Abstract
Near Field Communication (NFC) mobile phones
can be used as payment devices and can emulate credit cards.
Although NFC mobile services promise a fruitful future, several
issues have been raised by academics and researchers. Among
the main concerns for the use and deployment of NFC-enabled
mobile phones is the potential loss of security and privacy. More
specifically, mobile phone users involved in a payment transaction
conducted over a mobile handset require that such a system
does not reveal their identity or any sensitive data. Furthermore,
that all entities participating in the transaction are legitimate.
To this end, we proposed a protocol that meets the mobile user’s
requirements. The proposed protocol attempts to address the
main security concerns and protects the customer privacy from
any third party involved in the transaction. We formally analysed
the protocol using CasperFDR and did not find any feasible
attacks.
can be used as payment devices and can emulate credit cards.
Although NFC mobile services promise a fruitful future, several
issues have been raised by academics and researchers. Among
the main concerns for the use and deployment of NFC-enabled
mobile phones is the potential loss of security and privacy. More
specifically, mobile phone users involved in a payment transaction
conducted over a mobile handset require that such a system
does not reveal their identity or any sensitive data. Furthermore,
that all entities participating in the transaction are legitimate.
To this end, we proposed a protocol that meets the mobile user’s
requirements. The proposed protocol attempts to address the
main security concerns and protects the customer privacy from
any third party involved in the transaction. We formally analysed
the protocol using CasperFDR and did not find any feasible
attacks.
Original language | English |
---|---|
Title of host publication | The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14) |
Publisher | IEEE Computer Society |
Publication status | Published - 26 Sept 2014 |