[go: up one dir, main page]

Anggoro et al., 2019 - Google Patents

Secure smartphone-based NFC payment to prevent man-in-the-middle attack

Anggoro et al., 2019

Document ID
3003172437054328916
Author
Anggoro O
Dzulfikar M
Purwandari B
Mishbah M
Publication year
Publication venue
2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)

External Links

Snippet

Smartphone-based Near-Field Communication (NFC) is considered as a convenient method of payment as there is no additional authentication from the user. However, security threats like man-in-the-middle attack and eavesdropping are inevitable for this payment method …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal

Similar Documents

Publication Publication Date Title
JP6531092B2 (en) How to secure wireless communication between a mobile application and a gateway
Badra et al. A lightweight security protocol for NFC-based mobile payments
JP6701431B2 (en) Establishing a secure channel
USH2270H1 (en) Open protocol for authentication and key establishment with privacy
CN1689297B (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
CA3114753A1 (en) Systems and methods for cryptographic authentication of contactless cards
Thammarat et al. A lightweight and secure NFC‐base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification
Ray et al. Secure multi-purpose mobile-banking using elliptic curve cryptography
Al-Haj et al. Providing security for NFC-based payment systems using a management authentication server
Agarwal et al. Security issues in mobile payment systems
US12547686B2 (en) Mobile device secret protection system and method
Yuvarani et al. Payment Security Expert: Analyzing Smart Cards and Contactless Payments with Cryptographic Techniques
Kisore et al. A secure SMS protocol for implementing digital cash system
Anggoro et al. Secure smartphone-based NFC payment to prevent man-in-the-middle attack
CN104320261A (en) Method for achieving identity authentication through financial smart card, financial smart card and terminal
Kavya et al. Vulnerability analysis and security system for NFC-enabled mobile phones
Feng et al. An authentication protocol for lightweight NFC mobile sensors payment
Salim et al. Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema
Şengel et al. A survey on white box cryptography model for mobile payment systems
Dizaj et al. New mobile payment protocol: Mobile pay center protocol (MPCP)
Harnaningrum et al. Mobile payment transaction model with robust security in the NFC-HCE ecosystem with secure elements on smartphones
Me Security overview for m-payed virtual ticketing
Bajpai Impact of M-Commerce in Mobile Transaction’s Security
Vizzarri et al. Security in mobile payments
Ammayappan TSM centric privacy preserving NFC mobile payment framework with formal verification