2015 IEEE 4th International Conference on Cloud Networking (CloudNet) 2015
DOI: 10.1109/cloudnet.2015.7335332
|View full text |Cite
|
Sign up to set email alerts
|

A cloud-based secure authentication protocol for contactless-NFC payment

Abstract: Nowadays, NFC technology is used in contactless payment applications by offering the NFC payment functionality in credit/debit cards, smartphones and payment terminals. Thus, an NFC payment transaction is executed in a simple and practical way. EMV is the security protocol for both contact and contactless payment systems. However, during an EMV payment transaction, this standard does not ensure two main security constraints between a customer payment device and a payment terminal:(1) mutual authentication, (2)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(34 citation statements)
references
References 4 publications
0
29
0
Order By: Relevance
“…Furthermore, few of them have focused smart card-based secure protocol [44], [61], [62]. However, this study needs to improve the proposed solution towards developing a prototype as well as illustrate its efficiency in real time application.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, few of them have focused smart card-based secure protocol [44], [61], [62]. However, this study needs to improve the proposed solution towards developing a prototype as well as illustrate its efficiency in real time application.…”
Section: Resultsmentioning
confidence: 99%
“…Madhoun et al [44]brought out a novel security protocol for payments and transactions through NFC which resolved the security vulnerabilities which were identified in the EMV protocol. This is based on cloud infrastructure to ascertain the authenticity of payment terminals and offer confirmation to smartphones.…”
Section: Studies Related To Smart Cardmentioning
confidence: 99%
“…In fact, authors did not take into consideration the advantage of an NFC smartphone having both Wi-Fi and 4G interfaces that may be useful for direct communication with the server: the NFC smartphone connects firstly using NFC radio waves to the payment terminal, the latter then communicates with the server. In our previous studies [8] and [14], we have designed security protocols for NFC payment systems based on asymmetric key cryptography and allowing to overcome EMV security weaknesses in EMV card authentication phase. They ensure: mutual authentication, non-repudiation, confidentiality and integrity of banking data.…”
Section: Related Literaturementioning
confidence: 99%
“…The proposal [14] is intended to secure NFC mobile payment transactions between NFC smartphones and payment terminals. It is executed in the offline mode where the payment terminal is not connected to the issuing bank and is responsible for the execution of the security procedure authenticating an NFC smartphone.…”
Section: Related Literaturementioning
confidence: 99%
See 1 more Smart Citation