1. PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications
- Author
-
Peilin Hong, Jie Xu, Kaiping Xue, and Qingyou Yang
- Subjects
Trusted service manager ,Authentication ,business.industry ,Computer science ,020206 networking & telecommunications ,Public key infrastructure ,02 engineering and technology ,Mutual authentication ,Communications security ,Computer security ,computer.software_genre ,Public-key cryptography ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Session (computer science) ,Electrical and Electronic Engineering ,business ,computer ,AKA - Abstract
Nowadays, near field communication (NFC) has been widely used in electronic payment, ticketing, and many other areas. NFC security standard requires the use of public key infrastructure (PKI) to implement mutual authentication and session keys negotiation in order to ensure communication security. In traditional PKI-based schemes, every user uses a fixed public/private key pair to implement authentication and key agreement. An attacker can create a profile based on user’s public key to track and compromise the user’s privacy. Recently, He et al. and Odelu et al. successively proposed pseudonym-based authentication key and agreement protocols for NFC after Eun et al. ’s protocol (2013), which is first claimed to provide conditional privacy for NFC. They respectively claimed that their scheme can satisfy the security requirements. In this paper, first, we prove that their protocols still have security flaws, including the confusion of the user’s identity and the random identity. Then, we propose a pseudonym-based secure authentication protocol (PSAP) for NFC applications, which is effective in lifetime and includes time synchronization-based method and nonce-based method. In our scheme, trusted service manager issues pseudonyms but does not need to maintain verification tables and it could reveal the user’s identity of internal attackers. Furthermore, security and performance analysis proves that PSAP can provide traceability and more secure features with a little more cost.
- Published
- 2018
- Full Text
- View/download PDF