Secure Micro Payment Using Physical Unclonable Function
DOI:
https://doi.org/10.32628/CSEIT195199Keywords:
Mobile Secure Payment, Architecture, Protocols, Advance Encryption, Fraud-ResilienceAbstract
In online aggressors regularly go for taking such client information. In these situations, malware that can take card information when they are perused by the gadget has thrived. This framework gives secure micro-payment and enhances date approaches in terms of security. In proposed system, utilize two principle capacities PUF (Physical Unclonable Function) and FRoDo(Fraud Resilient Device for Off-Line Micro-Payments). These two can be given security to installment process and client account. These produce double encryption to protect the system from attackers. In proposed system gives more security for transaction.
References
- N. Chitra Kiran, G. Narendra Kumar, “Building robust m-commerce payment system on offline wireless network”,2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS) , March 2012
- D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, “Extracting secret keys from integrated circuits,” IEEE Trans. Very Large Scale Integr. Syst., vol. 13, no. 10, pp. 1200–1205, Oct. 2005.
- G. Hong and J. Bo, “Forensic analysis of skimming devices for credit fraud detection”, 2nd IEEE Int. Conf. Inf. Financial Eng., Sep. 2010
- P. Choi and D. K. Kim, “Design of security enhanced TPM chipagainst invasive physical attacks”,IEEE Int. Symp. Circuits Syst., pp. 1787–1790,2012.
- W. Chen, G. Hancke, K. Mayes, Y. Lien, and J.-H. Chiu, “Using 3G network components to enable NFC mobile transactions and authentication”, IEEE Int. Conf. Progress Informat. Comput., Dec. 2010, vol. 1, pp. 441–448.
- V. C. Sekhar and S. Mrudula, “A complete secure customer centric anonymous payment in a digital ecosystem”, Int. Conf. Comput., Electron. Elect. Technol., 2012, pp. 1049–1054.
- V. Daza, R. Di Pietro, F. Lombardi, and M. Signorini, “FORCE: Fully off-line secure credits for mobile micro payments”, 11th Int. Conf. Security Cryptography, 2014, pp. 125–136.
- S. Golovashych, “The technology of identification and authentication of financial transactions. from smart cards to NFC-terminals”, IEEE Intell. Data Acquisition Adv. Comput. Syst., Sep. 2005, pp. 407–412.
- Slava Gomzin, “Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, Computing & Technology 1st ed. New York, NY, USA: Wiley, 2014.
- Meng-Day Yu, Srinivas Devadas “Secure and robust error correction for physical unclonablefunctions”, IEEE Design & Test of Computers , vol. 27, no. 1, pp. 48–65, Jan. 2010.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.