| Literature DB >> 35271136 |
Ming-Hour Yang1, Jia-Ning Luo2, Murugesan Vijayalakshmi3, Selvaraj Mercy Shalinie3.
Abstract
In recent years, improvements to the computational ability of mobile phones and support for near-field-communication have enabled transactions to be performed by using mobile phones to emulate a credit card or by using quick response codes. Thus, users need not carry credit cards but can simply use their mobile phones. However, the Europay MasterCard Visa (EMV) protocol is associated with a number of security concerns. In contactless transactions, attackers can make purchases by launching a relay attack from a distance. To protect message transmission and prevent relay attacks, we propose a transaction protocol that is compatible with EMV protocols and that can perform mutual authentication and ambient authentication on near-field-communication-enabled mobile phones. Through mutual authentication, our protocol ensures the legitimacy of transactions and establishes keys for a transaction to protect the subsequent messages, thereby avoiding security problems in EMV protocols, such as man-in-the-middle attacks, skimming, and clone attacks on credit cards. By using ambient factors, our protocol verifies whether both transacting parties are located in the same environment, and it prevents relay attacks in the transaction process.Entities:
Keywords: IoT security; NFC; ambient authentication; mobile transaction; mutual authentication; smart card
Mesh:
Year: 2022 PMID: 35271136 PMCID: PMC8914672 DOI: 10.3390/s22051989
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Distance fraud attack.
Figure 2Terrorist fraud attack.
Figure 3Mafia fraud attack.
Notations.
|
|
A certificate issued by a publisher to a target. For example,
|
|
| A target’s public key, for example, |
|
| A target’s private key, for example, |
|
| Symmetric keys shared between a credit card and issuing bank and are used for encryption |
|
| Symmetric keys shared between a credit card and issuing bank and used to calculate a message authentication code |
| Random numbers | |
|
| A secret value randomly generated by the phone |
|
| A secret value used to generate the session key |
|
| A session key used by a phone to communicate with a store |
|
| Encryption of message |
|
| Decryption of message |
|
| A function in the EMV protocol using the symmetric encryption function and key |
|
| A function using |
|
| Hash of message |
|
| A target’s audio-sampled ambient data; for example, |
|
| A target’s valid time, for example, |
|
| A target’s sampled ambient data, which contains the sample data and sample data’s valid time; for example, |
|
| Sampled ambient data comparison results |
|
| System time to complete ambient authentication |
|
| Results of ambient authentication. This information contains ambient data comparison results and the system time to complete ambient authentication |
Figure 4EMPAS transaction process.
Figure 5Mutual authentication phase.
Figure 6Ambient authentication phase.
Figure 7Ambient authentication phase.
Figure 8Rejection of transaction phase.
Figure 9Transaction phase.
EMV data lengths.
| EMV’s Existing Data | Length (Bytes) |
|---|---|
|
| |
|
| 2 |
| Card and merchant certificate | |
| Bank’s certificate | |
|
| 20 |
|
| 4 |
| 1 | |
|
|
|
|
| 1 |
|
| 38 |
|
| 2 |
|
| 45 |
|
| 8 |
|
| 8 |
| New Data | Length (bytes) |
|
| |
|
|
|
|
| 48 |
|
| 34 |
|
| 89 K |
| AmbAuthResult | 1 |
Figure 10RoC curve.
Online message length (bytes).
| RSA | RSA | RSA | RSA | RSA | |
|---|---|---|---|---|---|
| EMPAS-AES 128 | 90,822 | 91,462 | 92,134 | 92,742 | 93,388 |
| EMPAS-AES 192 | 90,870 | 91,526 | 92,134 | 92,790 | 93,452 |
| EMPAS-AES 256 | 90,934 | 91,574 | 92,214 | 92,854 | 93,500 |
| EMPAS-Cert-AES 128 | 90,949 | 91,653 | 92,357 | 93,061 | 93,771 |
| EMPAS-Cert-AES 192 | 90,973 | 91,693 | 92,365 | 93,085 | 93,811 |
| EMPAS-Cert-AES 256 | 91,013 | 91,717 | 92,421 | 93,125 | 93,835 |
Comparison of message transmission time (ms).
| RSA | RSA | RSA | RSA | RSA | |
|---|---|---|---|---|---|
| EMPAS-AES 128 | 107.16 | 107.92 | 108.71 | 109.43 | 110.19 |
| EMPAS-AES 192 | 107.22 | 108.00 | 108.71 | 109.49 | 110.27 |
| EMPAS-AES 256 | 107.30 | 108.05 | 108.81 | 109.56 | 110.32 |
| EMPAS-Cert-AES 128 | 107.31 | 108.15 | 108.98 | 109.81 | 110.64 |
| EMPAS-Cert -AES 192 | 107.34 | 108.19 | 108.99 | 109.83 | 110.69 |
| EMPAS-Cert -AES 256 | 107.39 | 108.22 | 109.05 | 109.88 | 110.72 |
Online consumer-end phone computational time (ms).
