An Improved Privacy Protection Security Protocol Based on NFC

An improved NFC-based privacy protection protocol is proposed to protect user’s privacy in NFC application. In this paper, user’s privacy is protected by Chebyshevmap and certificateless public key cryptography in the protocol. As a trusted third party, Trusted Service Manager (TSM) participates in the process of user registration and verifies the identity of the parties if necessary. With high calculation speed, the proposed method can eliminate vulnerabilities of impersonations attacks and save the storage space of NFC devices.

[1]  Sujuan Liu,et al.  Security Analysis and Improvement on Two RFID Authentication Protocols , 2015, Wirel. Pers. Commun..

[2]  Zheng Huang,et al.  An efficient anonymous batch authenticated and key agreement scheme using self-certified public keys in VANETs , 2013, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013).

[3]  Thierry Ernst,et al.  Securing mobile network prefix provisioning for NEMO based vehicular networks , 2012, Math. Comput. Model..

[4]  Dijiang Huang,et al.  PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.

[5]  Min-Shiang Hwang,et al.  The Secure Transaction Protocol in NFC Card Emulation Mode , 2015, Int. J. Netw. Secur..

[6]  Min-Shiang Hwang,et al.  A Mutual Authentication Protocol for RFID , 2011, IT Professional.

[7]  Quan Qian,et al.  A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography , 2016, Int. J. Netw. Secur..

[8]  Prosanta Gope,et al.  Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks , 2016, IEEE Systems Journal.

[9]  Min-Shiang Hwang,et al.  An improved authentication protocol for mobile agent device in RFID environment , 2012, Int. J. Mob. Commun..

[10]  Heekuck Oh,et al.  Conditional privacy preserving security protocol for NFC applications , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).

[11]  Debiao He,et al.  Secure pseudonym-based near field communication protocol for the consumer internet of things , 2015, IEEE Transactions on Consumer Electronics.

[12]  Ashok Kumar Das,et al.  An Enhanced Access Control Scheme in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.

[13]  Li Ji-lian Cryptanalysis and improvement of Lai's authenticated group key transfer protocol , 2015 .