Authors : Kai Fan , Hui Li , Wei Jiang , Chengsheng Xiao , Yintang Yang Authors Info & Claims
Article No.: 27, Pages 1 - 6 Published : 12 May 2017 Publication History 9 citation 287 Downloads Total Citations 9 Total Downloads 287 Last 12 Months 15 Last 6 weeks 0 Get Citation AlertsThis alert has been successfully added and will be sent to: You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below. Manage my AlertsWith the increasing popularity of the fintech, the e-commerce market has grown rapidly in last decade, and now the mobile devices are unprecedented popular and playing an ever-increasing role in the e-commerce field, especially the mobile payment. However, it is hard for online authentication technology based on traditional mode to maintain the healthy and stable development of mobile payment. Besides that, it can't meet the security demand of user's privacy or some sensitive information else. In this paper, we propose a secure mutual authentication protocol (SMAP) based on U2F for mobile payment. In this system, the asymmetric cryptosystem is used for mutual authentication between server and client to guarantee a reliable service, which is based on the architecture of U2F. It can resist disguise and dispose counterfeit user. Compared to the current existing modes, the proposed protocol strengthens the security of user's account information as well as individual privacy in whole transaction process with mobile payment. The practice proves that the proposed protocol is secure and convenient.
Liou J C, Bhashyam S. 2010. A feasible and cost effective two-factor authentication for online transactions. Proceedings of Software Engineering and Data Mining. 47--51.
Nseir S, Hirzallah N, Aqel M. 2013. A secure mobile payment system using QR code. Proceedings of Computer Science and Information Technology. 111 - 114.
Sahnoune Z, Meur E, Haddad G E, Sokoudjou R 2015. Watch your mobile payment: an empirical study of privacy disclosure. Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA. 1, 934--941.
Shao M, Jing F, Li Y. 2014. An empirical study on consumer acceptance of mobile payment based on the perceived risk and trust. Proceedings of Cyber-Enabled Distributed Computing and Knowledge Discovery. 312--317.
Jiang H. 2008. Study on mobile e-commerce security payment system. Proceedings of Electronic Commerce and Security. 754--757.
Wang C. 2012. The solution design using USB key for network security authentication. Proceedings of Fourth International Conference on Computational Intelligence and Communication Networks. 766--769.
Turk I, Cosar A. 2016. An open, NFC enabler independent Mobile payment and identification method: NFC feature box. Proceedings of A World of Wireless, Mobile and Multimedia Networks. 1--3.
Covic Z, Viktor U, Simon J, Dobrilovic D, Stojanov Z. 2016. Usage of QR codes in web based system for the electronic market research. Proceedings of Intelligent Systems and Informatics. 187--192.
Fan K, Ge N, Gong Y, et al. 2016. An ultra-lightweight RFID authentication scheme for mobile commerce. Peer-to-Peer Networking and Applications. 1--9.
Yu J W. 2011. The program design for the network security authentication based on the USB Key technology. Proceedings of Electronic and Mechanical Engineering and Information Technology. 2215--2218.
Cao Y, Pan X, Chen Y. 2015. SafePay: Protecting against credit card forgery with existing magnetic card readers. Proceedings of Communications and Network Security. 164--172.
M. Schmidt and N. Perlroth. 2012. Credit card data breach at barnes & noble stores. http://www.nytimes.com/2012/10/24/business/hackersget-credit-data-at-barnes-noble.html?r=1&adxnnl=1&adxnnlx=1363194210-ff1jKgh5cVLKuz8egxYwCmw
Madhoun N E, Guenane F, Pujolle G. 2016. An online security protocol for NFC payment: Formally analyzed by the scyther tool. Proceedings of Mobile & Secure Services. 1--7.
Choche A, Arabnia H R. 2011. A methodology to conceal QR codes for security applications. Proceedings of Information and Knowledge Engineering. 1--7.
Alshahrani A M, Walker S. 2013. NFC performance in mobile payment service compared with a SMS -based solution. Proceedings of Green Computing, Communication and Conservation of Energy. 282 - 286.
Lee Y S, Lee H J, Alasaarela E. 2013. Mutual authentication in wireless body sensor networks (WBSN) based on Physical Unclonable Function (PUF). Proceedings of Wireless Communications and Mobile Computing. 1314--1318.
Zhang C, Zhang W, Mu H. 2015. A mutual authentication security RFID protocol based on time stamp. Proceedings of First International Conference on Computational Intelligence Theory, Systems and Applications. 166--170.
Marktscheffel T, Gottschlich W, Popp W, et al. 2016. QR code based mutual authentication protocol for Internet of Things. Proceedings of Iot-Sos: Internet of Things Smart Objects and Services. 1--6.