DOI QR코드

DOI QR Code

NFC Mobile Coupon Protocol Based on Hash

해시 기반 NFC 모바일 쿠폰 프로토콜

  • Lee, Jae-Dong (Dept. of Computer Science and Engineering, Kyungnam University)
  • Received : 2017.02.03
  • Accepted : 2017.04.19
  • Published : 2017.05.31

Abstract

As most of the recent smart devices have NFC function the NFC mobile coupon will become one of the pervasive NFC applications. We need the secure NFC coupon protocols to issue and use NFC mobile coupon. In this paper, we analyze the security of the previous protocols and point out the problems of security. As the result of analysis, Premium M-coupon Protocol proposed by A. Alshehri and S. Schneider is the most secure but has unnecessary operations. We propose the Modified Premium M-coupon Protocol-1 with the unnecessary operations removed and show this protocol is secure by security analysis. Most of NFC mobile coupon protocols use the cryptography with the shared secret keys. We propose the Modified Premium M-coupon Protocol-2 without the shared secret keys and show this protocol is secure by security analysis.

Keywords

References

  1. International Organization for Standardization, ISO/IEC 18092: Information Technology-Telecommunication and Information Exchange between Systems-Near Field Communication-Interface and Protocol, 2004.
  2. V. Coskun, K. Ok, and B. Ozdenizci, Near Field Communication: from Theory to Practice, John Wiley and Sons, United Kingdom, 2012.
  3. V. Coskun, B. Ozdenizci, and K. Ok, "A Survey on Near Field Communication Technology," Wireless Personal Communications, Vol. 71, No. 3, pp. 2259-2294, 2013. https://doi.org/10.1007/s11277-012-0935-5
  4. H.M. Kang, H.S. Choi, and K.A. Cha, "Development of Vehicle Status Alerts System for Personal Information Leakage Protection using the NFC-based GCM Service," Journal of Korea Multimedia Society, Vol. 19, No. 2, pp. 317-324, 2016. https://doi.org/10.9717/kmms.2016.19.2.317
  5. E. Haselsteiner and K. Breitfuss, "Security in Near Field Communication," Proceeding of Workshop on RFID and Lightweight Crypto, pp. 3-13, 2006.
  6. ECMA International, NFC-SEC: NFCIP-1 Security Services and Protocol, 2010.
  7. ECMA International, NFC-SEC-01: NFCSEC Cryptography Standard Using ECDHand AES, 2010.
  8. Juniper Research, Mobile Coupons-Ecosystem Analysis and Marketing Channel Strategy 2011-2016, Juniper Research, Technical Report, 2011.
  9. M. Aigner, S. Dominikus, and M. Feldhofer, "A System of Secure Virtual Coupons Using NFC Technology," Proceeding of Pervasive Computing and Communications Workshops, pp. 362-366, 2007.
  10. S. Domonikus and M. Aigner, "mCoupons: An Application for Near Field Communication (NFC)," Proceeding of Advanced Information Networking and Applications Workshops, pp. 421-428, 2007.
  11. A. Alshehri and S. Schneider, "Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol," Proceeding of Smart Card Researchg and Advanced Application Conference, Lecture Notes in Computer Science, pp. 152-167, 2014.
  12. H. Hsiang and W. Shih, "Secure m-Coupon Scheme Using NFC," Proceeding of International Conference on Business and Information, pp. 3901-3909, 2008.
  13. H. Hsiang, H. Kuo, and W. Shih, "Secure m-Coupon Scheme Using Near Field Communication," International Journal of Innovative Computing, Information and Control, Vol. 5, No. 11, pp. 3901-3909, 2009.
  14. S.W. Park and I.Y. Lee, "A Study on Light- Weight Signature Scheme for NFC mCoupon Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 24, No. 2, pp. 275-284, 2014. https://doi.org/10.13089/JKIISC.2014.24.2.275
  15. S.W. Park and I.Y. Lee, "Efficient mCoupon Authentication Scheme for Smart Poster Environments Based on Low-Cost NFC," International Journal of Security and Its Applications, Vol. 7, No. 5, pp. 131-138, 2013. https://doi.org/10.14257/ijsia.2013.7.5.11
  16. J.C. Ha, "Security Analysis on NFC- Based M-Coupon Protocols and Its Countermeasure," Journal of Korea Academia-Industrial Cooperation Society, Vol. 16, No. 2, pp. 1388-1397, 2015. https://doi.org/10.5762/KAIS.2015.16.2.1388
  17. A. Alshehri and S. Schneider, "A Formal Framework for Security Analysis of NFC Mobile Coupon Protocols," Journal of Computer Security, Vol. 23, No. 6, pp. 608-707, 2015.
  18. L. Reyzin and N. Reyzin, "Better than Biba: Short One Time Signatures with Fast Signing and Verifying," Information Security and Privacy, Lecture Notes in Computer Science, Vol. 2384, pp. 144-154, 2002.
  19. G. Lowe, "Casper: A Compier for the Analysis of Security Protocols," Journal of Computer Security, Vol. 6, No. 1, pp. 53-84, 1998. https://doi.org/10.3233/JCS-1998-61-204