2022
DOI: 10.3390/s22051989
|View full text |Cite
|
Sign up to set email alerts
|

Contactless Credit Cards Payment Fraud Protection by Ambient Authentication

Abstract: In recent years, improvements to the computational ability of mobile phones and support for near-field-communication have enabled transactions to be performed by using mobile phones to emulate a credit card or by using quick response codes. Thus, users need not carry credit cards but can simply use their mobile phones. However, the Europay MasterCard Visa (EMV) protocol is associated with a number of security concerns. In contactless transactions, attackers can make purchases by launching a relay attack from a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 34 publications
(43 reference statements)
0
1
0
Order By: Relevance
“…Additionally, the pre-play attack occurs when the attacker collects sensitive data like PIN from the contactless card using a compromised POS terminal and then makes a fraudulent (unauthorized) transaction using the collected data (Lan, Xu, Zhang, Chen, & Luo, 2023). In contrast, in a mafia attack (aka mafia fraud), the attacker uses a malicious reader to conduct a contactless payment (Yang, Luo, Vijayalakshmi, & Shalinie, 2022). At the same time, in a cloning (skimming) attack, the attacker copies the contactless card information, like the card number stored in the chip, into another device (El Madhoun, Bertin, & Pujolle, 2018).…”
Section: Threats and Security Concerns In Contactless Cardsmentioning
confidence: 99%
“…Additionally, the pre-play attack occurs when the attacker collects sensitive data like PIN from the contactless card using a compromised POS terminal and then makes a fraudulent (unauthorized) transaction using the collected data (Lan, Xu, Zhang, Chen, & Luo, 2023). In contrast, in a mafia attack (aka mafia fraud), the attacker uses a malicious reader to conduct a contactless payment (Yang, Luo, Vijayalakshmi, & Shalinie, 2022). At the same time, in a cloning (skimming) attack, the attacker copies the contactless card information, like the card number stored in the chip, into another device (El Madhoun, Bertin, & Pujolle, 2018).…”
Section: Threats and Security Concerns In Contactless Cardsmentioning
confidence: 99%
“…Trust is another issue that needs to be addressed in terms of credit card concerns [4]. Payment systems are the engine that drives e-commerce business, and a substantial amount of trust and security in cutting-edge technology is necessary [5]. Furthermore, it is not unusual for mobile users to switch to new solutions, adjust their payment routines, and encounter other types of security challenges [6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Radio Frequency Identification High Frequency (RFID HF): access control, electronic tickets, tolls, micropayments [7,8], and loyalty programs.…”
mentioning
confidence: 99%