The use of IoT-based wearable devices to ensure secure lightweight payments in FinTech applications

Sriramulu Bojjagani1, Nagarjuna Reddy Seelam2, Neeraj Kumar Sharma1, Ravi Uyyala3, Sree Rama Chandra Murthy Akuri2, Anup Kumar Maurya4
1Cyber Security Lab, Department of Computer Science and Engineering, School of Engineering and Applied Sciences (SEAS), SRM University-AP, Amaravati, 522503 India
2Department of Computer Science and Engineering, Lakireddy Bali Reddy College of Engineering, Mylavaram, JNTUK, Kakinada, A.P, India
3Department of CSE, Chaitanya Bharathi Institute of Technology (CBIT), Gandipet, Hyderabad 500075, India
4Goa Institute of Management, Goa, India

Tài liệu tham khảo

Abdalla, 2005, Password-based authenticated key exchange in the three-party setting, 65 Adavoudi-Jolfaei, 2019, Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks, Peer-to-Peer Network. Appl., 12, 43, 10.1007/s12083-017-0627-8 Alliance, S.C., 2016. Contactless emv payments: Benefits for consumers, merchants and issuers, Smart Card Alliance, US, 4–6. Amin, 2016, A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks, Ad Hoc Netw., 36, 58, 10.1016/j.adhoc.2015.05.020 Bezovski, 2016, The future of the mobile payment as electronic payment system, Eur. J. Bus. Manage., 8, 127 Sriramulu Bojjagani, 2019, A secure end-to-end proximity NFC-based mobile payment protocol, Comput. Stand. Interfaces, Elsevier, 66 Bojjagani, 2022, A secure iot-based micro-payment protocol for wearable devices, Peer-to-Peer Network. Appl., 1 Bojjagani, 2023, Systematic survey of mobile payments, protocols, and security infrastructure, J. Ambient Intell. Humanized Comput., 14, 609, 10.1007/s12652-021-03316-4 Challa, 2017, Secure signature-based authenticated key establishment scheme for future iot applications, IEEE Access, 5, 3028, 10.1109/ACCESS.2017.2676119 Chen, 2019, Light-weight and privacy-preserving authentication protocol for mobile payments in the context of iot, IEEE Access, 7, 15210, 10.1109/ACCESS.2019.2894062 Chong, S., Guttman, J., Datta, A., Myers, A., Pierce, B., Schaumont, P., Sherwood, T., Zeldovich, N., 2016. Report on the nsf workshop on formal methods for security, arXiv preprint arXiv:1608.00678. Coskun, 2013, A survey on near field communication (nfc) technology, Wireless Personal Commun., 71, 2259, 10.1007/s11277-012-0935-5 Coskun, 2015, The survey on near field communication, Sensors, 15, 13348, 10.3390/s150613348 Cremers, 2006 Cremers, 2008, The scyther tool: Verification, falsification, and analysis of security protocols, 414 Cremers, C., 2009. The scyther tool: Automatic verification of security protocols. Dalal, 2010, A comparative analysis of tools for verification of security protocols, Int’l J. Commun., Network Syst. Sci., 3, 779 Das, 2012, A dynamic password-based user authentication scheme for hierarchical wireless sensor networks, J. Network Comput. Appl., 35, 1646, 10.1016/j.jnca.2012.03.011 Das, 2017, Design of secure and lightweight authentication protocol for wearable devices environment, IEEE J. Biomed. Health Informat., 22, 1310, 10.1109/JBHI.2017.2753464 Das, 2017, Lightweight authentication protocols for wearable devices, Comput. Electr. Eng., 63, 196, 10.1016/j.compeleceng.2017.03.008 Diallo, 2014, A secure authentication scheme for bluetooth connection, 60 Dolev, 1983, On the security of public key protocols, IEEE Trans. Infor. Theory, 29, 198, 10.1109/TIT.1983.1056650 Fahl, S., Harbach, M., Muders, T., Baumgärtner, L., Freisleben, B., Smith, M., 20012. Why eve and mallory love android: An analysis of android ssl (in) security. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 50–61. Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D., 2011. Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627–638. Gallagher, 1995, Secure hash standard (shs), FIPS PUB, 180, 183 Gao, Y., Li, H., Luo, Y., 2015. An empirical study of wearable technology acceptance in healthcare. Ind. Manage. Data Syst. Gao, 2020, Physical unclonable functions, Nat. Electron., 3, 81, 10.1038/s41928-020-0372-5 Gope, 2016, A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks, IEEE Trans. Ind. Electron., 63, 7124, 10.1109/TIE.2016.2585081 Gupta, 2019, A lightweight anonymous user authentication and key establishment scheme for wearable devices, Comput. Netw., 149, 29, 10.1016/j.comnet.2018.11.021 Hankerson, D., Menezes, A., 2011. Elliptic curve discrete logarithm problem. Hankerson, 2006 Haselsteiner, E., Breitfuß, K., 2006.Security in near field communication (nfc)-strengths and weaknesses. He, 2015, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks, IEEE Trans. Inf. Forensics Secur., 10, 2681, 10.1109/TIFS.2015.2473820 Helfmeier, 2014, Physical vulnerabilities of physically unclonable functions, 1 Jason Fernando, 2022. Cost of Goods Sold (COGS), Investopedia, 11th Aug 2022, https://www.investopedia.com/terms/c/cogs.asp (Accessed: 2023-01-25). Kim, 2019, A secure authentication and key establishment scheme for wearable devices, 1 Koblitz, 1987, Elliptic curve cryptosystems, Mathe. Comput., 48, 203, 10.1090/S0025-5718-1987-0866109-5 Kumar, 2019, A secure authentication protocol for wearable devices environment using ecc, J. Infor. Sec. Appl., 47, 8 Lee, 2013, Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices, IET Comput. Digital Techn., 7, 48, 10.1049/iet-cdt.2012.0073 Levy, S., 2015. Performance and security of ecdsa. Comput. Sci. Liu, 2016, A novel asymmetric three-party based authentication scheme in wearable devices environment, J. Netw. Comput. Appl., 60, 144, 10.1016/j.jnca.2015.10.001 Liu, 2016, The yoking-proof-based authentication protocol for cloud-assisted wearable devices, Pers. Ubiquit. Comput., 20, 469, 10.1007/s00779-016-0926-8 Lo, 2020, Ble-based authentication protocol for micropayment using wearable device, Wireless Pers. Commun., 1 Madhusudhan, 2020, A secure anonymous authentication protocol for roaming service in resource-constrained mobility environments, Arabian J. Sci. Eng., 45, 2993, 10.1007/s13369-019-04246-2 Magdum, 2021, Contactless transaction using wearable ring with biometric fingerprint security feature, 653 Mahto, D., Khan, D.A., Yadav, D.K., 2016. Security analysis of elliptic curve cryptography and rsa. In: Proceedings of the World Congress on Engineering, vol. 1, pp. 419–422. Patel, 2015, Paytooth-a cashless mobile payment system based on bluetooth, Int. J. Comput. Appl., 120 Santosa, 2019, New design of lightweight authentication protocol in wearable technology, Telkomnika, 17, 561, 10.12928/telkomnika.v17i2.10344 Sedita, 2018, Cost of goods sold and total cost of delivery for oral and parenteral vaccine packaging formats, Vaccine, 36, 1700, 10.1016/j.vaccine.2018.01.011 Segura Anaya, 2018, Ethical implications of user perceptions of wearable devices, Sci. Eng. Ethics, 24, 1, 10.1007/s11948-017-9872-8 Seneviratne, 2017, A survey of wearable devices and challenges, IEEE Commun. Surv. Tutor., 19, 2573, 10.1109/COMST.2017.2731979 Sun, 2008, A new design of wearable token system for mobile device security, IEEE Trans. Consum. Electron., 54, 1784, 10.1109/TCE.2008.4711235 Tabet, 2016, Analysing the security of nfc based payment systems, 169 Wang, 2014, Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment, IEEE Trans. Dependable Secure Comput., 12, 428, 10.1109/TDSC.2014.2355850 Wazid, 2017, Secure remote user authenticated key establishment protocol for smart home environment, IEEE Trans. Dependable Secure Comput., 17, 391, 10.1109/TDSC.2017.2764083 Wong, 2006, A dynamic user authentication scheme for wireless sensor networks, vol. 1 Wu, 2017, A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server, Comput. Electr. Eng., 63, 168, 10.1016/j.compeleceng.2017.04.012 Yohan, A., Lo, N.-W., Randy, V., Chen, S.-J., Hsu, M.-Y., 2016. A novel authentication protocol for micropayment with wearable devices. In: ACM Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, Danang, Viet Nam, January 04–06, 2016, 2016, pp. 1–7.