Light-Weight Authentication Scheme for NFC mCoupon Service in IoT Environments

  • Sung-Wook Park
  • Im-Yeong LeeEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 354)


Recently, the potential of m-commerce by the combination of mobile and NFC aroused great momentum on e-commerce market. In particular, the variety of mCoupon services based on NFC has been utilized in consumer marketing instruments. However, the status of security technology for NFC based coupon service is very low. Related providers were considering method for just-in NFC service marketing case. And limited resource of NFC tag is difficult to deal with occurring security threats in NFC mCoupon service. In this paper, we proposed a light-weight authentication scheme for practical NFC mCoupon service that provides efficient and secure signature scheme against illegal use in mCoupon environment based on low-cost NFC tag for using light-weight authentication method.


Component NFC Light-weight authentication NTRU mCoupon Digital signature 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the MEST (Ministry of Education, Science and Technology) (2013R1A1A2012940) and the Soonchunhyang University.


  1. 1.
    Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wireless Pers. Commun. 71(3), 2259–2294 (2013)CrossRefGoogle Scholar
  2. 2.
    Jakobsson, M., MacKenzie, P.D., Stern, J.P.: Secure and lightweight advertising on the web. Comput. Netw. 31(11–16), 1101–1109 (1999)CrossRefGoogle Scholar
  3. 3.
    Fortin, D.R.: Clipping coupons in cyberspace: a proposed model of behavior for deal-prone consumers. Psychol. Mark. 17(6), 515–534 (2000)CrossRefGoogle Scholar
  4. 4.
    Garg, R., Mittal, P., Agarwal, V., Modani, N.: An architecture for secure generation and verification of electronic coupons. In: Proceedings of the Usenix Annual Technical Conference, Boston, Mass, USA, 2001Google Scholar
  5. 5.
    Lee, M.-K., Kim, J.W., Song, J.E., Park, K.: Sliding window method for NTRU. In: Applied Cryptography and Network Security, pp. 432–442, Springer, Berlin (2007)Google Scholar
  6. 6.
    Aigner, M., Dominikus, S., Feldhofer, M.: A system of secure virtual coupons using NFC technology. In: Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom ’07), pp. 362–366, March 2007Google Scholar
  7. 7.
    Dominikus, S., Aigner, M.: mCoupons: an application for near field communication (NFC). In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW ’07), pp. 421–428, May 2007Google Scholar
  8. 8.
    Hsiang, H.-C., Kuo, H.-C., Shih, W.-K.: A secure mCoupon scheme using near field communication. Int. J. Innov. Comput. Inf. Control 5(11), 3901–3909 (2009)Google Scholar
  9. 9.
    Chang, C.-C., Sun, C.-Y.: A secure and efficient authentication scheme for E-coupon systems. Wireless Pers. Commun. 77(4), 2981–2996 (2014)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Hsueh, S.-C., Chen, J.-M.: Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electron. Commer. Res. Appl. 9(4), 283–293 (2010)CrossRefGoogle Scholar
  11. 11.
    Park, S.-W., Lee, I.-Y.: Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC. Int. J. Secur. Appl. 7(5), 131–138 (2013)Google Scholar
  12. 12.
    Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Algorithmic Number Theory (1998)Google Scholar
  13. 13.
    Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Chang, C.C., Wu, C.C., Lin, I.C.: A secure E-coupon system for mobile users. IJCSNS Int. J. Comput. Sci. Netw. Secur. 6(1) (2006)Google Scholar
  15. 15.
    Chien, H.-Y.: SASI: a newultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4), 337–340 (2007)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Phan, R.C.-W.: Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans. Dependable Secure Comput. 6(4), 316–320 (2009)CrossRefGoogle Scholar
  17. 17.
    Patil, V., Shyamasundar, R.K.: E-coupons: an efficient, secure and delegable micro-payment system. Inf. Syst. Front. 7(4–5), 371–389 (2005)CrossRefGoogle Scholar
  18. 18.
    A Study on the Development of Cryptosystems for the Next Generation. National Security Research Institute (2006)Google Scholar
  19. 19.
    Stamp, M., Richard, M.L.: Applied Cryptanalysis: Breaking Ciphers in the RealWorld. Wiley, Hoboken (2007)CrossRefGoogle Scholar
  20. 20.
    Noh, S.-K., Lee, S.-R., Choi, D.: Proposed M-payment system using near-field communication and based on WSNenabled location-based services for M-commerce. Int. J. Distrib. Sens. Netw. 2014(865172): 8 pages (2014)Google Scholar
  21. 21.
    Atici, A.C., Batina, L., Junfeng, F., Verbauwhede, I., Yalcin, S.B.O.: Low-cost implementations of NTRU for pervasive security. In: Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors (ASAP’08), pp. 79–84 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  1. 1.Department of Computer Software EngineeringSoonchunhyang UniversityAsan-siRepublic of Korea

Personalised recommendations