Skip to main content
Erschienen in: Wireless Personal Communications 4/2020

24.01.2020

BLE-Based Authentication Protocol for Micropayment Using Wearable Device

verfasst von: Nai-Wei Lo, Alexander Yohan

Erschienen in: Wireless Personal Communications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Rapid growth of global wearable device market within the last 5 years shows the tremendous interest of modern society on environmental sensing technology to develop intelligent and convenient services for human beings. Wearable devices like smart watch and intelligent eyeglasses have been successfully deployed or associated to various application domains such as gamification of healthcare, real time location identification, mobile online games and health indicator monitoring. The idea of incorporating micropayment capability within wearable device has become a hot issue along with the market growth of wearable devices. Security strength, performance efficiency and deployment cost are the three major factors to develop a user-friendly wearable-device-oriented micropayment environment. As almost all wearable devices with screen display including smart watches and smartphones manufactured in recent years are equipped with Bluetooth communication module as a default deployment model; a Bluetooth-based authentication frontend is a reasonable choice for a user-friendly wearable-device-oriented micropayment system in terms of the reduction of system deployment cost. In this paper, a robust and lightweight BLE-based authentication protocol to support wearable-device-oriented micropayment system is proposed. The proposed authentication protocol generates unique and secure session key for each communicating session utilizing Physical Unclonable Function. Security analysis is conducted to evaluate security strength of the proposed protocol. Performance comparison among existing protocols shows that the proposed protocol is superior to other solutions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
7.
Zurück zum Zitat Barnickel, J., Wang, J., & Meyer, U. (2012). Implementing an attack on bluetooth 2.1+ secure simple pairing in passkey entry mode. In Proceedings—2012 IEEE 11th international conference on trust, security and privacy in computing and communications, pp. 17–24. https://doi.org/10.1109/TrustCom.2012.182. Barnickel, J., Wang, J., & Meyer, U. (2012). Implementing an attack on bluetooth 2.1+ secure simple pairing in passkey entry mode. In Proceedings—2012 IEEE 11th international conference on trust, security and privacy in computing and communications, pp. 17–24. https://​doi.​org/​10.​1109/​TrustCom.​2012.​182.
8.
Zurück zum Zitat Beckmann, N., & Potkonjak, M. (2009). Hardware-based public-key cryptography with public physically unclonable functions. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), pp. 206–220. https://doi.org/10.1007/978-3-642-04431-1_15. Beckmann, N., & Potkonjak, M. (2009). Hardware-based public-key cryptography with public physically unclonable functions. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), pp. 206–220. https://​doi.​org/​10.​1007/​978-3-642-04431-1_​15.
10.
11.
Zurück zum Zitat Diallo, A. S., Al-Khateeb, W. F. M., Olanrewaju, R. F., & Sado, F. (2014). A secure authentication scheme for bluetooth connection. In Proceedings—2014 international conference on computer and communication engineering, pp. 60–63. https://doi.org/10.1109/ICCCE.2014.29. Diallo, A. S., Al-Khateeb, W. F. M., Olanrewaju, R. F., & Sado, F. (2014). A secure authentication scheme for bluetooth connection. In Proceedings—2014 international conference on computer and communication engineering, pp. 60–63. https://​doi.​org/​10.​1109/​ICCCE.​2014.​29.
12.
Zurück zum Zitat Dittmar, A., Meffre, R., De Oliveira, F., Gehin, C., & Delhomme, G. (2005). Wearable medical devices using textile and flexible technologies for ambulatory monitoring. In Proceedings—2005 IEEE engineering in medicine and biology 27th annual conference, pp. 7161–7164. https://doi.org/10.1109/IEMBS.2005.1616159. Dittmar, A., Meffre, R., De Oliveira, F., Gehin, C., & Delhomme, G. (2005). Wearable medical devices using textile and flexible technologies for ambulatory monitoring. In Proceedings—2005 IEEE engineering in medicine and biology 27th annual conference, pp. 7161–7164. https://​doi.​org/​10.​1109/​IEMBS.​2005.​1616159.
13.
Zurück zum Zitat Fan, C. I., Liang, Y. K., & Wu, C. N. (2011). An anonymous fair offline micropayment scheme. In International conference on information society (i-Society 2011), pp. 377–381. Fan, C. I., Liang, Y. K., & Wu, C. N. (2011). An anonymous fair offline micropayment scheme. In International conference on information society (i-Society 2011), pp. 377–381.
14.
Zurück zum Zitat Fan, K., Li, H., Jiang, W., Xiao, C., & Yang, Y. (2018). Secure authentication protocol for mobile payment. Tsinghua Science and Technology, 23, 610–620.CrossRef Fan, K., Li, H., Jiang, W., Xiao, C., & Yang, Y. (2018). Secure authentication protocol for mobile payment. Tsinghua Science and Technology, 23, 610–620.CrossRef
20.
Zurück zum Zitat Khan, M. F. F., & Sakamura, K. (2015). Tamper-resistant security for cyber-physical systems with eTRON architecture. In Proceedings—2015 IEEE international conference on data science and data intensive systems, pp. 196–203. https://doi.org/10.1109/DSDIS.2015.98. Khan, M. F. F., & Sakamura, K. (2015). Tamper-resistant security for cyber-physical systems with eTRON architecture. In Proceedings—2015 IEEE international conference on data science and data intensive systems, pp. 196–203. https://​doi.​org/​10.​1109/​DSDIS.​2015.​98.
26.
Zurück zum Zitat Me, G., & Strangio, M. A. (2005). EC-PAY: An efficient and secure ECC-based wireless local payment scheme. In Proceedings—3rd international conference on information technology and applications (ICITA 2005), vol. II, pp. 442–447. https://doi.org/10.1109/ICITA.2005.122. Me, G., & Strangio, M. A. (2005). EC-PAY: An efficient and secure ECC-based wireless local payment scheme. In Proceedings—3rd international conference on information technology and applications (ICITA 2005), vol. II, pp. 442–447. https://​doi.​org/​10.​1109/​ICITA.​2005.​122.
28.
Zurück zum Zitat Nashwan, S. (2017). Secure authentication protocol for NFC mobile payment systems. International Journal of Computer Science and Network Security, 17(8), 256–263. Nashwan, S. (2017). Secure authentication protocol for NFC mobile payment systems. International Journal of Computer Science and Network Security, 17(8), 256–263.
30.
Zurück zum Zitat Pereira, G. C. C. F., Alves, R. C. A., da Silva, F. L., Azevedo, R. M., Albertini, B. C., & Margi, C. B. (2017). Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Security and Communication Networks, 2017, 1–16. https://doi.org/10.1155/2017/2046735.CrossRef Pereira, G. C. C. F., Alves, R. C. A., da Silva, F. L., Azevedo, R. M., Albertini, B. C., & Margi, C. B. (2017). Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Security and Communication Networks, 2017, 1–16. https://​doi.​org/​10.​1155/​2017/​2046735.CrossRef
34.
Zurück zum Zitat Singh Tanwar, G., Singh, G., & Gaur, V. (2010). Secured encryption—concept and challenge. International Journal of Computer Applications, 2, 89–94.CrossRef Singh Tanwar, G., Singh, G., & Gaur, V. (2010). Secured encryption—concept and challenge. International Journal of Computer Applications, 2, 89–94.CrossRef
35.
Zurück zum Zitat Thammarat, C., Chokngamwong, R., Techapanupreeda, C., & Kungpisdan, S. (2015). A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys. In 2015 international conference on information networking (ICOIN), pp. 133–138. Retrieved April 30, 2019, from http://ieeexplore.ieee.org/document/7057870/. Thammarat, C., Chokngamwong, R., Techapanupreeda, C., & Kungpisdan, S. (2015). A secure lightweight protocol for NFC communications with mutual authentication based on limited-use of session keys. In 2015 international conference on information networking (ICOIN), pp. 133–138. Retrieved April 30, 2019, from http://​ieeexplore.​ieee.​org/​document/​7057870/​.
38.
Zurück zum Zitat Xu, J., Zhang, T., Lin, D., Mao, Y., Liu, X., Chen, S., Shao, S., Tian, B., & Yi, S. (2013). Pairing and authentication security technologies in low-power bluetooth. In 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing, pp. 1081–1085. https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.185. Xu, J., Zhang, T., Lin, D., Mao, Y., Liu, X., Chen, S., Shao, S., Tian, B., & Yi, S. (2013). Pairing and authentication security technologies in low-power bluetooth. In 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing, pp. 1081–1085. https://​doi.​org/​10.​1109/​GreenCom-iThings-CPSCom.​2013.​185.
Metadaten
Titel
BLE-Based Authentication Protocol for Micropayment Using Wearable Device
verfasst von
Nai-Wei Lo
Alexander Yohan
Publikationsdatum
24.01.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07153-0

Weitere Artikel der Ausgabe 4/2020

Wireless Personal Communications 4/2020 Zur Ausgabe

Neuer Inhalt