The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications
Tài liệu tham khảo
Abdalla, 2005, Password-based authenticated key exchange in the three-party setting, 65
Adavoudi-Jolfaei, 2019, Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks, Peer-to-Peer Network. Appl., 12, 43, 10.1007/s12083-017-0627-8
Alliance, S.C., 2016. Contactless emv payments: Benefits for consumers, merchants and issuers, Smart Card Alliance, US, 4–6.
Amin, 2016, A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks, Ad Hoc Netw., 36, 58, 10.1016/j.adhoc.2015.05.020
Bezovski, 2016, The future of the mobile payment as electronic payment system, Eur. J. Bus. Manage., 8, 127
Sriramulu Bojjagani, 2019, A secure end-to-end proximity NFC-based mobile payment protocol, Comput. Stand. Interfaces, Elsevier, 66
Bojjagani, 2022, A secure iot-based micro-payment protocol for wearable devices, Peer-to-Peer Network. Appl., 1
Bojjagani, 2023, Systematic survey of mobile payments, protocols, and security infrastructure, J. Ambient Intell. Humanized Comput., 14, 609, 10.1007/s12652-021-03316-4
Challa, 2017, Secure signature-based authenticated key establishment scheme for future iot applications, IEEE Access, 5, 3028, 10.1109/ACCESS.2017.2676119
Chen, 2019, Light-weight and privacy-preserving authentication protocol for mobile payments in the context of iot, IEEE Access, 7, 15210, 10.1109/ACCESS.2019.2894062
Chong, S., Guttman, J., Datta, A., Myers, A., Pierce, B., Schaumont, P., Sherwood, T., Zeldovich, N., 2016. Report on the nsf workshop on formal methods for security, arXiv preprint arXiv:1608.00678.
Coskun, 2013, A survey on near field communication (nfc) technology, Wireless Personal Commun., 71, 2259, 10.1007/s11277-012-0935-5
Coskun, 2015, The survey on near field communication, Sensors, 15, 13348, 10.3390/s150613348
Cremers, 2006
Cremers, 2008, The scyther tool: Verification, falsification, and analysis of security protocols, 414
Cremers, C., 2009. The scyther tool: Automatic verification of security protocols.
Dalal, 2010, A comparative analysis of tools for verification of security protocols, Int’l J. Commun., Network Syst. Sci., 3, 779
Das, 2012, A dynamic password-based user authentication scheme for hierarchical wireless sensor networks, J. Network Comput. Appl., 35, 1646, 10.1016/j.jnca.2012.03.011
Das, 2017, Design of secure and lightweight authentication protocol for wearable devices environment, IEEE J. Biomed. Health Informat., 22, 1310, 10.1109/JBHI.2017.2753464
Das, 2017, Lightweight authentication protocols for wearable devices, Comput. Electr. Eng., 63, 196, 10.1016/j.compeleceng.2017.03.008
Diallo, 2014, A secure authentication scheme for bluetooth connection, 60
Dolev, 1983, On the security of public key protocols, IEEE Trans. Infor. Theory, 29, 198, 10.1109/TIT.1983.1056650
Fahl, S., Harbach, M., Muders, T., Baumgärtner, L., Freisleben, B., Smith, M., 20012. Why eve and mallory love android: An analysis of android ssl (in) security. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 50–61.
Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D., 2011. Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627–638.
Gallagher, 1995, Secure hash standard (shs), FIPS PUB, 180, 183
Gao, Y., Li, H., Luo, Y., 2015. An empirical study of wearable technology acceptance in healthcare. Ind. Manage. Data Syst.
Gao, 2020, Physical unclonable functions, Nat. Electron., 3, 81, 10.1038/s41928-020-0372-5
Gope, 2016, A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks, IEEE Trans. Ind. Electron., 63, 7124, 10.1109/TIE.2016.2585081
Gupta, 2019, A lightweight anonymous user authentication and key establishment scheme for wearable devices, Comput. Netw., 149, 29, 10.1016/j.comnet.2018.11.021
Hankerson, D., Menezes, A., 2011. Elliptic curve discrete logarithm problem.
