Main Article Content
- Nowadays, mobile phones are equipped with enhanced short-range communication functionality called Near Field Communication (or NFC for short). NFC requires no pairing between devices but suitable for small amount of data in very limited area. A number of researchers proposed authentication techniques for NFC communications but they still lack of necessary authentication, especially mutual authentication and security properties. This paper introduces a new authentication protocols for NFC communication that provides mutual authentication between devices. Mutual authentication is a property of security that prevents replay and man-in-the-middle attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to enhance security and make our protocol lightweight.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
I/we certify that I/we have participated sufficiently in the intellectual content, conception and design of this work or the analysis and interpretation of the data (when applicable), as well as the writing of the manuscript, to take public responsibility for it and have agreed to have my/our name listed as a contributor. I/we believe the manuscript represents valid work. Neither this manuscript nor one with substantially similar content under my/our authorship has been published or is being considered for publication elsewhere, except as described in the covering letter. I/we certify that all the data collected during the study is presented in this manuscript and no data from the study has been or will be published separately. I/we attest that, if requested by the editors, I/we will provide the data/information or will cooperate fully in obtaining and providing the data/information on which the manuscript is based, for examination by the editors or their assignees. Financial interests, direct or indirect, that exist or may be perceived to exist for individual contributors in connection with the content of this paper have been disclosed in the cover letter. Sources of outside support of the project are named in the cover letter.
I/We hereby transfer(s), assign(s), or otherwise convey(s) all copyright ownership, including any and all rights incidental thereto, exclusively to the Journal, in the event that such work is published by the Journal. The Journal shall own the work, including 1) copyright; 2) the right to grant permission to republish the article in whole or in part, with or without fee; 3) the right to produce preprints or reprints and translate into languages other than English for sale or free distribution; and 4) the right to republish the work in a collection of articles in any other mechanical or electronic format.
We give the rights to the corresponding author to make necessary changes as per the request of the journal, do the rest of the correspondence on our behalf and he/she will act as the guarantor for the manuscript on our behalf.
All persons who have made substantial contributions to the work reported in the manuscript, but who are not contributors, are named in the Acknowledgment and have given me/us their written permission to be named. If I/we do not include an Acknowledgment that means I/we have not received substantial contributions from non-contributors and no contributor has been omitted.
2. O. Dandash et al., “Fraudulent Internet Banking Payments Prevention using Dynamic Key, Journal of Networks”, Vol.3(1), Academy Publisher, pp. 25-34, 2008.
3. S. Kungpisdan, P.D. Le, and B. Srinivasan, “A Limited-Used Key Generation Scheme for Internet Transactions”, Lecture Notes in Computer Science, Vol. 3325, 2005.
4. Li, Y. and Zhang, X., “A Security-enhanced One-time Payment Scheme for Credit Card”. Proc. of the Int’l Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications, 2004.
5. S. Kungpisdan, B. Srinivasan, and P.D. Le, “Lightweight Mobile Credit-card Payment Protocol”, Lecture Notes in Computer Science, Vol. 2904, pp. 295-308, 2003.
6. A. D. Rubin and R.N. Wright, “Off-line Generation of Limited-Use Credit Card Numbers”, Lecture Notes in Computer Science, Vol. 2339, pp. 196, 2002
7. L. Yun-Seok, K. Eun and J. Min-Soo, "A NFC based Authentication method for defense of the Man in the Middle Attack", 3rd International Conference on Computer Science and Information Technology (ICCSIT'2013) January 4-5, Bali (Indonesia), 2013.
8. ECMA, “Near Field Communication Whitepaper”, ECMA International, 2004.
9. Near Field Communication. (2012) [Online]. Available:http://en.wikipedia.org/wiki/Near_field_communication.
10. Security Risks of Near Field Communication, "http://www.nearfieldcommunication.org/NFC-security-risks.html".
11. U.B. Ceipidor, C.M. Medaglia, S. Sposato and A. Moroni,"A protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions", Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on Digital Object Identifier: 10.1109/ISCISC.2012.6408203 Publication , page 115 – 120, 2012.
12. T. Sunil K., B. Rabin, and M. Sangman,"NFC and Its Application to Mobile Payment: Overview and Comparison", pp. 203-206, 26-28 June 2012.
13. E. Haselsteiner and K. Breitfu, “Security in near field communication (NFC),” Proc. of Workshop on RFID security, 2006.
14. C. Mulliner, “Vulnerability analysis and attacks on NFC-enabled mobile phones,” Proc. of International Conference on vailability, Reliability and Security (ARES ’09), pp. 695-700, Mar. 2009.
15. K. Martin, "Near Field Communication A survey of safety and security measures", July 17, 2011.
16. M. Gerald, C. Kantner, and T. Grechenig, " Near Field Communication (Chapter 15)," Secure Smart Embedded Devices, Platforms and Applications. Springer New York, pp. 351-367, 2014.
17. V.di Credico, S. Orcioni, and M. Conti, "Near Field Communication Technology for AAL," Ambient Assisted Living: Italian Forum 2013. Springer International Publishing, pp. 33-42, 2014.
18. C.N. Ashraf, "NFC-Vulnerabilities and defense," Information Assurance and Cyber Security (CIACS), 2014 Conference on. IEEE, pp. 35-38, 2014.
19. H. Mohamad, F. Peyrard, and E. Conchon, "An improvement of NFC-SEC with signed exchanges for an e-prescription-based application," Mobile Computing, Applications, and Services. Springer International Publishing, pp. 166-183, 2014.
20. D. Prabakaran, M. I. Kumar, "Near Field Communication Based Security Through Condition Privacy Sequence Methodology," International Journal of Computer Network and Security (IJCNS), Vol 6. No.1, pp. 22-28, Jan-March 2014.
21. S. Park and I. Lee, "Efficient mCoupon Authentication Scheme for Smart Poster Environments based on Low-cost NFC," International Journal of Security and Its Applications Vol.7, No.5, pp.131-138, 2013.
22. N. Dakota, M. Qiao, and A. Carpenter, "Security of the near field communication protocol: an overview," Journal of Computing Sciences in Colleges 29.2 (2013), pp. 94-104, 2013.20. N. Dakota, M. Qiao, and A. Carpenter, "Security of the near field communication protocol: an overview," Journal of Computing Sciences in Colleges 29.2 (2013), pp. 94-104, 2013.