Payment Security Expert: Analyzing Smart Cards and Contactless Payments with Cryptographic Techniques

被引:1
作者
Yuvarani, R. [1 ]
Mahaveerakannan, R. [1 ]
机构
[1] Saveetha Univ, Saveetha Inst Med & Tech Sci, Saveetha Sch Engn, Dept Comp Sci & Engn, Chennai 602105, Tamil Nadu, India
来源
2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024 | 2024年
关键词
ISO; electrical potential; RFID; NFC; EMV; contactless payments; multiple targets; security; read smart cards; cryptography; smartcards;
D O I
10.1109/ICSCSS60660.2024.10625350
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart cards offer enhanced security and authentication features, making them suitable for contactless payments compared to traditional methods like barcodes or magnetic stripes. Smart cards are employed in scenarios requiring heightened authentication and security, leveraging features such as passwords, cryptographic keys for encryption and decryption, and personal identification through biometric data like fingerprint or iris scans. They also facilitate digital currency transactions, where electronic cash is debited instantly, necessitating real money payment by the cardholder to complete the transaction. The success of smart cards depends on the security, transferability, and ability to maintain data integrity. However, ensuring the security of contactless payment systems presents challenges, including personal threats and various potential attacks that the system must defend against. This article aims to explore the security aspects of contactless payment systems, examining the importance of trust, security measures, and underlying technologies governing transaction processes in contactless payment cards and NFC-enabled mobile wallets. Additionally, it delves into the EMV and ISO standards for contactless payment, highlighting their limitations in bolstering the security and privacy of such transactions. These limitations can be exploited by adversaries to compromise the integrity of transactions, emphasizing the need for robust security measures
引用
收藏
页码:511 / 516
页数:6
相关论文
共 18 条
[1]  
Ahmad Z, 2016, INT CONF INFORM COMM, P240, DOI [10.1109/ICT4M.2016.056, 10.1109/ICT4M.2016.51]
[2]  
AL-Tamimi S., 2024, International Journal of Intelligent Systems and Applications in Engineering, V12, P103
[3]   A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures [J].
Gupta, Brij B. ;
Narayan, Shaifali .
JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2020, 28 (04) :135-159
[4]   Enhanced-AES encryption mechanism with S-box splitting for wireless sensor networks [J].
Gupta M. ;
Sinha A. .
International Journal of Information Technology, 2021, 13 (3) :933-941
[5]  
Jawed M., 2023, International Journal of Information Technology
[6]  
Kundarap A., 2010, Communications in Computer and Information Science, V89
[7]  
Kyung Kim H., 2016, INDIAN J SCI TECHNOL, V9, P1, DOI [10.17485/ijst/2016/v9i48/100891, DOI 10.17485/ijst/2016/v9i48/100891]
[8]  
Lacmanovic I., 2010, 2010 33rd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), P1114
[9]   Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for mobile devices [J].
Mullai A. ;
Mani K. .
International Journal of Information Technology, 2021, 13 (2) :551-564
[10]  
Parikh S., 2017, International Journal of Engineering Research & Technology (IJERT) ICIATE, V5, P1