Hankerson, 2006
Haselsteiner, E., Breitfuß, K., 2006.Security in near field communication (nfc)-strengths and weaknesses.
He, 2015, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks, IEEE Trans. Inf. Forensics Secur., 10, 2681, 10.1109/TIFS.2015.2473820
Helfmeier, 2014, Physical vulnerabilities of physically unclonable functions, 1
Jason Fernando, 2022. Cost of Goods Sold (COGS), Investopedia, 11th Aug 2022, https://www.investopedia.com/terms/c/cogs.asp (Accessed: 2023-01-25).
Kim, 2019, A secure authentication and key establishment scheme for wearable devices, 1
Koblitz, 1987, Elliptic curve cryptosystems, Mathe. Comput., 48, 203, 10.1090/S0025-5718-1987-0866109-5
Kumar, 2019, A secure authentication protocol for wearable devices environment using ecc, J. Infor. Sec. Appl., 47, 8
Lee, 2013, Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices, IET Comput. Digital Techn., 7, 48, 10.1049/iet-cdt.2012.0073
Levy, S., 2015. Performance and security of ecdsa. Comput. Sci.
Liu, 2016, A novel asymmetric three-party based authentication scheme in wearable devices environment, J. Netw. Comput. Appl., 60, 144, 10.1016/j.jnca.2015.10.001
Liu, 2016, The yoking-proof-based authentication protocol for cloud-assisted wearable devices, Pers. Ubiquit. Comput., 20, 469, 10.1007/s00779-016-0926-8
Lo, 2020, Ble-based authentication protocol for micropayment using wearable device, Wireless Pers. Commun., 1
Madhusudhan, 2020, A secure anonymous authentication protocol for roaming service in resource-constrained mobility environments, Arabian J. Sci. Eng., 45, 2993, 10.1007/s13369-019-04246-2
Magdum, 2021, Contactless transaction using wearable ring with biometric fingerprint security feature, 653
Mahto, D., Khan, D.A., Yadav, D.K., 2016. Security analysis of elliptic curve cryptography and rsa. In: Proceedings of the World Congress on Engineering, vol. 1, pp. 419–422.
Patel, 2015, Paytooth-a cashless mobile payment system based on bluetooth, Int. J. Comput. Appl., 120
Santosa, 2019, New design of lightweight authentication protocol in wearable technology, Telkomnika, 17, 561, 10.12928/telkomnika.v17i2.10344
Sedita, 2018, Cost of goods sold and total cost of delivery for oral and parenteral vaccine packaging formats, Vaccine, 36, 1700, 10.1016/j.vaccine.2018.01.011
Segura Anaya, 2018, Ethical implications of user perceptions of wearable devices, Sci. Eng. Ethics, 24, 1, 10.1007/s11948-017-9872-8
Seneviratne, 2017, A survey of wearable devices and challenges, IEEE Commun. Surv. Tutor., 19, 2573, 10.1109/COMST.2017.2731979
Sun, 2008, A new design of wearable token system for mobile device security, IEEE Trans. Consum. Electron., 54, 1784, 10.1109/TCE.2008.4711235
Tabet, 2016, Analysing the security of nfc based payment systems, 169
Wang, 2014, Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment, IEEE Trans. Dependable Secure Comput., 12, 428, 10.1109/TDSC.2014.2355850
Wazid, 2017, Secure remote user authenticated key establishment protocol for smart home environment, IEEE Trans. Dependable Secure Comput., 17, 391, 10.1109/TDSC.2017.2764083
Wong, 2006, A dynamic user authentication scheme for wireless sensor networks, vol. 1
Wu, 2017, A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server, Comput. Electr. Eng., 63, 168, 10.1016/j.compeleceng.2017.04.012
Yohan, A., Lo, N.-W., Randy, V., Chen, S.-J., Hsu, M.-Y., 2016. A novel authentication protocol for micropayment with wearable devices. In: ACM Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, Danang, Viet Nam, January 04–06, 2016, 2016, pp. 1–7.