Attacks and Solutions of an Authenticated Key Agreement Protocol Based on NFC for Mobile Payment

Chien‐Ming Chen, W. Fang, King-Hang Wang, Tsu-Yang Wu
{"title":"Attacks and Solutions of an Authenticated Key Agreement Protocol Based on NFC for Mobile Payment","authors":"Chien‐Ming Chen, W. Fang, King-Hang Wang, Tsu-Yang Wu","doi":"10.17706/ijcce.2017.6.3.173-180","DOIUrl":null,"url":null,"abstract":"The popularization of the word “Fin-tech” thanks to many non-technical individuals being amazed by the unconventional way of payments, such as mobile payment over NFC. Undoubtedly speaking security/privacy is considered as the most important factor when a new Fin-tech is introduced; at least psychologically, it is. Recently Seo et al. presented an authenticated key agreement protocol for mobile payment over NFC. The protocol intended to provide secure pairing over untrusted devices with client's anonymity and forward secrecy. Unfortunately, in this paper we found that their protocol is indeed very insecure when an attacker has different levels of network controls. We presented the man-in-the-middle attacks and the replay attacks against this protocol. Under these attacks the attackers can successfully impersonate an anonymous client or can tap the communication between two legitimate clients without being detected by anyone. Then we suggested some improvements, with adequate analysis, to avoid these problems.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17706/ijcce.2017.6.3.173-180","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The popularization of the word “Fin-tech” thanks to many non-technical individuals being amazed by the unconventional way of payments, such as mobile payment over NFC. Undoubtedly speaking security/privacy is considered as the most important factor when a new Fin-tech is introduced; at least psychologically, it is. Recently Seo et al. presented an authenticated key agreement protocol for mobile payment over NFC. The protocol intended to provide secure pairing over untrusted devices with client's anonymity and forward secrecy. Unfortunately, in this paper we found that their protocol is indeed very insecure when an attacker has different levels of network controls. We presented the man-in-the-middle attacks and the replay attacks against this protocol. Under these attacks the attackers can successfully impersonate an anonymous client or can tap the communication between two legitimate clients without being detected by anyone. Then we suggested some improvements, with adequate analysis, to avoid these problems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于NFC的移动支付认证密钥协议的攻击及解决方案
“金融科技”一词的普及得益于许多非技术人士对非常规支付方式的惊叹,比如通过近场通信(NFC)进行的移动支付。毫无疑问,在引入新的金融技术时,安全/隐私被认为是最重要的因素;至少在心理上是这样的。最近Seo等人提出了一种NFC移动支付的认证密钥协议。该协议旨在为不受信任的设备提供安全的配对,并具有客户端的匿名性和前向保密性。不幸的是,在本文中我们发现,当攻击者拥有不同级别的网络控制时,他们的协议确实非常不安全。我们介绍了针对该协议的中间人攻击和重放攻击。在这些攻击中,攻击者可以成功地冒充一个匿名客户端,或者利用两个合法客户端之间的通信而不被任何人发现。然后我们提出了一些改进建议,并进行了充分的分析,以避免这些问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Application Design to Release Stress A Survey on Pruning Algorithm Based on Optimized Depth Neural Network Analysis of Communication Characteristics of Projectile-Carried Communication Jamming Object Deep LSTM for Generating Brand Personalities Using Social Media: A Case Study from Higher Education Institutions The Key Technology of High-Definition Maps Distribution Based on Edge Computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1