Beruflich Dokumente
Kultur Dokumente
Volume: 5 Issue: 10 76 – 79
_______________________________________________________________________________________________
Abstract: Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the
customer date by targeting the point of scale (PoS) system. Increasing malware that ca steal card data as soon they are read by the device details.
This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer
account is disabling automatically by erasable PUFs. It includes that limited activity as server to client transaction is sure. Attackers often aim at
staling such customer data by targeting the Point of scale (for sort, PoS) system. I.e. the point at which retailer first acquires customer data.
Modern PoS system is powerful computer equipped with card reader and running specialized software. Increasingly often, user device are
leveraged as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished .As such
as, in case where customer and vendor are persistently or intermittently disconnected from the net work, no secure on-line payment is possible.
This work describes SPEF, over up to date approaches I term of flexibility and security. To the best of our knowledge SPEF is the first solution
that provide secure fully off line payment while being resilient to all currently known Pops breaches. In particular details SPEF architecture
components and protocols .Further a thorough analysis of SPEF functional security properties is provider showing its effectiveness and
visibility.
Keywords— Micropayment Scheme, Point of Sale, resilient attackers, SPEF protocol, and secure micro-payment.
__________________________________________________*****_________________________________________________
78
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 76 – 79
_______________________________________________________________________________________________
[7] Bogmar, “Secure POS & kiosk support,” Bogmar,
Technical Report, 2014.
[8] G. Vasco, Maribel, S. Heidarvand, and J. Villar,
“Anonymous subscription schemes: A flexible construction
for on-line services access,” in SECRYPT ’10, July 2010,
pp. 1–12.
[9] S. Golovashych, “The technology of identification and
authentication of financial transactions. from smart cards to
NFC-terminals,” in IEEE IDAACS ’05, Sep 2005,
pp. 407–
[10] W. Chen, G. Hancke, K. Mayes, Y. Lien, and J.-H. Chiu,
“Using 3G network components to enable NFC mobile
transactions and authentication,” in IEEE PIC ’10, vol. 1,
Dec 2010, pp. 441 –448. 412.
[11] K. S. Kadambi, J. Li, and A. H. Karp, “Near-field
communication-based secure mobile payment service,” in
ICEC ’09. ACM, 2009.
[12] V. C. Sekhar and S. Mrudula, “A complete secure customer
centric anonymous payment in a digital ecosystem,”
ICCEET ’12, 2012.
[13] S. Dominikus and M. Aigner, “mCoupons: An application
for near field communication (NFC),” in Advanced
Information Networking and Applications Workshops, ser.
AINAW ’07, vol. 2. Washington, DC, USA: IEEE
Computer Society, 2007, pp. 421–428.
[14] T. Nishide and K. Sakurai, “Security of offline anonymous
electronic cash systems against insider attacks by untrusted
authorities revisited,” ser. INCOS ’11. Washington, DC,
USA: IEEE Comp. Soc., 2011, pp. 656–661.
[15] V. Daza, R. Di Pietro, F. Lombardi, and M. Signorini,
“FORCE – Fully Off-line secuRe CrEdits for Mobile Micro
Payments,” in 11th Intl. Conf. on Security and
Cryptography, SCITEPRESS, Ed., 2014.
79
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________