Title :
KerNeeS: A protocol for mutual authentication between NFC phones and POS terminals for secure payment transactions
Author :
Ceipidor, U.B. ; Medaglia, C.M. ; Marino, Armando ; Sposato, S. ; Moroni, Anna
Author_Institution :
CATTID, Sapienza Univ. of Rome, Rome, Italy
Abstract :
The aim of this paper is to propose a solution for a potential vulnerability in mobile proximity payment. The mobile proximity payment is the evolution of the card payment whose reference standard is EMV (Europay, MasterCard and VISA). A mobile proximity payment transaction is performed via radio waves so there is the possibility to intercept the communication with the point-of-sale and also to activate the payer device, in a range of 10 cm. The EMV protocol assumes that within a range of 10 cm card fraud is hard to perform, moreover IC card capable point of sale are considered safe a priori, while the card must authenticate itself. This allows a leak of card information. In this paper we describe a possible solution to this problem, adding a safe level to the EMV protocol in the case of mobile proximity payment transactions. Our solution is a Needham-Schroeder based protocol, that guarantees authentication and confidentiality between the entities involved in the payment.
Keywords :
data privacy; electronic money; fraud; mobile radio; near-field communication; point of sale systems; protocols; security of data; smart cards; telecommunication security; EMV protocol; EMV standard; Europay; IC card capable point of sale; KerNeeS protocol; MasterCard; NFC phone; Needham-Schroeder based protocol; POS terminal; VISA; card authentication; card fraud; card information leakage; communication interception; confidentiality; mobile proximity payment transaction; mobile proximity payment vulnerability; mutual authentication; payer device activation; point-of-sale; radio waves; secure payment transaction; Authentication; Cryptography; Mobile communication; Protocols; Servers; Smart cards; Standards; EMV; NFC; contactless; mobile payment; mutual authentication;
Conference_Titel :
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location :
Tabriz
Print_ISBN :
978-1-4673-2387-1
DOI :
10.1109/ISCISC.2012.6408203