Abstract
Recently, NFC (Near Field Communication) and its related technologies are being loaded into smartphones. Consequently, payment and data exchange are easily made through NFC. However, smartphone can be permitted an attack such as a user impersonation by exposure to information in the communication process. Therefore, the communication between mobile devices in NFC environments must be made safely with leaving any information at the other party. Moreover, it should be light-weight for wireless communication. In this paper, we propose an authentication method and a scheme of key agreement that can reduce the weight by using a hash function and XOR operation algorithms for mobile payment systems. We confirm that the proposal method leaves no information at the other party.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Tsudik G, Herreweghen EV, Waidner M (2000) Design, implementation and deployment of the iKp secure electronic payment system. IEEE J Sel Areas Commun 18(4):611–627
Kungpisdan S, Srinivasan B, Dung Le P (2004) A secure account-based mobile payment protocol. In: ITCC
Juniper Research (2012) NFC mobile payments and retail marketing business models and forecasts 2012–2017
Michahelles F, Thiesse F, Schmidt A, Williams JR (2007) Pervasive RFID and near field communication technology. IEEE Pervasive Comput 6(3):94–96
Kuspriyanto EH, Basjaruddin N, Purboyo T, Purwantoro S, Ubaya H (2011) Efficient tag-to-tag near filed communication(NFC) protocol for secure mobile payment. In: ICICI-BME
Secure Electronic Transaction Specification, version 1.0 (1997). http://www.cI.cam.ac.uklresearch/security/resources/set/
Sekhar VC, Sarvabhatla M (2012) Secure lightweight mobile payment protocol using symmetric key techniques. In: ICCCI
ISO/IEC 13157-2010 (2010) Information technology telecommunications and information exchange between systems—NFC Security—Part 2: NFC-SEC cryptography standard using ECDH and AES. ISO/IEC
Vincent J, Limi V, Aude P, Gaber C, Pasquet M (2012) A mobile payment evaluation based on a digital identity representation. In: CTS Conf
Xi L, Ping HH (2007) Efficient protocol of secure mobile payment. J Commun Comput 4(5):366
Bodhani A (2013) New ways to pay [communications near field]. Eng Technol 8(7):32–35
ISO/IEC 13157-1 (2010) Information technology telecommunications and information exchange between systems—NFC Security—Part 1: NFC-SEC NFCIP-1 security service and protocol. ISO/IEC
Eun H, Lee H, Son J, Kim S, Oh H (2012) Conditional privacy preserving security protocol for NFC applications. In: IEEE international conference on consumer electronics (ICCE), pp 380–381
Eun H, Lee HJ, Oh HK (2013) Conditional privacy preserving security protocol for NFC applications. IEEE Trans Consum Electron 59(1):153–160
Acknowledgments
This work was supported by Kyungnam University Foundation Grant, 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Jung, MS. (2015). A Study on Electronic-Money Technology Using Near Field Communication. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_13
Download citation
DOI: https://doi.org/10.1007/978-94-017-9618-7_13
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9617-0
Online ISBN: 978-94-017-9618-7
eBook Packages: EngineeringEngineering (R0)