : 2021.07.05
  • 발행 : 2021.07.30

초록

In this paper, the possibility of using a contactless smart card as a cache for geocaching is analyzed. Geocaching is an outdoor game in which players search for hidden boxes, or caches based on geographical coordinates. The problems with this game are the possibility of players cheating and the need to maintain the caches. And then there is the problem of the ignorant public accidentally discovering a cache and considering it an explosive device. This paper proposes a concept for a possible solution to the above problems by replacing the boxes with conventional contactless smart cards. Also, this concept makes geocaching more attractive by using various games. This paper proposes a system architecture as well as the cryptographic protocol required for secure communication between the player's smartphone and the card.

키워드

참고문헌

  1. -: Geocaching. Wikimedia Foundation, San Francisco. https://en.wikipedia.org/wiki/Geocaching
  2. -: Geocaching.com. Groundspeak, Seattle. https://www.geocaching.com/play/search
  3. -: Traditional Caches. GeoWiki. https://bit.ly/3zV8DCa
  4. -: Mystery Caches. GeoWiki. https://bit.ly/3gVb7sX
  5. -: We Love Geocaching. Facebook, Palo Alto. https://bit.ly/2XmEUQP
  6. Savage, D.: Geocaching: the unintended results. BBC News. 5 July 2011. https://www.bbc.com/news/uk-england-leeds14039229
  7. -: Standard ISO/IEC 14443. Wikimedia Foundation, San Francisco. https://en.wikipedia.org/wiki/ISO/IEC_14443
  8. Navneeta D. aj.: How NFC Tag technology in contactless payment cards is delivering value-added benefits for consumers, retailers and issuers. Infineon Technologies, Neubiberg. https://bit.ly/3kfNRFq
  9. Rescorla E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. Internet Engineering Task Force, Fremont 2018. https://tools.ietf.org/html/rfc8446
  10. Dierks T., Rescorla E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246. Internet Engineering Task Force, Fremont 2008. https://tools.ietf.org/html/rfc5246
  11. Menezes A., Oorschot P., Vanstone S.: Handbook of Applied Cryptography. CRC Press. N. York 1996.