A secure IoT-based micro-payment protocol for wearable devices

被引:0
|
作者
Sriramulu Bojjagani
P. V. Venkateswara Rao
Dinesh Reddy Vemula
B Ramachandra Reddy
T. Jaya Lakshmi
机构
[1] School of Engineering and Applied Sciences,Department of Computer Science & Engineering
[2] Madanapalle Institute of Technology & Science,Department of Computer Science & Engineering
关键词
Internet of things (IoT); Wearable device; Mobile payments; ECIES; BAN logic; Scyther; Tamarin;
D O I
暂无
中图分类号
学科分类号
摘要
Wearable devices are parts of the essential cost of goods sold (COGS) in the wheel of the Internet of things (IoT), contributing to a potential impact in the finance and banking sectors. There is a need for lightweight cryptography mechanisms for IoT devices because these are resource constraints. This paper introduces a novel approach to an IoT-based micro-payment protocol in a wearable devices environment. This payment model uses an “elliptic curve integrated encryption scheme (ECIES)” to encrypt and decrypt the communicating messages between various entities. The proposed protocol allows the customer to buy the goods using a wearable device and send the mobile application’s confidential payment information. The application creates a secure session between the customer, banks and merchant. The static security analysis and informal security methods indicate that the proposed protocol is withstanding the various security vulnerabilities involved in mobile payments. For logical verification of the correctness of security properties using the formal way of “Burrows-Abadi-Needham (BAN)” logic confirms the proposed protocol’s accuracy. The practical simulation and validation using the Scyther and Tamarin tool ensure that the absence of security attacks of our proposed framework. Finally, the performance analysis based on cryptography features and computational overhead of related approaches specify that the proposed micro-payment protocol for wearable devices is secure and efficient.
引用
收藏
页码:1163 / 1188
页数:25
相关论文
共 50 条
  • [1] A secure IoT-based micro-payment protocol for wearable devices
    Bojjagani, Sriramulu
    Rao, P. V. Venkateswara
    Vemula, Dinesh Reddy
    Reddy, B. Ramachandra
    Lakshmi, T. Jaya
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (02) : 1163 - 1188
  • [2] An efficient and secure micro-payment protocol for mobile commerce
    Chen, Yu-Jen
    Hsieh, Wen-Chuan
    Chen, Wei
    Meng, Zih-Yuan
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 5, 2005, : 7 - 12
  • [3] Micro-payment Protocol Based on Multiple Hash Chains
    Wang, Hong
    Ma, Jialin
    Sun, Jing
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 71 - 74
  • [4] An efficient, secure and delegable micro-payment system
    Patil, V
    Shyamasundar, RK
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 394 - 404
  • [6] An Efficient Micro-payment Protocol Based on a Single Hash Chain
    Li, Guojuan
    Wang, Haibin
    Chai, Xuguang
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1167 - 1171
  • [7] The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications
    Bojjagani, Sriramulu
    Seelam, Nagarjuna Reddy
    Sharma, Neeraj Kumar
    Uyyala, Ravi
    Akuri, Sree Rama Chandra Murthy
    Maurya, Anup Kumar
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (09)
  • [8] Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
    Theera-Umpon, Nipon
    Han, Kun-Hee
    Bae, Woo-Sik
    Lee, Sanghyuk
    Van Huy Pham
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 24 (09) : 1258 - 1270
  • [9] A new micro-payment protocol based on P2P networks
    Zou, J
    Si, TG
    Huang, LS
    Dai, YQ
    ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 449 - 455
  • [10] e-coupons:: An efficient, secure and delegable micro-payment system
    Patil, V
    Shyamasundar, RK
    INFORMATION SYSTEMS FRONTIERS, 2005, 7 (4-5) : 371 - 389