As one of the most important techniques in IoT, NFC (Near Field Communication) is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.
IoT [
NFC is a development and breakthrough of the RFID (Radio Frequency Identification) [
On the current research status, researchers at home and abroad do not put forward a universal applicability scheme. In NFC mutual authentication phase, Yun-Seok et al. [
In recent years, because the application of electronic ticket became wider and wider, more and more people are paying attention to security and privacy problems in ticket purchase and verification process. In the purchase process, Ceipidor et al. [
Meanwhile, in the verification process, some scholars believe that we can use infrastructure treatment scheme that is based on PKI (Public Key Infrastructure) system; the solution adopts asymmetric public key way to generate a digital signature. E-ticket holders and mobile verification devices can ensure its security through the random number verification mode under the PKI system. But this solution needs very complex calculation and cannot achieve necessary security attributes. At the same time, there are many other shortcomings, for example, the poor user experience and ticket clone issue, so the solution cannot solve security and privacy thread in the verification process. In order to better promote the NFC technology, a scheme is needed to be proposed to solve the security and privacy thread.
Therefore, in this paper, we propose a new NFC mobile electronic ticket payment and verification system. Compared with the old NFC system, this system not only solves problems that exist in purchase and verification process of e-ticket but also designs a CS E-Ticket, making entire system resist stronger attack with greater security.
The rest of this paper is organized as follows. In Section
In this part, we mainly discuss the offline session key generation technology [
The key generation process is shown in Figure
Session key generation.
The following steps show the details of the session key generation.
After sharing
The next step is to generate sets of intermediate keys. The purpose of intermediate key generation is to increase the difficulty for cryptanalysis. In other words, it increases difficulty to trace back to the preference key and crack the session key. Our proposed framework is general in that it does not specify the number of rounds the engaging parties need to perform. The higher the number of rounds performed, the greater the security of system. However, increasing the number of rounds will take more time to complete. The proposed intermediate key generation is performed as follows:
The previously used intermediate keys in any round can be removed from the system. Thus, the remaining intermediate keys in each round can be written as follows:
The output of the last round of intermediate key generation is considered as session keys
Then Alice and Bob can use
The NTRU algorithm [
The NTRU cryptosystem depends on three integer parameters
To create an NTRU key, we need to randomly choose two polynomials
Next compute the quantity
Finally, the polynomial
If Alice wants to send a message to Bob, she begins by selecting a message
This is the encrypted message which Alice sends to Bob.
Suppose that Bob has received the message
In order to decrypt
Finally, Bob gets the plaintext
In this section, in order to better describe the system which we proposed, we will introduce it from the scheme structure, CS E-Ticket, CS E-Ticket secure payment, and verification schemes.
The system consists of server, mobile device, mobile POS terminals, and mobile verification terminals. There are four stages: registration, booking, purchase, and verification. The communication in e-ticket registration and booking process is done in a wireless way. In order to make the whole system more convenient and secure, the communication between mobile devices will be done via the NFC. Structure of the proposed scheme is shown in Figure
Scheme structure.
This CS E-Ticket consists of the security and context, two parts [
As shown in Table
CS E-Ticket.
Content part | Security part |
---|---|
Title |
|
Location | |
Seat | IC |
Time |
|
Mark | |
|
|
|
|
|
|
Package |
The content part is encrypted by symmetric key. The security party is stored by using the calculated hash values. The CS E-Tickets style could be various depending on the service providers; take bus ticket as an example; it might not have the seat information. Finally, the CS E-Ticket providers will package the context and security part of ticket which has been encrypted.
This scheme clearly classifies the ticket information. On the one hand, it uses symmetric encryption encrypt content part to prevent information leakage; on the other hand, it adopts hash values to keep ticket information confidential, making the CS E-Ticket have stronger security.
In this section, there are three entities involved in our payment scheme: the mobile device (
The user holds mobile device (
When session key needs to be updated, we can take the offline session key generation technology [
In order to start the payment process, user has to move
CS E-Ticket NFC payment scheme.
