2022
DOI: 10.32604/iasc.2022.022065
|View full text |Cite
|
Sign up to set email alerts
|

Fully Authentication Services Scheme for NFC Mobile Payment Systems

Abstract: One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Researchers from home and abroad have given the definition of mobile payment, which is as follows: a mobile payment is a form of payment transaction processing over mobile communication techniques in which the payer initializes, authenticates, and completes payment by mobile devices [31]. Thus far, there have been some different proposed mobile payment protocols, such as [32,33]. These protocols are based on symmetric cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers from home and abroad have given the definition of mobile payment, which is as follows: a mobile payment is a form of payment transaction processing over mobile communication techniques in which the payer initializes, authenticates, and completes payment by mobile devices [31]. Thus far, there have been some different proposed mobile payment protocols, such as [32,33]. These protocols are based on symmetric cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Since the development of openness and extensive interconnection in IIoT, security has become a global challenge in M2M communication. Although authentication is the cornerstone of providing adequate protection, and numerous schemes have been proposed to ensure security in traditional IT networks [2][3][4][5][6][7][8][9][10], these schemes cannot be readily applied for IIoT. Because in IIoT, many resourceconstrained devices are limited to computation power and communication bandwidth, such as Radio Frequency Identification (RFID) chips, wireless sensors, and so on.…”
Section: Introductionmentioning
confidence: 99%