Advertisement

The Journal of Supercomputing

, Volume 75, Issue 8, pp 4617–4637 | Cite as

Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment

  • Sung-Wook Park
  • Im-Yeong LeeEmail author
Article

Abstract

The union of near-field communication (NFC) and mobile devices has led to significant changes in payment systems over recent years. Currently, NFC-based services are the leading form of mobile payment method. In particular, many companies that use electronic payment services are adopting NFC systems to replace credit cards. Additionally, the safety of communication has been enhanced by using standard techniques to activate NFC services. The properties of mobile NFC payments provide a business model for the Internet of Things (IoT) environment. However, electronic payment methods based on NFC are still vulnerable to various security threats. One example is the case of credit card data hacking under the KS X 6928 standard. In particular, the security level of the NFC payment method in passive mode is limited by the storage, power consumption, and computational capacity of the low-cost tags. Recently, chaotic encryption based on Chebyshev polynomials has been used to address certain security issues. Our proposed scheme is based on the Chebyshev chaotic map, unlike traditional encryption protocols that apply complex cryptography algorithms. Considering the tag limitations, the hash, XOR, and bitwise operations in the proposed scheme provide high-level security for payment environments. We propose a security-enhanced transaction scheme based on Chebyshev polynomials for mobile payment services in an IoT device environment considering the signature record-type definition and KS X 6928 standard.

Keywords

NFC mobile payment NDEF Signature RTD Transaction authentication Chebyshev polynomial 

References

  1. 1.
    KS X 6928-1 (2013) Mobile payment - Mobile card - Part 1: General,” 2013Google Scholar
  2. 2.
    KS X 6928-2 (2013) Mobile payment - Mobile card - Part 2: Offline transaction,” 2013Google Scholar
  3. 3.
    KS X 6928-3 (2013) Mobile payment - Mobile card - Part 3: Online transactionGoogle Scholar
  4. 4.
  5. 5.
    Lee CC (2013) A simple key agreement scheme based on chaotic maps for VSAT satellite communications. In: International journal of satellite communications and networking, 2013Google Scholar
  6. 6.
    ECMA International (2008) ECMA-385 NFC-SEC NFCIP-1 Security Services and ProtocolGoogle Scholar
  7. 7.
    ECMA International (2008) ECMA-386_NFC-SEC-01 NFC-SEC Cryptography Standard using ECDH and AESGoogle Scholar
  8. 8.
    Roland M (2012) Security and privacy issues of the signature RTD. In: NFC forum member meetingGoogle Scholar
  9. 9.
    Fee GJ, Monagan MB (2004) Cryptography using Chebyshev polynomials. Citeseer, 2004Google Scholar
  10. 10.
    Xiao D, Liao X, Deng S (2007) A novel key agreement protocol based on chaotic maps. Inf Sci 177:1136–1142MathSciNetCrossRefGoogle Scholar
  11. 11.
    Chang CC, Sun CY (2014) A secure and efficient authentication scheme for E-coupon systems. In: Wireless personal communications, Vol. 77, No. 4, 2014Google Scholar
  12. 12.
    Cheng ZY, Liu Y, Chang CC, Chang SC (2013) Authenticated RFID security mechanism based on chaotic maps. Secur Commun Netw 6:247–256CrossRefGoogle Scholar
  13. 13.
    Akgün M, Caglayan MU (2013) Weaknesses in a recently proposed RFID authentication protocol. In: IACR Cryptology ePrint Archive, 2013Google Scholar
  14. 14.
    Akgün M, Caglayan MU vulnerabilities of RFID security protocol based on chaotic maps. In: 2014 IEEE 22nd International Conference on Network Protocols (ICNP)Google Scholar
  15. 15.
    Thammarat C, Chokngamwong R, Techapanupreeda C, Kungpisdan S (2015) A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys. In: 2015 International conference on information networking (ICOIN)Google Scholar
  16. 16.
    Min SJ (2015) Study on electronic-money technology using near field communication. SymmetryGoogle Scholar
  17. 17.
    Abughazalah S, Markantonakis K, Mayes K (2014) Secure mobile payment on NFC-enabled mobile phones formally analysed using casperFDR. In: IEEE TSPCCGoogle Scholar
  18. 18.
    El Moustaine E, Laurent M (2012) A lattice based authentication for low-cost RFID. In: 2012 IEEE international conference onRFID-technologies and applications (RFID-TA)Google Scholar
  19. 19.
    Xiao D, Liao X, Wong KW (2005) An efficient entire chaos-based scheme for deniable authentication. Solitons Fractals 23:1327–1331CrossRefzbMATHGoogle Scholar
  20. 20.
    Roland M, Langer J, Scharinger J (2011) Security Vulnerabilities of the NDEF signature record type. In: Third International Workshop on Near Field CommunicationGoogle Scholar
  21. 21.
    Specification T (2006) NFC Data Exchange Format (NDEF). Technical SpecificationGoogle Scholar
  22. 22.
    Park SW, Lee IY Transaction (2016) Authentication scheme based on enhanced signature RTD for NFC payment service environments. In: Plat-ConGoogle Scholar
  23. 23.
    Korak T, Wilfinger L (2012) Handling the NDEF signature record type in a secure manner. In: 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Sciences and SoftwareSoonchunhyang UniversityAsanRepublic of Korea

Personalised recommendations