Firstly, the database generates the private key
There are two stages in the scheme that we proposed. One is authentication stage, and the other is payment stage. Then we will introduce the two stages in detail as follows.
The The When As soon as receiving the response message
After the When the
In the verification process, there are two entries: user mobile device (
CS E-Ticket NFC verification protocol.
Firstly, the
In this section, we will analyze our proposed system scheme from the point of view of security and practicability.
The scheme uses message
In the proposed scheme, all exchange information will use symmetric key to ensure that the message is in the cipher state.
Because the response message generated by the same devices is different in each session, attacker could not assure the tracking attack successfully because there is no the fixed messages [
According to the proposed system scheme, it is difficult to find the correct session key as session key change every time at the completion of transaction. In addition, applying an offline key generation technology can increase resistance to brute force attacks [
Because the session key is different in each session, the attacker cannot obtain the previous interactive information.
By using nonce and limited-use session keys, the proposed system scheme can prevent replay attack [
An attacker who pretends to be an authorized party is not able to analyze the transmitted message since the session keys used in our scheme are changed constantly by using strong encryption.
Because the scheme will calculate the times of purchase and refund within a certain period of time, if the times reach the upper limit, the user will be pulled into the blacklist. By this way, the system scheme we proposed can prevent “spike refund” attack.
For the system scheme we proposed, on the one hand, the security part information is displayed to user in the form of hash value. On the other hand, we bind the IC serial number to user mobile device. By this way, the cloned e-ticket cannot finish the authentication and verification process, which prevent the e-ticket clone attack [
For the train stations, airports and other places where the flow of people is large and the security needs are higher, the proposed scheme has a strong practicability comparing with other schemes in Table
The analysis of practicability.
Symmetric encryption | Symmetric decryption | Nonsymmetric encryption | Nonsymmetric decryption | Hash function | Message number | |
---|---|---|---|---|---|---|
Yun-Seok et al. | 4 | 4 | 1 | 1 | 3 | 6 |
Ceipidor et al. | — | — | 2 | 2 | 3 | 6 |
León-Coca et al. | 7 | 7 | — | — | — | 7 |
E-ticket NFC payment scheme | 2 | 2 | 1 | 1 | 1 | 5 |
Offline e-ticket verification scheme | 2 | 2 | 1 | 1 | 1 | 5 |
According to Table
Because the authentication of payment and verification protocol is the same, we will use the BAN logic [
The core security assurance of the proposed protocol is the secure mutual authentication, which means the following security aims should be achieved.
According to the given protocol, with the Database and
According to the payment protocol
From the assumption
For the same reason, we can also deduce
Firstly, this paper designs and introduces an electronic ticket system from the point of view of the registration, booking, ticketing, and verification. This system is composed of servers, mobile device, mobile POS device, and mobile verification terminals. For the problems existing in ticketing process, this paper proposes an e-ticket NFC payment scheme. This scheme can not only give the user good experience but also protect the user e-ticket security information. For the problems in the verification process, an offline session key generation and distribution technology is introduced. On the one hand, this technology increases the security of the communication between each entity. On the other hand, it can cope with the “spike refund” issue so that the system we proposed can be applied to train tickets, air tickets, and other fields which need higher requirements.
Security element of NFC devices
User mobile device
Mobile POS device
User mobile device ID
Random number generated by
Payment information
The public key of database
The content part and security of e-ticket
The message
The hash of the message
The number of times of purchase and refund in a certain time
Shared session key between MD and server
The hash of the message
The private key of database.
Part of the work entitled “NFC Secure Payment and Verification Scheme for Mobile Payment” was presented at the 11th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2016), Bozeman, Montana, USA, August 8–10, 2016.
The authors declare that they have no conflicts of interest.
This work has been financially supported by the National Natural Science Foundation of China (nos. 61303216, 61272457, U1401251, and 61373172), the National High Technology Research and Development Program of China (863 Program) (no. 2012AA013102), the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (no. ICT170312), and National 111 Program of China B16037 and B08038.