Skip to main content

A Novel Approach Privacy Security Protocol Based SUPM Method in Near Field Communication Technology

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

Abstract

For the past few years, so many mobile terminals have been released into market with NFC which is abbreviated as near-field communication. The NFC together with smart devices has made to improve the effective utility range of NFC. Specifically, NFC electronic payment is expected to take the place of credit cards in e-payment. For this, it is essential to direct the attention of the security issues in NFC. Presently, the security standards in NFC make use of user’s public key at a fixed value in key agreement process. The message’s relevancy occurs at the public key of NFC. NFC is used for gathering the message based on the malicious attacker. This leads to the infringement of privacy of user. The planned work presents conditional privacy protection method based on pseudonyms to overcome the aforementioned problems. The users can communicate with other parties based on some set of rules by sending the conditional privacy-preserved protocol data unit (PDU) through NFC terminals. The proposal works well in decreasing the update cost and computation overhead by considering the merit of the physical characteristics of NFC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S.J. Moses, P.A.C. Angelin, Enhancing the privacy through pseudonymous authentication and conditional communication in vanets. Int. J. Eng. Sci. 2(7), 45–49 (2013)

    Google Scholar 

  2. G. Van Damme, K.K. Wouters, Practical Experiences with NFC Security on Mobile Phones

    Google Scholar 

  3. U.B. Trottmann, NFC—Possibilities and Risks. Matthias Wachs Seminar Future Internet WS2012

    Google Scholar 

  4. H. Eun, H. Lee, J. Son, S. Kim, H. Oh, Conditional privacy preserving security protocol for NFC applications, in IEEE International Conference on Consumer Electronics (ICCE), (2012), pp. 380–381

    Google Scholar 

  5. J.-H. Lee, J. Chen, T. Ernst, Securing mobile network prefix provisioning for NEMO based vehicular networks. Math. Comput. Model. 55(1), 170–187 (2012)

    Article  Google Scholar 

  6. Juniper Research, NFC Mobile Payments and Retail Marketing—Business Models and Forecasts, (2012), pp. 2012–2017

    Google Scholar 

  7. J. Yu, W. Lee, D.-Z. Du, Reducing reader collision for mobile RFID. IEEE Trans. Consum. Electron. 57(2), 574–582 (2011)

    Article  Google Scholar 

  8. D. Huang, S. Misra, M. Verma, G. Xue, PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 736–746 (2011)

    Article  Google Scholar 

  9. R.J. Hwang, Y.K. Hsiao, Y.F. Liu, Secure communication scheme of VANET with privacy preserving, in Proceedings of the 2011 IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS 2011), (2011), pp. 654–659

    Google Scholar 

  10. J.C.M. Teo, L.H. Ngoh, H. Guo, An anonymous dos-resistant password-based authentication, key exchange and pseudonym delivery protocol for vehicular networks, in Proceedings of the 2009 International Conference on Advanced Information Networking and Applications (AINA 2009), (2009), pp. 675–682

    Google Scholar 

  11. D. Eckhoff, C. Sommer, T. Gansen, R. German, F. Dressler, Strong and affordable location privacy in VANETs: Identity diffusion using time-slots and swapping, in Proceedings of the 2010 IEEE Vehicular Networking Conference (VNC 2010), (2010), pp. 174–181

    Google Scholar 

  12. Gartner, Market Insight: The Outlook on Mobile Payment. Market Analysis and Statistics (2010)

    Google Scholar 

  13. E. Haselsteiner, K. Breitful, Security in Near field Communication (NFC)—Strengths and Weaknesses. RFIDSec 2006 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Kannadhasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Kannadhasan, S., Isaivani, M., Karthikeyan, G. (2015). A Novel Approach Privacy Security Protocol Based SUPM Method in Near Field Communication Technology . In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_68

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_68

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics