Skip to main content

NFC Secure Payment and Verification Scheme for Mobile Payment

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9798))

Abstract

As one of the most important techniques in IoT, NFC (Near Field Communication) is more interested than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micro-payment and access control function, which is widely used in the financial industry, traffic transport, road ban control and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack, brute force attack and so on, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ning, H., Wang, B.: RFID major projects and the state Internet of Things. Mechanical Industry Press (2008)

    Google Scholar 

  2. Fan, K., Gong, Y., Liang, C., et al.: Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. In: Security and Communication Networks. Published online in Wiley Online Library (wileyonlinelibrary.com) (2015). doi:10.1002/sec.1314

    Google Scholar 

  3. Pasquet, M., et al.: Secure payment with NFC mobile phone in the Smart Touch project. In: Proceedings of International Symposium on Collaborative Technologies and Systems, pp. 121–126 (2008)

    Google Scholar 

  4. Su, Z., Xu, Q., Qi, Q.: Big data in mobile social networks: A QoE oriented framework. IEEE Network 30(1), 2–57 (2016)

    Article  Google Scholar 

  5. Xu, Q., Su, Z., Han, B., Fang, D., Xu, Z., Gan, X.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Networking and Applications (2015). doi:10.1007/s12083-015-0330-6

    Google Scholar 

  6. Lee, Y.S., Kim, E., Jung, M.S.: A NFC based authentication method for defense of the man in the middle attack. In: Proceedings of the 3rd International Conference on Computer Science and Information Technology (2013)

    Google Scholar 

  7. Ceipidor, U.B., Medaglia, C.M., Marino, A., Sposato, S., et al.: KerNees: A protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions. In: Proceedings of 9th International ISC Conference on Information Security and Cryptology (ISCISC-2012), pp. 115–120 (2012)

    Google Scholar 

  8. Ceipidor, U.B., Medaglia, C.M., Marino, A., et al.: Mobile ticketing with NFC management for transport companies problems and solutions. In: Proceedings of 5th International Workshop on Near Field Communication (NFC), pp. 1–6 (2013)

    Google Scholar 

  9. Wei, J.W., Wei, H.L.: An NFC e-ticket system with offline authentication Information. In: Proceedings of 9th IEEE International Conference on Communications and Signal Processing (ICICS), pp. 1–5 (2013)

    Google Scholar 

  10. Kayser, S., Bewernick, B.H., Hurlemann, R., et al.: A secure offline key generation with protection against key compromise. Physi. Rev. B, Condens. Matter 51(4), 2550–2555 (2009)

    Google Scholar 

  11. Fan, K., Li, J., Li, H., Liang, X., Shen, X., Yang, Y.: RSEL: Revocable secure efficient lightweight RFID authentication scheme. Concurrency Comput. Pract. Experience 26(5), 1084–1096 (2014)

    Article  Google Scholar 

  12. Thammarat, C., Chokngamwong, R., Techapanupreeda, C., et al.: A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys. In: Proceedings of 2015 International Conference on Information Networking (ICOIN), pp. 133–138 (2015)

    Google Scholar 

Download references

Acknowledgment

This work has been financially supported by the National Natural Science Foundation of China (No. 61303216, No. 61272457, No. U1401251, and No. 61373172), the National High Technology Research and Development Program of China (863 Program) (No. 2012AA013102), the China Postdoctoral Science Foundation funded project (No. 2013M542328), and National 111 Program of China B16037 and B08038, and the Xian Science and Technology Plan funded project (CXY1352WL30).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Fan, K. et al. (2016). NFC Secure Payment and Verification Scheme for Mobile Payment. In: Yang, Q., Yu, W., Challal, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2016. Lecture Notes in Computer Science(), vol 9798. Springer, Cham. https://doi.org/10.1007/978-3-319-42836-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42836-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42835-2

  • Online ISBN: 978-3-319-42836-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics