Abstract

Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC transaction process make them partners in a way that sometimes they should share their access permissions on the applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compare to the use of a Secure Element (SE) as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO). In this circumstance, Mobile Network Operator plays the role of network carrier which is responsible for controlling all the credentials transferred to the end user. The proposed protocol eliminates the requirement of a shared secret between the Point-of-Sale (POS) and the Mobile Network Operator before execution of the protocol, a mandatory requirement in the earlier version of this protocol [16]. This makes it more practicable and user friendly. At the end, we provide a detailed analysis of the protocol where we discuss multiple attack scenarios.

Highlights

  • Technical standards and fundamental interoperability are essential to be achieved for industries working with Near Field Communication (NFC) technology in order to establish a positive cooperation in the service environment

  • Stored at a secure location in SIM and at Authentication Centre (AuC) Eki (R) using A8 algorithm Encryption key generated by shop MAC key generated by shop Public key of MNO Private key of MNO Signing key of MNO Verification key of MNO Local Area Identifier Mobile Network Operator Random Number (128 bits) generated by MNO Random number generated by SIM (128 bits) Secure Element Transaction Message for mobile Transaction Message for shop Temporary Mobile Subscriber Identity Total Price Temporary Shop ID Shop Time Stamp Transaction Time Stamp

  • The proposed protocol was based on the NFC Cloud Wallet model [14][22][23][24], NFC payment application [16] and W

Read more

Summary

A Secure Cloud-Based Nfc Mobile Payment Protocol

Abstract—Near Field Communication (NFC) is one the most recent technologies in the area of application development and service delivery via mobile phone. We present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO). The proposed protocol eliminates the requirement of a shared secret between the Point-of-Sale (POS) and the Mobile Network Operator before execution of the protocol, a mandatory requirement in the earlier version of this protocol [16]. This makes it more practicable and user friendly. We provide a detailed analysis of the protocol where we discuss multiple attack scenarios

INTRODUCTION
Our contribution
SE MANAGEMENT
Advantages of cloud-based approach
Google Wallet
Our approach
GSM AUTHENTICATION
PROPOSED PROTOCOL
Phase 2
Phase 3
PROTOCOL ANALYSIS
Dishonest Customer
Dishonest Shop
Messages Security
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.