| RSA | RSA | RSA | RSA | RSA | |
|---|---|---|---|---|---|
| EMPAS-AES 128 | 11.58 | 29.12 | 61.38 | 110.9 | 182.22 |
| EMPAS-AES 192 | 12.18 | 29.72 | 61.98 | 111.5 | 182.82 |
| EMPAS-AES 256 | 12.3 | 29.84 | 62.1 | 111.62 | 182.94 |
| EMPAS-Cert-AES 128 | 11.73 | 29.54 | 62.14 | 112.13 | 183.95 |
| EMPAS-Cert -AES 192 | 12.18 | 29.99 | 62.59 | 112.58 | 184.4 |
| EMPAS-Cert -AES 256 | 12.27 | 30.08 | 62.68 | 112.67 | 184.49 |
Online merchant–end reader computational time (ms).
| RSA | RSA | RSA | RSA | RSA | |
|---|---|---|---|---|---|
| EMPAS-AES 128 | 107.24 | 125.76 | 159.58 | 206.8 | 281.63 |
| EMPAS-AES 192 | 107.84 | 126.36 | 160.18 | 207.4 | 282.23 |
| EMPAS-AES 256 | 107.96 | 126.48 | 160.3 | 207.52 | 282.35 |
| EMPAS-Cert-AES 128 | 106.92 | 125.44 | 159.26 | 206.48 | 281.31 |
| EMPAS-Cert -AES 192 | 107.37 | 125.89 | 159.71 | 206.93 | 281.76 |
| EMPAS-Cert -AES 256 | 107.46 | 125.98 | 159.8 | 207.02 | 281.85 |
Protocol execution time (ms).
| RSA | RSA | RSA | RSA | RSA | |
|---|---|---|---|---|---|
| EMPAS-AES 128 | 225.98 | 262.8 | 329.67 | 427.13 | 574.04 |
| EMPAS-AES 192 | 227.24 | 264.08 | 330.87 | 428.39 | 575.32 |
| EMPAS-AES 256 | 227.56 | 264.37 | 331.21 | 428.7 | 575.61 |
| EMPAS-Cert-AES 128 | 225.96 | 263.13 | 330.38 | 428.42 | 575.9 |
| EMPAS-Cert -AES 192 | 226.89 | 264.07 | 331.29 | 429.34 | 576.85 |
| EMPAS-Cert -AES 256 | 227.12 | 264.28 | 331.53 | 429.57 | 577.06 |
Protocol security analysis.
| EMPAS | EPMAR [ | Original EMV | Original EMV | Original EMV | |
|---|---|---|---|---|---|
| Mutual authentication | ◯ | ◯ | △ 1 | △ 1 | △ 1 |
| Confidentiality | ◯ | ◯ | ✕ | ✕ | ✕ |
| Prevention of replay attack | ◯ | ◯ | ◯ | ◯ | ◯ |
| Data privacy | ◯ | ◯ | ✕ | ✕ | ✕ |
| Integrity | ◯ | ◯ | ◯ | ◯ | ◯ |
| Nonrepudiation | ◯ | ◯ | ◯ | △ 2 | △ 2 |
| Prevention of MITM attack | ◯ | ◯ | ✕ | ✕ | ✕ |
| Prevention of preplay attacks | ◯ | ◯ | ✕ | ✕ | ✕ |
| Prevention of relay attacks | ◯ | △ 3 | △ 4 | △ 4 | △ 4 |
◯: Indicates that the attack can be prevented. ✕: Indicates that the attack cannot be prevented. △ 1: EMV authenticates only the card and not the POS. △ 2: DDA and SDA can achieve only a merchant’s nonrepudiation and not a consumer’s nonrepudiation. △ 3: EPMAR relies only on the payment amount displayed on the phone screen for consumers to verify whether the purchase amount matches, but if a consumer’s phone screen can be controlled by an attacker, such prevention methods are ineffective. △ 4: EMV proposes distance-bounding for prevention, but this method requires a precise counter and is therefore unsuitable for commercial phones.
Notations of the proof.
| P | Phone |
| M | Merchant |
|
| Uses the symmetric key |
|
| Uses the asymmetric key |
|
| Message |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|