Skip to main content

Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 245))

Abstract

Mobile wallet is very useful for day to day money transaction. It is an essential requirement to build utmost level of security. NFC technology introduces a new gateway to enable secure mobile wallet money transaction providing direct point to point device communication. This paper proposes a method to support alternative cryptographic algorithms for each new transaction and each of these transactions are based on a session with different cryptographic key generated for each session. Information used during mobile transaction resides in the cryptographic SIM card. The point to point mobile money transaction in NFC enabled mobile wallet is carried out over a secure channel using WAP.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Benyó, B., Sódor, B., Fördős, G., Kovács, L., Vilmos, A.: A generalize approach for NFC application development. In: 2nd International Workshop on Near Field Communication, pp. 45–50. IEEE Press, Monaco (2010)

    Google Scholar 

  2. Chen, W., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.-H.: NFC Mobile Transactions and Authentication Based on GSM Network. In: 2nd International Workshop on Near Field Communication, NFC, pp. 83–89. IEEE Press (2010)

    Google Scholar 

  3. Kálmán, G., Noll, J.: SIM as Secure Key Storage in Communication Networks. In: Proceedings of the 3rd International Conference on Wireless and Mobile Communications, pp. 55–61. IEEE Press, Guadeloupe (2007)

    Google Scholar 

  4. Jara, A., Zamora, M.A., Skarmeta, A.F.G.: Secure use of NFC in medical envi-ronments. In: 5th European Workshop on RFID Systems and Technologies, pp. 1–8. IEEE Press, Bremen (2009)

    Google Scholar 

  5. Leung, C.-M.: Depress phishing by CAPTCHA with OTP. In: International Conference on Anti-Counterfeiting, Security, and Identification in Communication, pp. 187–192. IEEE Press, Hong Kong (2009)

    Google Scholar 

  6. Tiwari, P.B., Joshi, S.R.: Single sign-on with one time password. In: First Asian Himalayas International Conference in Internet, pp. 1–4. IEEE Press, Kathmandu (2009)

    Chapter  Google Scholar 

  7. Ondrus, J., Pigneur, Y.: An Assessment of NFC for Future Mobile Payment Systems. In: International Conference on the Management of Mobile Business, pp. 43–53. IEEE Press, Toronto (2007)

    Google Scholar 

  8. Mulliner, C.: Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. In: Proc. International Conference on Reliability and Security, pp. 695–700. IEEE Press, Fukuoka (2009)

    Google Scholar 

  9. Pasquet, M., Reynaud, J., Rosenberger, C.: Secure payment with nfc mobile phone in the smarttouch project. In: Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, pp. 95–98. IEEE Press, Irvine (2008)

    Chapter  Google Scholar 

  10. Raghuwanshi, Pateria, R.K., Singh, R.P.: A new protocol model for verification of payment order information integrity in online Epayment system. In: World Congress on Nature & Biologically Inspired Computing, pp. 1665–1668. IEEE Press, Coimbatore (2009)

    Google Scholar 

  11. The Transformational Power of NFC, http://www.mobimatter.com/category/topic/nfc-rfid/

  12. Fun, T.S., Beng, L.Y., Likoh, J., Roslan, R.: A light-weight and Private Mobile Payment Protocol by Using Mobile Network Operator. In: Proceedings of International Conference on Computer and Communication Engineering, pp. 162–166. IEEE Press, Kuala Lumpur (2008)

    Google Scholar 

  13. Grunberger, S., Langer, J.: Analysis and test results of tunneling IP over NFCIP-1. In: First International Workshop on Near Field Communication, pp. 93–97. IEEE Press, Hagenberg (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chowdhury, R., De, D. (2011). Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques. In: Chaki, N., Cortesi, A. (eds) Computer Information Systems – Analysis and Technologies. Communications in Computer and Information Science, vol 245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27245-5_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27245-5_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27244-8

  • Online ISBN: 978-3-642-27245-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics