A secure end-to-end proximity NFC-based mobile payment protocol

被引:17
作者
Bojjagani, Sriramulu [1 ,2 ,3 ]
Sastry, V. N. [2 ]
机构
[1] Madanapalle Inst Technol & Sci, Madanapalle, Andhra Pradesh, India
[2] Inst Dev & Res Banking Technol, CMB, Castle Hills,Rd 1, Hyderabad, Telangana, India
[3] Univ Hyderabad, SCIS, Hyderabad, India
关键词
Proximity; NFC; ECC; BAN; AVISPA; Peer-to-peer (P2P); AUTHENTICATION;
D O I
10.1016/j.csi.2019.04.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Near Field Communication (NFC) is one of the fast-growing technologies related to proximity-based mobile payments. In this paper, a secure NFC-enabled payment model that can be used for peer-to-peer (P2P) payments and payer-to-merchant (P2M) payments is presented. This payment model uses elliptic curve cryptography (ECC) to encrypt customer data. The proposed protocol provides end-to-end secure communication between customer and merchant through the bank using a reader and writer application. In our proposed model, the primary objective is that the users enter the customer PIN and the amount in their own NFC devices and it is the responsibility of the acquiring bank to rechecked and validated the amount of the transaction on the merchant's device. The proposed model is convenient to use as the customers simply need to enter information on their NFC phones and tap it onto the merchant's NFC device. Further, the proposed approach is verified for its security features and validated for its correctness using formal methods of the theoretically proving by Burrows-Abadi-Needham (BAN) logic, and simulation by using automated validation of Internet security protocols (AVISPA), Scyther and Tamarin. Moreover, the proposed protocol provides more security attributes and incurs fewer communication costs and low computational overhead compared to existing NFC payment protocols used for real-world applications.
引用
收藏
页数:21
相关论文
共 43 条
[1]  
A. Team, 2006, AV V1 0 US MAN
[2]  
Ahamad Shaik Shakeel, 2016, International Journal of Internet Technology and Secured Transactions, V6, P103
[3]  
Al-Tamimi Mayada, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P827, DOI 10.1109/ICITECH.2017.8079954
[4]  
[Anonymous], 2012, J COMMUN SOFTW SYS, DOI DOI 10.24138/JCOMSS.V8I4.166
[5]  
[Anonymous], 2012, IEEE CITS 2012 2012, DOI DOI 10.1109/CITS.2012.6220369
[6]  
[Anonymous], 2011, EMV BOOKS INT CIRC C
[7]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[8]   The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application [J].
Au, Yoris A. ;
Kauffman, Robert J. .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2008, 7 (02) :141-164
[9]   A lightweight security protocol for NFC-based mobile payments [J].
Badra, Mohamad ;
Badra, Rouba Borghol .
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 :705-711
[10]  
Balan RK, 2009, MOBISYS'09: PROCEEDINGS OF THE 7TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P291