Efficient Mobile Payment System Using a near Field Communication (NFC)

Article Preview

Abstract:

Today, users can access in the network environments anywhere and anytime through a mobile devices. These environments also can be able to perform mobile payment through these devices anytime and anywhere. Especially, in case of a recently being spotlighted NFC can operate high-strength crypto algorithms unlike the existing RFID. And also, this supports the technology as ‘Tag to Device’, ‘Device to Device’. Recently, various studies are being actively researched about the mobile payment system through these NFC devices. In case of existing papers are performed payment steps using most of a Public Key(PKI) or Symmetric-Key based heavy crypto algorithms, therefore, can be slow than how to use a hash-function and XOR. And also, environment construction of tracing, storing and managing about payment information is not strong. In this paper, to solve these problems, we were able to improve on performing time by lightweight authentication method using a hash function and XOR algorithms. And also, we designed that data about the payment information safe can be stored into the USIM File System. Thus, because of this method, we propose a scheme that can be traced about the deny payment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2785-2791

Citation:

Online since:

December 2012

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H.C. Cheng, W.W. Liao, T.Y. Chi and S.Y. Wei:A Secure and Practical Key Management Mechanism for NFC Read-Write Mode (ICACT 2011)

Google Scholar

[2] D.M. Monteiro, J.J.P.C. Rodrigues and J. Lloret: A Secure NFC Application for Credit Transfer Among Mobile Phones (CITS 2012).

DOI: 10.1109/cits.2012.6220369

Google Scholar

[3] M.Hutter and R.Toegl: A Trusted Platform Module for Near Field Communication (ICSNC France 2010).

DOI: 10.1109/icsnc.2010.27

Google Scholar

[4] F.Michahelles, F.Thiesse, A.Schmidt and J.R Williams: Pervasive RFID and Near Field Communication Technology, IEEE Pervasive Computing, Vol.6, No.3 (2007).

DOI: 10.1109/mprv.2007.64

Google Scholar

[5] C.Mulliner: Vulnerability Analysis and Attacks on NFC Enable Mobile Phones (International Conference on Availability, Reliability and Security, Japan, 2009).

DOI: 10.1109/ares.2009.46

Google Scholar

[6] E.H. Kuspriyanto, N.Basjaruddin, T. Purboyo, S. Purwantoro and H. Ubaya: Efficient Tag-to-Tag Near Filed Communication(NFC) Protocol for Secure Mobile Payment(ICICI-BME 2011)

DOI: 10.1109/icici-bme.2011.6108602

Google Scholar

[7] L. Xi and H.H. Ping: Efficient Protocol of Secure Mobile Payment, Journal of Communication and Computer, Vol.4, No.5 (2007).

Google Scholar

[8] T.S. Fun, L.Y. Beng, R. Roslan and H.S Habeeb: Privacy in New Mobile Payment Protocol, World Academy of Science, Engineering and Technology, (2008).

Google Scholar

[9] J. Vincent, V. limi, Aude, Plateaux, C. Gaber and M. Pasquet: A Mobile Payment Evaluation Based on a Digital Identity Representation(CTS 2012)

DOI: 10.1109/cts.2012.6261085

Google Scholar