Advertisement

A Novel Approach Privacy Security Protocol Based SUPM Method in Near Field Communication Technology

  • S. Kannadhasan
  • M. Isaivani
  • G. Karthikeyan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)

Abstract

For the past few years, so many mobile terminals have been released into market with NFC which is abbreviated as near-field communication. The NFC together with smart devices has made to improve the effective utility range of NFC. Specifically, NFC electronic payment is expected to take the place of credit cards in e-payment. For this, it is essential to direct the attention of the security issues in NFC. Presently, the security standards in NFC make use of user’s public key at a fixed value in key agreement process. The message’s relevancy occurs at the public key of NFC. NFC is used for gathering the message based on the malicious attacker. This leads to the infringement of privacy of user. The planned work presents conditional privacy protection method based on pseudonyms to overcome the aforementioned problems. The users can communicate with other parties based on some set of rules by sending the conditional privacy-preserved protocol data unit (PDU) through NFC terminals. The proposal works well in decreasing the update cost and computation overhead by considering the merit of the physical characteristics of NFC.

Keywords

SE Key agreement NFC 

References

  1. 1.
    S.J. Moses, P.A.C. Angelin, Enhancing the privacy through pseudonymous authentication and conditional communication in vanets. Int. J. Eng. Sci. 2(7), 45–49 (2013)Google Scholar
  2. 2.
    G. Van Damme, K.K. Wouters, Practical Experiences with NFC Security on Mobile Phones Google Scholar
  3. 3.
    U.B. Trottmann, NFC—Possibilities and Risks. Matthias Wachs Seminar Future Internet WS2012 Google Scholar
  4. 4.
    H. Eun, H. Lee, J. Son, S. Kim, H. Oh, Conditional privacy preserving security protocol for NFC applications, in IEEE International Conference on Consumer Electronics (ICCE), (2012), pp. 380–381Google Scholar
  5. 5.
    J.-H. Lee, J. Chen, T. Ernst, Securing mobile network prefix provisioning for NEMO based vehicular networks. Math. Comput. Model. 55(1), 170–187 (2012)CrossRefGoogle Scholar
  6. 6.
    Juniper Research, NFC Mobile Payments and Retail Marketing—Business Models and Forecasts, (2012), pp. 2012–2017Google Scholar
  7. 7.
    J. Yu, W. Lee, D.-Z. Du, Reducing reader collision for mobile RFID. IEEE Trans. Consum. Electron. 57(2), 574–582 (2011)CrossRefGoogle Scholar
  8. 8.
    D. Huang, S. Misra, M. Verma, G. Xue, PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 736–746 (2011)CrossRefGoogle Scholar
  9. 9.
    R.J. Hwang, Y.K. Hsiao, Y.F. Liu, Secure communication scheme of VANET with privacy preserving, in Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS 2011), (2011), pp. 654–659Google Scholar
  10. 10.
    J.C.M. Teo, L.H. Ngoh, H. Guo, An anonymous dos-resistant password-based authentication, key exchange and pseudonym delivery protocol for vehicular networks, in Proceedings of the 2009 International Conference on Advanced Information Networking and Applications (AINA 2009), (2009), pp. 675–682Google Scholar
  11. 11.
    D. Eckhoff, C. Sommer, T. Gansen, R. German, F. Dressler, Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping, in Proceedings of the 2010 IEEE Vehicular Networking Conference (VNC 2010), (2010), pp. 174–181Google Scholar
  12. 12.
    Gartner, Market Insight: The Outlook on Mobile Payment. Market Analysis and Statistics (2010)Google Scholar
  13. 13.
    E. Haselsteiner, K. Breitful, Security in Near field Communication (NFC)—Strengths and Weaknesses. RFIDSec 2006 (2006)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of ECERaja College of Engineering and TechnologyMaduraiIndia
  2. 2.Embedded System TechnologiesRaja College of Engineering and TechnologyMaduraiIndia
  3. 3.Department of ECESt. Michael College of Engineering and TechnologyKalayar Koil, SivagangaiIndia

Personalised recommendations