Maryam Mehrnezhad Feng Hao Siamak F. Shahandashti Newcastle university, UK CryptoForma meeting, Belfast 4 May 2015 Tap-Tap and Pay (TTP): Preventing The.

Slides:



Advertisements
Similar presentations
Statistics for Improving the Efficiency of Public Administration Daniel Peña Universidad Carlos III Madrid, Spain NTTS 2009 Brussels.
Advertisements

DCSP-4: Modem Jianfeng Feng Department of Computer Science Warwick Univ., UK
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
NFC Technology and Applications Assaf Sella CTO Texas Instruments Israel Feb
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Innovative leak noise correlator – based upon proven success of Eureka2R.
Acquiring traces from random walks Project final presentation By: Yaniv Sabo Aviad Hasnis Supervisor: Daniel Vainsencher.
Motion Detection And Analysis Michael Knowles Tuesday 13 th January 2004.
Advancing Wireless Link Signatures for Location Distinction J. Zhang, M. H. Firooz, N. Patwari, S. K. Kasera MobiCom’ 08 Presenter: Yuan Song.
Bicycle Energy Measurement System
Near Field Communication Romeo Fayloga Van Logan David Ramirez.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
THE TRANSFORMATION OF PAYMENTS. NFC Hosted Payments EMV in the US End-to-End Encryption Mobile POS.
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
In general, H 1 (f) and H 2 (f) can be chosen to best suit the application. For example, to accentuate the signals at the frequencies in which the signal-to-noise.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Bluetooth Low Energy Based Ticketing Systems 11 th February, 2015 Sriharsha Kuchimanchi Supervisor: Prof. Riku Jantti Instructor: Shkumbin Hamiti.
Satellites in Our Pockets: An Object Positioning System using Smartphones Justin Manweiler, Puneet Jain, Romit Roy Choudhury TsungYun
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
By Nathan Faloon Essential Criteria achieved Informational website, which has at least 6 web pages. Home page should display a Hit Counter. Complete.
NFC - Near Field Communication Technology
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
Physical Layer Informed Adaptive Video Streaming Over LTE Xiufeng Xie, Xinyu Zhang Unviersity of Winscosin-Madison Swarun KumarLi Erran Li MIT Bell Labs.
Umm Al-Qura University Collage of Computer and Info. Systems Computer Engineering Department Automatic Camera Tracking System IMPLEMINTATION CONCLUSION.
Agenda EMV – What Is It? EMV In The UK EMV Is Coming To The US
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec UWB4SN 2005:
TOUCHSIGNATURES Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao Newcastle University CryptoForma meeting, Belfast 4 May 2015.
Near Field Communication Systems Patras, July 2006.
By: Ken Steinmann. A virtual wallet that securely stores your credit and debit cards, coupons, and rewards cards. You can make in-store payments by tapping.
Ignite Presentation: Near Field Communication Harry Yang.
SS12 – Project Possibility Android Game Iain FujimotoMorgan Aditya Gandhi Eliud Munguia Ivan Poma Mentor: Artin Fallahi.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Comp. Genomics Recitation 3 The statistics of database searching.
Apple Pay Breakfast briefing 6 October Apple Pay now accepted In store In-app purchases Transport for London.
Radiometric Correction and Image Enhancement Modifying digital numbers.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Tingxin Yan, Vikas Kumar, Deepak Ganesan Presented.
Apple Pay Breakfast briefing 6 October Apple Pay now accepted In store In-app purchases Transport for London.
By Phileo Don - Okhuofu. DATA COLLECTION  Data can be collected by the use of questionnaires or data collection forms.  These could be printed out and.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures – You can see it but you can not do it Muhammad Shahzad, Alex X. Liu Michigan State.
SMARTER. TOGETHER. The Mobility of Fraud Michael Loox, CFI Director of Loss Prevention & Safety Coffee Bean and Tea Leaf David Johnston.
More Spike Sorting Kenneth D. Harris Rutgers University.
Turning a Mobile Device into a Mouse in the Air
Sensor Fusion Donald Heer 11/10/10. The Questions Can two things happen at the ‘same’ time? Can the same thing be observed ‘identically’ by two different.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
 SafePay: Protecting against Credit Card Forgery with Existing Magnetic Card Readers Yinzhi Cao †, Xiang Pan §, Yan Chen § † Lehigh University § Northwestern.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
6/11/2016– strictly confidential, confidential, internal, public –1 NFC – Press Meeting Warsaw, May 29th 2013.
Richard CraparottaMatthew MautoneMichael Carrano Joseph SchwarzeMengting Guo Client/Envisonary: John Keating.
Gmail Password Reset Process Do you want to Reset your Gmail account password because your Gmail account password is not secure or easy to guess or your.
An Introduction to Biometrics
Using Connectives to Answer Exam Questions.
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Near Field Communication (NFC)
Apple Pay Research on NFC and the security threat
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
The protector card RFID PROTECTOR.
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Instructions for tracking booth sales
2N Access Unit 2.0 Multi-technology access control readers.
Using Connectives to Answer Exam Questions.
Presentation transcript:

Maryam Mehrnezhad Feng Hao Siamak F. Shahandashti Newcastle university, UK CryptoForma meeting, Belfast 4 May 2015 Tap-Tap and Pay (TTP): Preventing The Mafia Attack in NFC Payment

What is NFC payment? An upcoming technology that uses RFID for contactless payments Holding card in front of reader without entering PIN Using an NFC-enabled mobile Google wallet, Apple pay, Android Pay It is estimated that mobile NFC payment will reach 670 billion US dollars by 2015 ( Juniper Research, leading analyst firms in the mobile and digital tech sector).

What is Mafia attack? Mafia Fraud MITM attack Relay attack Wormhole Attack Ghost and leech attack Reader and ghost attack

The idea Observation: as the result of physical tapping between a pair of devices, the tapping creates transient vibrations, which can be measured using embedded accelerometer sensors. To be similar if from the same tapping different if from different tappings By comparing the similarity of the two measurements, we distinguish the Mafia attack from a normal NFC transaction.

TTP overview

Is it possible?

Previous works Other sensor data: GPS, Light, Audio, temperature … We DO NOT assume that the attacker's reader is in a different environment as the legitimate reader.

Implementation

Sensor data processing Accelerometer data Sequence of 3 dimensional measurements Vector length to include all dimensions Derivatives to remove the noise and bring the sequences in the same scale Sequence alignment Identifying the peaks and cutting the sequence 0.2 seconds before the first peak and after the second peak 0.6 to 1.5 seconds

Similarity comparison Correlation coefficient (time domain) Coherence (frequency domain) Energy difference Estimates how strong the users tap the distance of two signals in term of the total signal energy levels Peak Gap Difference Roughly estimates how fast the users tap The difference of the distances of the two extremums in two sequences TTP Decision Engine is a combination of all parameters (weighted sum)

Performance Evaluation Host Card based Emulation in Android 23 volunteer user, Each five times Presented with a Video guide MyMobiler to operate the reader Further analysis in Matlab

Results False negative rate (FNR) Honest transaction fails False positive rate (FPR) Mafia transaction succeeds Equal Error Rate (EER) Where the curves (based on threshold) meet 9.99% 1.1 attempts, honest user 10 attempts, attacker

Usability Study 22 users, Two tasks Presented with a brief Study description Asked to fill a questionnaire Rate (convenience, speed, and feeling of security) Free comments

Findings

Contactless payment is more convenient “... the fact that I need to keep the device close to the reader after tapping made the experience less convenient". TTP is faster “…Even [though] I had to tap twice, but the process felt faster comparing to the first one. I feel after tapping I automatically bring the phone close enough to the reader, but in first task, my phone was not close for a while and it took longer". TTP feels more secure “As before [i.e. task 1] payment is very easy. I like the action of tapping the reader as this made me feel more in control of when the transaction took place. I felt this method [TTP] was more secure due to the action of tapping to start the transaction. This meant I know when the transaction took place". “The payment [in task 1] is very easy, but I don't know when the connection between wallet and reader is made; range or time, so I would keep my payment device away from the reader to be sure until I want to pay."

Conclusion TTP is a simple and effective solution against the Mafia attack and it works when both attackers share the similar environment. Future work: Improving the error rate by using multiple sensors and more accurate ones in newer mobiles How to augment contactless cards with an accelerometer Barclay bPay band

Thanks

#Fesenjoonthecat