A new NFC mobile payment protocol using improved GSM based authentication

被引:2
作者
Tafti, Forough Sadat Mirkarimzade [1 ]
Mohammadi, Shahriar [1 ]
Babagoli, Mehdi [1 ]
机构
[1] KN Toosi Univ Technol, Dept Ind Engn, Informat Technol Engn Grp, Tehran, Iran
关键词
Near field communication; Mobile payment; GSM authentication; Asymmetric key cryptography; ANONYMITY;
D O I
10.1016/j.jisa.2021.102997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile payments have received a lot of attention because they are available at any time and place. One of the various payment methods is Near Field Communication (NFC) mobile payment. As a result of potential problems that may arise using mobile payments such as fraud and information theft, the security of mobile payment protocols is pivotal. One of the critical stages in mobile payment security is the mutual authentication between the user and the Mobile Network Operator (MNO). Global System for Mobile (GSM) proposed a protocol to mutual authentication using symmetric key cryptographic method. In this paper, we have introduced a new protocol for NFC mobile payment, which improves the GSM authentication protocol due to the existence of symmetric cryptographic security threats, and uses an asymmetric encryption method to mutual authentication. Also, this protocol reduces the number of required key-pairs for authentication. Furthermore, our proposed protocol, increases resistance to attacks such as replay attack, DOS, eavesdropping attacks, repudiation, man in the middle attack and de-synchronization. Because mobile devices have limited resources and processing power, our proposed protocol reduces the signalling overhead and processing load of the client-side as much as possible.
引用
收藏
页数:10
相关论文
共 23 条
[1]  
Abouhogail Reham Abdellatif, 2019, International Journal of Communication Networks and Information Security, V11, P283
[2]  
Abouhogail RA, 2019, DESIGN DEV ADV AUTHE
[3]  
Ammayappan K, 2015, 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), P1484
[4]   A secure end-to-end proximity NFC-based mobile payment protocol [J].
Bojjagani, Sriramulu ;
Sastry, V. N. .
COMPUTER STANDARDS & INTERFACES, 2019, 66
[5]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[6]   Elliptic Curve Cryptography in Practice [J].
Bos, Joppe W. ;
Halderman, J. Alex ;
Heninger, Nadia ;
Moore, Jonathan ;
Naehrig, Michael ;
Wustrow, Eric .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :157-175
[7]   A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service [J].
Chen, Xinyi ;
Choi, Kyung ;
Chae, Kijoon .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) :1-17
[8]   A Survey on Near Field Communication (NFC) Technology [J].
Coskun, Vedat ;
Ozdenizci, Busra ;
Ok, Kerem .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (03) :2259-2294
[9]  
El Madhoun N, 2016, IEEE TRUST BIG, P1889, DOI [10.1109/TrustCom.2016.0289, 10.1109/TrustCom.2016.287]
[10]   Secure Authentication Protocol for Mobile Payment [J].
Fan, Kai ;
Li, Hui ;
Jiang, Wei ;
Xiao, Chengsheng ;
Yang, Yintang .
TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) :610-620