A Design of Electronic Payment Authentication Method based on NFC Smartphone Seolhwa Han, Okkyung Choi*, Kangseok Kim, Hongjin Yeh, Taesik Shon Dept. of.

Slides:



Advertisements
Similar presentations
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Advertisements

NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
NFC Devices: Security and Privacy
NEAR-FIELD COMMUNICATION MAKING LIFE EASY Presenter: Grace Chen NFC Technology.
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
5Ws on NFC Andrea Vitaletti. Overview What Where Why When Who 5Ws.
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
Mobile Payments Index: Introduction Technologies Payment methods
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
An Analysis of The Mobile Market and Location-Based Services What About Wireless…?
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Near Field Communication and Bluetooth Bridge System for Mobile Commerce Adviser : Chao-Huang Wei Student : Shin-An Chan SN: M PPT 製作 :100%
TOPICS TO BE DISCUSSED  Mobile Commerce Mobile Commerce  M-Commerce Technology M-Commerce Technology  M-Commerce Services and Applications M-Commerce.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Mobile Commerce (M-Commerce)
Wireless Communication Meghan Synishin Kara MacDonald Arlene Pino “Last year more mobile phones were sold than the number of PC’s and cars combined.” -
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
Near Field Communication Systems Patras, July 2006.
How Mobile Apps Help Businesses Dr. Gita Phelps Minority Youth in Business (June 2014)
1 授課教授:黃秋煌 學生:賴志勇 學號: M Source: This work was published as an abstract in the proceedings of 2007 Symposium on Cryptography and Information.
Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
SEMINAR ON BLUETOOTH TECHNOLOGY
REDACTION BASED ATM MONITORING SYSTEM USING MSP 430
Near Field Communications
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
CISC 849 : Applications in Fintech The future is already here?
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Design of Context-Aware based Information Prevention Sungmo Jung 1, Younsam Chae 2, Jonghun Shin 2, Uyeol Baek 2, Seoksoo Kim ∗ 1, * Department of Multimedia,
A Method for Providing Personalized Home Media Service Using Cloud Computing Technology Cui Yunl, Myoungjin Kim l and Hanku Lee l 'z * ' Department of.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Effect Analysis of Electric Vehicle Charging to Smart Grid with Anti-Islanding Method Bum-Sik Shin, Kyung-Jung Lee, Sunny Ro, Young-Hun Ki and Hyun-Sik.
Building a contactless university examination system using NFC Speaker : Chih-Ching Chen Advisor : Dr. Ho-Ting Wu 2013/12/2 1.
Advanced Science and Technology Letters Vol.46 (Mobile and Wireless 2014), pp University Dedicated Next.
Introduction for Personal Area Networks including Infrared, Bluetooth, and Near-Field Communication. Presented By Valerie Lim.
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Introduction to Networking. What is a Network? Discuss in groups.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
Security of the Internet of Things: perspectives and challenges
WEB BASED MONITORING AND CONTROLING OF INDUSTRIAL PROCESSES PRESENTED BY: Bhagyawant (3AE07EC018) Kushal (3AE07EC032) Mahantesh (3AE07EC034) Mallinath.
Okkyung Choi, Kangseok Kim, Duksang Wang, Hongjin Yeh and Manpyo Hong Received 05 Jan 2011; Accepted 07 Feb 2012.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Take Charge of your Finances
Take Charge of your Finances
Grid with Anti-Islanding Method
Seolhwa Han, Okkyung Choi*, Kangseok Kim, Hongjin Yeh, Taesik Shon
The Streaming Service Model using Complex
Trezor Support Phone Number For You!! Round The Clock
Get Solution at Trezor Support Phone Number
Mobile Commerce and Ubiquitous Computing
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Take Charge of your Finances
Presentation transcript:

