Skip to main content

Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing?

  • Conference paper
  • First Online:
Radio Frequency Identification and IoT Security (RFIDSec 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10155))

Abstract

During the past decade, cybersecurity threats have drawn everyone’s attention and it’s becoming a national priority in many leading countries. With the development of sophisticated mobile technology, mobile (contactless) payment insecurity, which may cause huge financial losses, is now becoming a serious threat to our daily life. During the holiday season in 2013, China’s most welcome mobile payment system provider - Alipay - lost over 20 GB worth of customer data in a security breach, which affected at least 15 million customers. Even though the company has promised to evaluate the security of the system and to take necessary measures to protect customer’s data, are we still safe with the payment? In this paper, we investigate several security vulnerabilities for Alipay wallet, which may cause individual’s personal data and financial losses. This is due to not only less regulation by authorities but also the failure of enabling secure proximity authentication during mobile payment. By going through these surprising vulnerabilities, we come up with some ideas on how to combat them and show how to enhance the mobile payment security by enabling proximity authentication before monetary transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://pay.weixin.qq.com, accessed at: 10/15/2016.

  2. 2.

    http://www.paycash.eu/, accessed at: 10/15/2016.

  3. 3.

    https://www.thelevelup.com/, accessed at: 10/15/2016.

  4. 4.

    http://go4q.mobi/, accessed at: 10/15/2016.

References

  1. Weber, T.A.: The question of ownership in a sharing economy. In: 2015 48th Hawaii International Conference on System Sciences (HICSS), Kauai, HI, pp. 4874–4883 (2015)

    Google Scholar 

  2. Weber, T.A.: Intermediation in a Sharing Economy: Insurance, Moral Hazard, and Rent Extraction. Journal of Management Information Systems. SSRN: http://ssrn.com/abstract=2439110. Accessed 15 Nov 2016

  3. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P., Karagiannis, T.: Rise of the planet of the apps: a systematic study of the mobile app ecosystem. In: Proceedings of the Internet Measurement Conference, pp. 277–290 (2013)

    Google Scholar 

  4. Breshahan, T., Greenstein, S.: Economics of the internet and mobile computing: the next platform rivalry. Am. Econ. Rev. Pap. Proc. 104(5), 475–480 (2014)

    Article  Google Scholar 

  5. Lee, G.M., Lee, J., Whinston, A.B.: Matching mobile applications for cross promotion. In: Proceedings of the Workshop on e-Business (2014)

    Google Scholar 

  6. HKPC Warns of Intensive Cyber Attacks in 2015. https://www.hkpc.org/en/corporate-info/media-centre/press-releases/2015/5668-hkpc-warns-of-intensive-cyber-attacks-in-2015. Accessed 15 Nov 2016

  7. Tencent Mobile Security Labs: 2014 First Series Security Report of Rooted Phone. Chinese Only http://m.qq.com/security_lab/news_detail_278.html. Accessed 15 Nov 2016

  8. Electronic Cheque (e-Cheque) E-Brochure. http://www.hkma.gov.hk/media/eng/doc/key-functions/finanical-infrastructure/infrastructure/retail-payment-initiatives/e-Cheque_e-brochure_Plaictrext_eng.pdf. Accessed 15 Nov 2016

  9. Ryback, W.: Launch of Two-Factor Authentication for Internet Banking. Hong Kong Monetary Authority (2005)

    Google Scholar 

  10. Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: SecureComm 2005, pp. 67–73. IEEE Computer Society (2005)

    Google Scholar 

  11. Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The swiss-knife RFID distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98–115. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00730-9_7

    Chapter  Google Scholar 

  12. Avoine, G., Lauradoux, C., Marin, B.: How secret-sharing can defeat terrorist fraud. In: ACM Wisec 2011, pp. 145–156. ACM SIGSAC (2011)

    Google Scholar 

  13. Yang, A., Zhuang, Y., Wong, D.S.: An efficient single-slow-phase mutually authenticated RFID distance bounding protocol with tag privacy. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 285–292. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34129-8_25

    Chapter  Google Scholar 

  14. Zhuang, Y., Yang, A., Wong, D.S., Yang, G., Xie, Q.: A highly efficient rfid distance bounding protocol without real-time PRF evaluation. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 451–464. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38631-2_33

    Chapter  Google Scholar 

  15. EMVCo Specifications. https://www.emvco.com/specifications.aspx. Accessed 15 Nov 2016

  16. Wang, Y., Hahn, C., Sutrave, K.: Mobile payment security, threats, and challenges. In: Second International Conference on Mobile and Secure Services (MobiSecServ 2016), Gainesville, FL, pp. 1–5 (2016)

    Google Scholar 

  17. Research, J.: Global digital payments to reach USD 3.6 trillion in 2016. http://www.juniperresearch.com/press/press-releases/global-digital-payments-to-reach-$3-6-trillion. Accessed 15 Nov 2016

  18. Zhuang, Y., Hancke, G.P., Wong, D.S.: How to demonstrate our presence without disclosing identity? Evidence from a grouping-proof protocol. In: Kim, H., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 423–435. Springer, Cham (2016). doi:10.1007/978-3-319-31875-2_35

    Google Scholar 

  19. Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L.F., Christin, N.: QRishing: the susceptibility of smartphone users to QR code phishing attacks. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 52–69. Springer, Heidelberg (2013). doi:10.1007/978-3-642-41320-9_4

    Chapter  Google Scholar 

  20. China’s central bank halts Tencent, Alibaba mobile payment process. http://www.reuters.com/article/us-china-cbank-payments-idUSBREA2D06420140314. Accessed 15 Nov 2016

  21. e-Learning in HSMC. http://ctl.hsmc.edu.hk/en/e-learning. Accessed 15 Nov 2016

Download references

Acknowledgment

This work was supported by a research grant (Project Number: 2015.A1.030.16A) from the Public Policy Research Funding Scheme of the Central Policy Unit of the Hong Kong Special Administrative Region Government. We also thank anonymous reviewers’ valuable comments and PC Chairs’ shepherding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yunhui Zhuang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhuang, Y., Leung, A.C.M., Hughes, J. (2017). Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing?. In: Hancke, G., Markantonakis, K. (eds) Radio Frequency Identification and IoT Security. RFIDSec 2016. Lecture Notes in Computer Science(), vol 10155. Springer, Cham. https://doi.org/10.1007/978-3-319-62024-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62024-4_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62023-7

  • Online ISBN: 978-3-319-62024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics