Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification

被引:9
作者
Ahamad, Shaik Shakeel [1 ]
Pathan, Al-Sakib Khan [2 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Al Majmaah, Saudi Arabia
[2] Southeast Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
关键词
Mobile contactless payment (MCP); Near-field communication (NFC); Traceable anonymous certificate (TAC); Grid of secure elements (GSE); Burrows-Abadi-Needham (BAN) logic; Scyther; PAYMENT; AUTHENTICATION; PROTOCOL;
D O I
10.1186/s40294-019-0064-z
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile contactless payment (MCP) is the future technology that is used for mobile payments, mobile wallet, transportation, and for mobile coupons. Existing solutions in this realm do not ensure end-to-end communication, information privacy, and the client's anonymity. In order to overcome these flaws, we propose a secure and privacy preserving mobile commerce (SPPMC) framework for near-field communication (NFC) based proximity payments. SPPMC framework achieves both communication and information privacy. It ensures the client's anonymity by making use of traceable anonymous certificates (TAC). Grid of secure elements (GSE) is used at the banking servers. The cost of computation and communication is very less. SPPMC ensures end-to-end security and withstands any type of known attack including multi-protocol attack. SPPMC is successfully verified using Burrows-Abadi-Needham (BAN) logic and Scyther tool. It ensures all the security properties.
引用
收藏
页数:18
相关论文
共 21 条
[1]   AUTHENTICATION AND DELEGATION WITH SMART-CARDS [J].
ABADI, M ;
BURROWS, M ;
KAUFMAN, C ;
LAMPSON, B .
SCIENCE OF COMPUTER PROGRAMMING, 1993, 21 (02) :93-113
[2]   Secure mobile payment framework based on UICC with formal verification [J].
Ahamad, Shaik Shakeel ;
Sastry, V. N. ;
Udgata, Siba K. .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) :355-370
[3]  
[Anonymous], 2009, 1188912009 ISOIEC
[4]  
[Anonymous], 2014, CISC VIS NETW IND GL
[5]  
[Anonymous], 5636 RFC IETF
[6]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]   Privacy-preserving e-payments using one-time payment details [J].
Ashrafi, Mafruz Zaman ;
Ng, See Kiong .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :321-328
[8]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[9]  
Cremers C. J. F., 2006, Scyther: Semantics and Verification of Security Protocols
[10]  
Cremers CJF, 2009, LECT NOTES COMPUT SC, V5458, P70