A Secure Cloud-Based NFC Mobile Payment Protocol
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 10
Abstract
Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC transaction process make them partners in a way that sometimes they should share their access permissions on the applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compare to the use of a Secure Element (SE) as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO). In this circumstance, Mobile Network Operator plays the role of network carrier which is responsible for controlling all the credentials transferred to the end user. The proposed protocol eliminates the requirement of a shared secret between the Point-of-Sale (POS) and the Mobile Network Operator before execution of the protocol, a mandatory requirement in the earlier version of this protocol [16]. This makes it more practicable and user friendly. At the end, we provide a detailed analysis of the protocol where we discuss multiple attack scenarios.
Authors and Affiliations
Pardis Pourghomi, Muhammad Saeed, Gheorghita Ghinea
Comparison Shopping Engines
Since the stimulation of both feelings of need and temptation have become excessive with the spread of internet advertising, the e-consumer have begun to feel increasingly lost and overwhelmed by offers in a purchasing c...
A Hybrid Genetic Algorithm with Tabu Search for Optimization of the Traveling Thief Problem
Until now, several approaches such as evolutionary computing and heuristic methods have been presented to optimize the traveling thief problem (TTP). However, most of these approaches consider the TTP components independ...
Determining the Types of Diseases and Emergency Issues in Pilgrims During Hajj: A Literature Review
Introduction: Every year 2-3 million pilgrims with different background and most of them are elderly from 184 countries in the world congregate in the holy place ‘Haram’ at Makkah in Saudi Arabia to perform Hajj. During...
A QUADRATIC CONVERGENCE METHOD FOR THE MANAGEMENT EQUILIBRIUM MODEL
In this paper, we study a class of methods for solving the management equilibrium model. We first give an estimate of the error bound for the model, and then, based on the estimate of the error bound, propose a method fo...
Improving Classification Accuracy of Heart Sound Signals Using Hierarchical MLP Network
Classification of heart sound signals to normal or their classes of disease are very important in screening and diagnosis system since various applications and devices that fulfilling this purpose are rapidly design and...