Abstract
Mobile wallet is very useful for day to day money transaction. It is an essential requirement to build utmost level of security. NFC technology introduces a new gateway to enable secure mobile wallet money transaction providing direct point to point device communication. This paper proposes a method to support alternative cryptographic algorithms for each new transaction and each of these transactions are based on a session with different cryptographic key generated for each session. Information used during mobile transaction resides in the cryptographic SIM card. The point to point mobile money transaction in NFC enabled mobile wallet is carried out over a secure channel using WAP.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Benyó, B., Sódor, B., Fördős, G., Kovács, L., Vilmos, A.: A generalize approach for NFC application development. In: 2nd International Workshop on Near Field Communication, pp. 45–50. IEEE Press, Monaco (2010)
Chen, W., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.-H.: NFC Mobile Transactions and Authentication Based on GSM Network. In: 2nd International Workshop on Near Field Communication, NFC, pp. 83–89. IEEE Press (2010)
Kálmán, G., Noll, J.: SIM as Secure Key Storage in Communication Networks. In: Proceedings of the 3rd International Conference on Wireless and Mobile Communications, pp. 55–61. IEEE Press, Guadeloupe (2007)
Jara, A., Zamora, M.A., Skarmeta, A.F.G.: Secure use of NFC in medical envi-ronments. In: 5th European Workshop on RFID Systems and Technologies, pp. 1–8. IEEE Press, Bremen (2009)
Leung, C.-M.: Depress phishing by CAPTCHA with OTP. In: International Conference on Anti-Counterfeiting, Security, and Identification in Communication, pp. 187–192. IEEE Press, Hong Kong (2009)
Tiwari, P.B., Joshi, S.R.: Single sign-on with one time password. In: First Asian Himalayas International Conference in Internet, pp. 1–4. IEEE Press, Kathmandu (2009)
Ondrus, J., Pigneur, Y.: An Assessment of NFC for Future Mobile Payment Systems. In: International Conference on the Management of Mobile Business, pp. 43–53. IEEE Press, Toronto (2007)
Mulliner, C.: Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. In: Proc. International Conference on Reliability and Security, pp. 695–700. IEEE Press, Fukuoka (2009)
Pasquet, M., Reynaud, J., Rosenberger, C.: Secure payment with nfc mobile phone in the smarttouch project. In: Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, pp. 95–98. IEEE Press, Irvine (2008)
Raghuwanshi, Pateria, R.K., Singh, R.P.: A new protocol model for verification of payment order information integrity in online Epayment system. In: World Congress on Nature & Biologically Inspired Computing, pp. 1665–1668. IEEE Press, Coimbatore (2009)
The Transformational Power of NFC, http://www.mobimatter.com/category/topic/nfc-rfid/
Fun, T.S., Beng, L.Y., Likoh, J., Roslan, R.: A light-weight and Private Mobile Payment Protocol by Using Mobile Network Operator. In: Proceedings of International Conference on Computer and Communication Engineering, pp. 162–166. IEEE Press, Kuala Lumpur (2008)
Grunberger, S., Langer, J.: Analysis and test results of tunneling IP over NFCIP-1. In: First International Workshop on Near Field Communication, pp. 93–97. IEEE Press, Hagenberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chowdhury, R., De, D. (2011). Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques. In: Chaki, N., Cortesi, A. (eds) Computer Information Systems – Analysis and Technologies. Communications in Computer and Information Science, vol 245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27245-5_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-27245-5_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27244-8
Online ISBN: 978-3-642-27245-5
eBook Packages: Computer ScienceComputer Science (R0)