Efficient and Secure Offline Transaction with Bit Coin Generation

Authors(2) :-R. Ananthi, Dr. S. Nandhakumar

Disaster is any event that is either occurred naturally or manmade which can create huge loss on people’s belonging or lives. Payment through mobile in a disaster field gives the advantage to provide electronic transactions for people buying recovery items like foodstuffs, garments and medicine. Existing system uses a new mobile payment method which makes use of infrastructure less mobile adhoc networks to permit transactions that permit customers to buy in disaster areas. However, few issues arise in this system while payment is in process. In this paper, proposed a method for secured transaction between a vendor and a customer using offline MANET concept. The customer and the vendor should register with the bank and gets authenticated separately. The protocol used in the proposed system works on two phases. (i) Pairing phase & (ii) Payment phase. At the completion of pairing phase, the vendor and the customer should share their public keys. This is done to improve message integrity & authenticity.

Authors and Affiliations

R. Ananthi
Department of Computer Science and Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, Tamil Nadu, India
Dr. S. Nandhakumar
Department of Computer Science and Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, Tamil Nadu, India

Offline Mobile Payment, Mobile Pairing, Bit Coin Generation, Payment Phase.

  1. Battistoni, Roberto, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, and Luigi V. Mancini. "A live digital forensic system for Windows networks." In IFIP International Information Security Conference, pp. 653-667. Springer, Boston, MA, 2008.
  2. Dodis, Yevgeniy, Leonid Reyzin, and Adam Smith. "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data." In International conference on the theory and applications of cryptographic techniques, pp. 523-540. Springer, Berlin, Heidelberg, 2004.
  3. Maes, Roel, Pim Tuyls, and Ingrid Verbauwhede. "Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs." In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 332-347. Springer, Berlin, Heidelberg, 2009.
  4. Bosch, Christoph, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, and Pim Tuyls. "Efficient helper data key extractor on FPGAs." In International Workshop on Cryptographic Hardware and Embedded Systems, pp. 181-197. Springer, Berlin, Heidelberg, 2008.
  5. Yu, Meng-Day, and Srinivas Devadas. "Secure and robust error correction for physical unclonable functions." IEEE Design & Test of Computers 27, no. 1 (2010): 48-65.
  6. R. L. Rivest, “Payword and micromint: Two simple micropayment schemes,” in Proc. Int. Workshop Security Protocols, 1996, pp. 69–87.
  7. S. Martins and Y. Yang, “Introduction to bitcoins: A pseudoanonymous electronic currency system,” in Proc. Conf. Center Adv. Stud. Collaborative Res., 2011, pp. 349–350.
  8. T. Micro, “Point-of-sale system breaches, threats to the retail and hospitality industries,” University of Zurich, Department of Informatics, 2010.
  9. V. Daza, R. Di Pietro, F. Lombardi, and M. Signorini, “FORCEFully off-line secure credits for mobile micro payments,” in Proc. 11th Int. Conf. Security Cryptography, 2014, pp. 125–136.
  10. W. Chen, G. Hancke, K. Mayes, Y. Lien, and J.-H. Chiu, “Using 3G network components to enable NFC mobile transactions and authentication,” in Proc. IEEE Int. Conf. Progress Informat. Comput., Dec. 2010, vol. 1, pp. 441–448.

Publication Details

Published in : Volume 5 | Issue 3 | May-June 2019
Date of Publication : 2019-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 51-58
Manuscript Number : CSEIT195317
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

R. Ananthi, Dr. S. Nandhakumar, "Efficient and Secure Offline Transaction with Bit Coin Generation ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.51-58, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT195317
Journal URL : https://res.ijsrcseit.com/CSEIT195317 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview