The Secure Transaction Protocol in NFC Card Emulation Mode

Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang
2015 International Journal of Network Security  
The NFC wallet is more popular in the world than before. Many people want to have a convenient payment in shopping, so the NFC wallet becomes an excellent choice for them. The NFC wallet uses the Card Emulation mode to achieve the transaction process. However, the Card Emulation mode does not have the specified secure transaction protocol. Our research provides a secure transaction protocol for the Card Emulation mode. It applies the Diffie-Hellman Key Exchange method and Elliptic Curve
more » ... stem to the protocol. It not only fulfills five secure requirements which are Data Confidentiality, Data Integrity, Unobservability, Unlinkability and Traceability, but also has the less calculation size and amount of transference than another proposed method. It is more suitable for mobile devices which do not have high calculation ability and storage space.
dblp:journals/ijnsec/ChiCLH15 fatcat:ozku564gb5gyzflxx6inu75c4i