Efficient Frontier Rules for Secure NFC Payments and Data Transmission

被引:0
作者
Shinde, Sandip [1 ]
Mane, Deepak [1 ]
Kanjalkar, Jyoti [1 ]
Jaybhaye, Sangita [1 ]
Phatangare, Sheetal [1 ]
Khilare, Kartik [1 ]
机构
[1] Vishwakarma Inst Technol, Pune 411037, Maharashtra, India
关键词
Cybersecurity; Network Security; NFC; POS; Secured NFC Payments; Synchronous Trust Number (STN); Contactless payments; SDR; CARD;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a result of advancements in technology areas including mobile communication, semiconductors, and 5G internet, things have changed very quickly.Near field communication [NFC] has gained popularity due simplicity in use and function. Given that the weaknesses in the current technique were discovered, this paper proposed a new protocol for more secure NFC payments and data transfer. And thus conducted a thorough analysis of NFC payments and discovered that the data carried over the air was weak and easily intercepted by using tools like as Pflipper zero, Hackrf-one, and RTL-SRD, and later could be decoded utilising cutting-edge computations and GNU. This suggested protocol entails local-level verification for the creation of a transmission channel between a card and a Point of Sale [POS] at the local-level, allowing a secured point-to-point connection between the two end points. In addition to the first step indicated, the channel will make sure that no data is being eavesdropped by an unauthorised devices or antenna. If so, both the channel and any data that was transmitted over it are immediately destroyed. This protocol would offer more security declarations and aid by making payments secured, safe, and morally correct.
引用
收藏
页码:46 / 57
页数:12
相关论文
共 17 条
[1]  
Abdulwahab Abdulrahman Khaled, 2021, 2021 International Conference on Data Analytics for Business and Industry (ICDABI), P615, DOI 10.1109/ICDABI53623.2021.9655849
[2]  
Abellon Aaron Paul, 2021, 2021 IEEE 8th International Conference on Industrial Engineering and Applications (ICIEA), P338, DOI 10.1109/ICIEA52957.2021.9436788
[3]  
Ahmad Z, 2016, INT CONF INFORM COMM, P240, DOI [10.1109/ICT4M.2016.056, 10.1109/ICT4M.2016.51]
[4]  
Al-Tamimi Mayada, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P827, DOI 10.1109/ICITECH.2017.8079954
[5]   A secure end-to-end proximity NFC-based mobile payment protocol [J].
Bojjagani, Sriramulu ;
Sastry, V. N. .
COMPUTER STANDARDS & INTERFACES, 2019, 66
[6]  
Chen SR, 2020, 2020 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION ENGINEERING (IEEE ICITE 2020), P240, DOI [10.1109/ICITE50838.2020.9231356, 10.1109/icite50838.2020.9231356]
[7]  
Dong Yang, 2011, 2011 International Conference on Multimedia Technology, P908
[8]  
Dudykevych Valeriy, 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), P651, DOI 10.1109/IDAACS.2013.6663005
[9]   For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC Payments [J].
El Madhoun, Nour ;
Bertin, Emmanuel ;
Pujolle, Guy .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :403-411
[10]  
Kanojia RR, 2018, 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA)