Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 4796373, 9 pages
https://doi.org/10.1155/2017/4796373
Research Article

NFC Secure Payment and Verification Scheme with CS E-Ticket

1State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an, China
2Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
3Key Laboratory of Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi’an, China

Correspondence should be addressed to Kai Fan; nc.ude.naidix.liam@nafk

Received 29 March 2017; Accepted 5 June 2017; Published 10 July 2017

Academic Editor: Qing Yang

Copyright © 2017 Kai Fan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Ning and B. Wang, RFID major projects and the state internet of things, Mechanical Industry Press, 2008.
  2. V. Odelu, A. K. Das, and A. Goswami, “SEAP: secure and efficient authentication protocol for NFC applications using pseudonyms,” IEEE Transactions on Consumer Electronics, vol. 62, no. 1, pp. 30–38, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Badra and R. B. Badra, “A lightweight security protocol for NFC-based mobile payments,” in Proceedings of the 7th International Conference on Ambient Systems, Networks and Technologies, ANT 2016 and the 6th International Conference on Sustainable Energy Information Technology, SEIT 2016, pp. 705–711, May 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Fan, Y. Gong, C. Liang, H. Li, and Y. Yang, “Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G,” Security & Communication Networks, pp. 1–14, 2015. View at Google Scholar
  5. K. Fan, J. Li, H. Li, X. Liang, X. S. Shen, and Y. Yang, “RSEL: revocable secure efficient lightweight RFID authentication scheme,” Concurrency and Computation: Practice and Experience, vol. 26, no. 5, pp. 1084–1096, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. E. Haselsteiner, “Security in Near Field Communication (NFC),” in Proceedings of the Workshop on Rfid Security Malaga, 2006.
  7. M. Pasquet, J. Reynaud, and C. Rosenberger, “Secure payment with NFC mobile phone in the smart touch project,” in Proceedings of the International Symposium on Collaborative Technologies and Systems (CTS '08), pp. 121–126, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Su, Q. Xu, and Q. Qi, “Big data in mobile social networks: a QoE-oriented framework,” IEEE Network, vol. 30, no. 1, pp. 2–57, 2016. View at Publisher · View at Google Scholar
  9. Q. Xu, Z. Su, B. Han, D. Fang, Z. Xu, and X. Gan, “Analytical model with a novel selfishness division of mobile nodes to participate cooperation,” Peer-to-Peer Networking and Applications, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. S. Lee, E. Kim, and M. S. Jung, “A NFC based authentication method for defense of the man in the middle attack,” in Proceedings of the 3rd International Conference on Computer Science and Information Technology, pp. 10–14, 2013.
  11. U. B. Ceipidor, C. M. Medaglia, A. Marino, S. Sposato, and A. Moroni, “KerNeeS: a protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions,” in Proceedings of the 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012, pp. 115–120, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. U. B. Ceipidor, C. M. Medaglia, A. Marino et al., “Mobile ticketing with NFC management for transport companies problems and solutions,” in Proceedings of the 2013 5th International Workshop on Near Field Communication, NFC 2013, pp. 1–6, February 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Kayser, B. Bewernick H, and R. Hurlemann, “A secure offline key generation with protection against key compromise. Physical review. B,” Condensed matter, vol. 51, no. 4, pp. 2550–2555, 2009. View at Google Scholar
  14. J. Hoffstein, J. Pipher, and J. H. Silverman, NTRU. A Ring-Based Public Key Cryptosystem Algorithmic Number Theory, Springer, Berlin, Germany, 1998. View at Publisher · View at Google Scholar · View at MathSciNet
  15. J. H. Cheon, J. Jeong, and C. Lee, “An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero,” LMS Journal of Computation and Mathematics, vol. 19, no. A, pp. 255–266, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  16. C. van Vredendaal, “Reduced memory meet-in-the-middle attack against the NTRU private key,” LMS Journal of Computation and Mathematics, vol. 19, no. A, pp. 43–57, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  17. W. J. Wu and W. H. Lee, “An NFC E-ticket system with offline authentication,” in Proceedings of the 9th International Conference on Information, Communications and Signal Processing, ICICS 2013, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Thammarat, R. Chokngamwong, C. Techapanupreeda, and S. Kungpisdan, “A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys,” in Proceedings of the International Conference on Information Networking (ICOIN '15), pp. 133–138, Siem Reap, Cambodia, January 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. K. Fan, P. Song, Z. Du et al., “NFC secure payment and verification scheme for mobile payment,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9798, pp. 116–125, 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Cohen and M. Dam, “Logical omniscience in the semantics of BAN Logic,” in Proceedings of the Foundations of Computer Security Workshop, pp. 121–132, 2003.
  21. A. Qiao-Mei M, “The design of low-cost RFID protocols and BAN formal analysis,” Journal of Baoji University of Arts Sciences, 2016. View at Google Scholar