Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment
Sung-Wook Park,Im-Yeong Lee +1 more
Reads0
Chats0
TLDR
This paper proposes a mutual authentication scheme based on a lattice for conditional anonymity in NFC-PCM (Near Field Communication-Passive Communication Mode) payment services environments.Abstract:
In recent years, the incorporation of NFC (Near Field Communication) technology into mobile devices has led to changes in payment system environments. Currently, the NFC mobile payment service is leading the mobile payment market. In particular, most electronic payment services, such as those used by Google Inc. and Apple Inc., are adopting payment methods based on NFC to replace credit cards. In addition, related groups from the Republic of Korea have enhanced safety in communication by using standard techniques for activating NFC services. However, various security threats are still present in electronic payment methods that use NFC. In this paper, we propose a mutual authentication scheme based on a lattice for conditional anonymity in NFC-PCM (Near Field Communication-Passive Communication Mode) payment services environments.read more
Citations
More filters
Journal ArticleDOI
Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
Abebe Abeshu Diro,Haftu Tasew Reda,Naveen Chilamkurti,Abdun Naser Mahmood,Noor Zaman,Yunyoung Nam +5 more
TL;DR: The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes and incurs less overhead as compared to existing TLS-based security schemes.
Proceedings Article
The Strategic Decision on Mobile Payment: A Study on Merchants’ Adoption
TL;DR: This study extracted 172 mobile payment related papers from three reputable databases and identified the factors that impact merchants’ adoption.
Journal ArticleDOI
Qualitative Assessment on Effectiveness of Security Approaches towards Safeguarding NFC Devices & Services
Anusha R,Veena Devi Shastrimat +1 more
TL;DR: This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap in Near Field Communication.
Journal ArticleDOI
A review and analysis of secure and lightweight ECC-based RFID authentication protocol for Internet of Vehicles
TL;DR: In this paper, radio-frequency identification (RFID) technology has proliferated over the last few years and being deployed as identification technology in numerous domains like intelligent transport and intelligent transport.
Journal ArticleDOI
A Lattice-Based Group Authentication Scheme
TL;DR: Wang et al. as discussed by the authors proposed the first lattice-based group authentication scheme, which is secure against replay attacks and man-in-the-middle attacks, and compared with the existing latticebased authentication schemes, their scheme provides the most efficient method to agree upon a session key among a group of users after mutual authentication.
References
More filters
Proceedings ArticleDOI
Low-cost untraceable authentication protocols for RFID
TL;DR: This paper addresses the risk of tracking attacks in RFID networks by repairing three revised EC-RAC protocols and presenting the search protocol, a novel scheme which allows for privately querying a particular tag, and proof its security properties.
Proceedings ArticleDOI
Digital Signature Records for the NFC Data Exchange Format
Michael Roland,Josef Langer +1 more
TL;DR: This paper discusses the various aspects of digitally signing NDEF records, and introduces the readers to the NFC Data Exchange Format, its use cases and its potential security threats.
Journal ArticleDOI
Public key cryptography based privacy preserving multi-context RFID infrastructure
TL;DR: A novel radio frequency identification infrastructure enabling multi-purpose RFID tags realized by the use of privacy preserving public key cryptography (PKC) architecture is proposed, and numerical results indicate PKC based systems can outperform symmetric cipher based systems.
Proceedings ArticleDOI
Low-cost implementations of NTRU for pervasive security
TL;DR: This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes and is also the first one to present a complete N TRU design with encryption/decryption circuitry.
Book ChapterDOI
Hierarchical ECC-Based RFID authentication protocol
TL;DR: The concept of RFID groups is introduced and a hierarchical RFID authentication protocol is proposed, which offers impersonation resistance and is narrow-strong privacy-preserving.