2022
DOI: 10.1109/access.2021.3139065
|View full text |Cite
|
Sign up to set email alerts
|

A Novel NFC-Based Secure Protocol for Merchant Transactions

Abstract: The unprecedented growth of mobile applications promoted the usage of these mobile applications for payments. The current research works in mobile payments and commerce are prone to reverse-engineering attacks and lacked transport layer protection, so these research works do not ensure security. Therefore, such attacks on Mobile Payment Applications (MPA) will be successful, which leads to severe financial loss. To address these issues, we propose a secure framework incorporating a defense-in-depth approach fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 28 publications
0
8
0
1
Order By: Relevance
“…In the next subsection, the comparative analysis for the TS3-BT is discussed with suitable illustrations for prediction, transaction success rate, session failure, transaction failure, and time complexity. RONFC (Turk et al, 2019), DCAP (Lin et al, 2020), and NSPMT (Ahamad, 2021) are used alongside the proposed TS3-BT in the comparisons.…”
Section: Resultsmentioning
confidence: 99%
“…In the next subsection, the comparative analysis for the TS3-BT is discussed with suitable illustrations for prediction, transaction success rate, session failure, transaction failure, and time complexity. RONFC (Turk et al, 2019), DCAP (Lin et al, 2020), and NSPMT (Ahamad, 2021) are used alongside the proposed TS3-BT in the comparisons.…”
Section: Resultsmentioning
confidence: 99%
“…Ahamad et al [16] introduced a new near-field communication (NFC) based secure protocol for smart mobile transaction systems. NFC consists of three-layer that form a proper application for the transaction process.…”
Section: Related Workmentioning
confidence: 99%
“…From the above discussion, the authentication methods proposed rely on additional functions as in [28] or demanding protocols as in [16]. This increases the complexity and better adaptability other than indepdnent validations.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A public key cryptography-based NFC mobile payment mechanism was presented by the authors of [21]. In [23], the authors proposed a Secure Protocol for Mobile Transaction (NSPMT) protocol based on NFC that included a Defense in Depth approach. Their Defensein-depth approach consisted of three levels: defense at the hardware level, defense at the application level, and defense at the communication level.…”
Section: Introductionmentioning
confidence: 99%