Abstract
In this paper, we proposed a new Authentication Protocol for Mobile Applications using NFC technology (AP for MAN). The proposed protocol minimizes the required time to complete the authentication process between the shared entities with a high level of privacy. According to the main security measures, the proposed protocol is evaluated. The current paper presents a new idea for preventing denial of service attack and preserves the limited mobile device capability. The proposed protocol is checked using BAN logic and established that it has no redundancy, the mutual authentication property between the shared parties is verified. The implementation of the proposed protocol shows that it works as designed and it is practical.
Highlights
Near Field Communication (NFC) is a wireless technology that operates in a short range of about ten centimeters for communication
It’s simple and has low computation time comparing to similar authentication protocols
The proposed protocol depends on a number of Hash Message Authentication Code (HMAC) functions that are used to preserve the integrity and minimize the time of authenticity
Summary
Near Field Communication (NFC) is a wireless technology that operates in a short range of about ten centimeters for communication. The physical and data link layer for NFC modes are based on standard ISO18092, but applications, device architecture and related topics standards are still discussed by the NFC-Forum (Ukalkar 2017) These days, many smartphones as well, as mobile devices, have embedded NFC to enable data transfers between devices to speed communication in a short-range (Ukalkar, 2017). The proposed protocol depends on online communication with an authentication Application Server (AS) that considered a representative of the confidence and security of issuing and acquiring data from other systems It depends on two devices support NFC application. The proposed protocol has three main entities as shown, the main component of driver entity is the application server that handles all authentication and registration processes, second and third entities are NFC mobile device and Point-of-Sale (PS), all the data processed will be stored in a database.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.