scispace - formally typeset
Open AccessJournal ArticleDOI

Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment

Reads0
Chats0
TLDR
This paper proposes a mutual authentication scheme based on a lattice for conditional anonymity in NFC-PCM (Near Field Communication-Passive Communication Mode) payment services environments.
Abstract
In recent years, the incorporation of NFC (Near Field Communication) technology into mobile devices has led to changes in payment system environments. Currently, the NFC mobile payment service is leading the mobile payment market. In particular, most electronic payment services, such as those used by Google Inc. and Apple Inc., are adopting payment methods based on NFC to replace credit cards. In addition, related groups from the Republic of Korea have enhanced safety in communication by using standard techniques for activating NFC services. However, various security threats are still present in electronic payment methods that use NFC. In this paper, we propose a mutual authentication scheme based on a lattice for conditional anonymity in NFC-PCM (Near Field Communication-Passive Communication Mode) payment services environments.

read more

Citations
More filters
Journal ArticleDOI

Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication

TL;DR: The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes and incurs less overhead as compared to existing TLS-based security schemes.
Proceedings Article

The Strategic Decision on Mobile Payment: A Study on Merchants’ Adoption

Yang Li
TL;DR: This study extracted 172 mobile payment related papers from three reputable databases and identified the factors that impact merchants’ adoption.
Journal ArticleDOI

Qualitative Assessment on Effectiveness of Security Approaches towards Safeguarding NFC Devices & Services

TL;DR: This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap in Near Field Communication.
Journal ArticleDOI

A review and analysis of secure and lightweight ECC-based RFID authentication protocol for Internet of Vehicles

TL;DR: In this paper, radio-frequency identification (RFID) technology has proliferated over the last few years and being deployed as identification technology in numerous domains like intelligent transport and intelligent transport.
Journal ArticleDOI

A Lattice-Based Group Authentication Scheme

TL;DR: Wang et al. as discussed by the authors proposed the first lattice-based group authentication scheme, which is secure against replay attacks and man-in-the-middle attacks, and compared with the existing latticebased authentication schemes, their scheme provides the most efficient method to agree upon a session key among a group of users after mutual authentication.
References
More filters
Proceedings ArticleDOI

Low-cost untraceable authentication protocols for RFID

TL;DR: This paper addresses the risk of tracking attacks in RFID networks by repairing three revised EC-RAC protocols and presenting the search protocol, a novel scheme which allows for privately querying a particular tag, and proof its security properties.
Proceedings ArticleDOI

Digital Signature Records for the NFC Data Exchange Format

TL;DR: This paper discusses the various aspects of digitally signing NDEF records, and introduces the readers to the NFC Data Exchange Format, its use cases and its potential security threats.
Journal ArticleDOI

Public key cryptography based privacy preserving multi-context RFID infrastructure

TL;DR: A novel radio frequency identification infrastructure enabling multi-purpose RFID tags realized by the use of privacy preserving public key cryptography (PKC) architecture is proposed, and numerical results indicate PKC based systems can outperform symmetric cipher based systems.
Proceedings ArticleDOI

Low-cost implementations of NTRU for pervasive security

TL;DR: This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes and is also the first one to present a complete N TRU design with encryption/decryption circuitry.
Book ChapterDOI

Hierarchical ECC-Based RFID authentication protocol

TL;DR: The concept of RFID groups is introduced and a hierarchical RFID authentication protocol is proposed, which offers impersonation resistance and is narrow-strong privacy-preserving.