Using Mobile Device to Design A Secure Transaction

被引:1
|
作者
Chen, Chin-Ling [1 ]
Jan, Jinn-Ke [2 ]
Chien, Chih-Feng [3 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 40227, Taiwan
[3] Natl Chung Hsing Univ, Inst Networking & Multimedia, Taichung 40227, Taiwan
关键词
RFID; security; privacy; attack; mutual authentication;
D O I
10.1109/CISIS.2010.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, RFID (Radio-Frequency IDentification) system has widely used owing to its convenient and efficiency in many applications. In this paper, we propose a novel scheme that the market membership can use the mobile reader to query products information and make a secure transaction through cash register. There also can use the accumulated digital coupon to redeem prizes with the server. Moreover, in order to achieve the mutual authentication, we involve the fingerprint biometrics, related cryptology and hash function mechanism to ensure the security of the transmission messages. Our proposed scheme also can resist several attacks and ensure a secure transaction.
引用
收藏
页码:833 / 838
页数:6
相关论文
共 50 条
  • [1] Design on mobile secure electronic transaction protocol with component based development
    Kim, HK
    Kim, TH
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 461 - 470
  • [2] NOTARY: A Device for Secure Transaction Approval
    Athalye, Anish
    Belay, Adam
    Kaashoek, M. Frans
    Morris, Robert
    Zeldovich, Nickolai
    [J]. PROCEEDINGS OF THE TWENTY-SEVENTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '19), 2019, : 97 - 113
  • [3] Notary: A DEVICE FOR SECURE TRANSACTION APPROVAL
    Athalye, Anish
    Belay, Adam
    Kaashoek, M. Frans
    Morris, Robert
    Zeldovich, Nickolai
    [J]. GETMOBILE-MOBILE COMPUTING & COMMUNICATIONS REVIEW, 2020, 24 (02) : 34 - 38
  • [4] Neuroradiology Using Secure Mobile Device Review
    Randhawa, Privia A.
    Morrish, William
    Lysack, John T.
    Hu, William
    Goyal, Mayank
    Hill, Michael D.
    [J]. CANADIAN JOURNAL OF NEUROLOGICAL SCIENCES, 2016, 43 (04) : 529 - 532
  • [5] Authentication and Transaction Verification Using QR Codes with a Mobile Device
    Chow, Yang-Wai
    Susilo, Willy
    Yang, Guomin
    Au, Man Ho
    Wang, Cong
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 437 - 451
  • [6] Reliable OSPM Schema for Secure Transaction using Mobile Agent in Micropayment System
    Kiran, Chitra N.
    Kumar, G. Narendra
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [7] QR-TAN: Secure Mobile Transaction Authentication
    Starnberger, Guenther
    Froihofer, Lorenz
    Goeschka, Karl M.
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 578 - 583
  • [8] Secure Sharing of Mobile Device Data using Public Cloud
    Alam, Md Mozammil
    Hati, Sourav
    De, Debashis
    Chattopadhyay, Samiran
    [J]. 2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 149 - 154
  • [9] Design issues in "a secure and efficient key agreement framework for critical energy infrastructure using mobile device"
    Cao, Zhengjun
    [J]. TELECOMMUNICATION SYSTEMS, 2024, 86 (03) : 393 - 397
  • [10] Secure Bitcoin Transaction and IoT Device usage in Decentralized Application
    Swamy, Sanathkumar A.
    Jayapandian, N.
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 271 - 274