A Design of Electronic Payment Authentication Method based on NFC Smartphone Seolhwa Han, Okkyung Choi*, Kangseok Kim, Hongjin Yeh, Taesik Shon Dept. of Knowledge Information Security, Graduate School of Ajou University, Suwon, Korea { hsh3440, okchoi, kangskim, hjyeh, *Author to whom correspondence should be addressed; Abstract. Unlike the phones from the past, Smartphone holds greater performance like that of PC and it is also true that riskier security threat comes along. Also, with the rapid development of mobile NFC payment services, an importance of the mobile security is growing rapidly but currently, the security-related technology is a very secure manner. Therefore this paper aims to propose an electronic payment authentication method using vibration cues, which will be then utilized for design and implementation. The proposed method enables an efficient, secure mobile payment service by analyzing security issues likely to occur in payments using NFC Smartphone and by proposing payment protocols with an authentication method using vibration cues to resolve such issues. Keywords: NFC(Near Field Communication), User Study, Mobile Phones, Vulnerability Analysis, Authentication, Shoulder Surfing Attack, Relay Attack, MITM Attack, Vibration Cue. 1 Introduction NFC, short for Near Field Communication, literally means a short-range wireless interaction. It makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices with a touch[1]. It is important to provide a simple method for designing and implementing NFC payment systems that offer both reasonable security protection as well as ease of use for the user[2]. Therefore this paper aims to propose an electronic payment authentication method using vibration cues, which will be then utilized for design and implementation. Furthermore, the existing NFC payment system has some weakness of low efficiency and difficulty in the aspect of usability but those problems were solved in this study by developing a method that can be easily used in the Smartphone environment. 38

2 Proposed Method The method proposed in this study, intended to cover such vulnerability, is possibly dedicated to preventing data forgery through the use of a biotouch vibration cue like a method for the lock on a safe, coding and storing the payment information in the DB registry to enable strengthening user authentication and getting prepared for personal information leakage. Fig. 1. Flow chart of proposed method. Fig. 1 shows the staged process of the overall flowchart for the proposed method. ① User puts the NFC reader to contact the NFC payment writer for payment. ② The NFC payment writer transfers payment information to the NFC reader. ③ The NFC reader upon receipt of payment information performs a vibration cue authentication which then enters a pin value in the completed pin setting in a vibration way. Security factors used here include : 1) pin management that prevents pin number from leaking through periodical renewal, re-coding process and continuous management of the first registered pin number, 2) an authentication that uses the vibration cue recognized by biotouch to prevent pin number from leaking due to SSA, and 3) the DB encryption that encodes significant personal information such as pin number and payment information using AES256 and SHA1, strengthens personal information by comparing hash values. ④ If the vibration cue authentication is successful, payment information is encoded and stored in the registry. If the vibration cue authentication fails over 3 times, the process is forcibly closed so no further payment process can develop. Making repayments is possible only by moving to the initial screen for pin number setting, going through the user authentication process and setting the pin number again. ⑤ Lastly, a success message is delivered to the NFC reader and the payment process is closed. 39

3 Conclusion With the growing popularity of Smartphone, electronic payment services using Smartphone are rapidly gaining traction. Therefore, mobile NFC services market combining with communication and payment is growing rapidly and they are becoming an alternative computing approach to provide lots of convenient services to users. This paper proposed the mobile payment service using NFC based on vibration cues to prevent Reply attack, MITM attack and SSA that are likely to occur in NFC payment service. The proposed method can deter an attack from an outside attacker that can take place in payment process by applying security factors such as Authentication, PIN management and Access Control to banking security techniques. On top of this, while the existing method held disadvantages such as inefficiency and inconvenience in terms of usability, this method considered a matter of security and complemented it for a better use in smartphones. Acknowledgments. This research was supported by the MKE(Ministry of Knowledge Economy), Korea, under the "Employment Contract based Master's Degree Program for Information Security" supervised by the KISA(Korea Internet Security Agency). References 1.Near Field Communication, (2006) 2.Anokwa, Y., Borriello, G. Pering, T. Want, R.: A User Interaction Model for NFC Enabled Application. In: 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp IEEE Computer Society, New York (2007) 3.Haselsteiner, E., Breitfuss, K.: Security in Near Field Communication. Proceedings of Workshop on RFID Security, pp (2006) 4.Mulliner, C.: Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones. In: 1st Workshop on Sensor Security, Proceedings of the International Conference on Availability, Reliability and Security, ARES 2009, pp Fukuoka, Japan(2009) 5.Chen, W.D., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.H.: Using 3G Network Components to Enable NFC Mobile Transactions and Authentication. In: 2010 IEEE International Conference on Progress in Informatics and Computing (PIC), pp Shanghai (2010) 40