A Secure Off-Line MICO Payment Approach Using Multiple Physical Unclonable Functions

Mounica Nethala, G.P Madhuri


FRoDO, a protected off-line micro-payment approach utilizing various physical unclonable capacities. FRoDO highlights an identity component to verify the client, and a coin component where coins are not locally stored, but rather are processed on-the-fly when required. The communication protocol utilized for the payment exchange does not directly read client coins. Rather, the seller just speaks with the personality component keeping in mind the end goal to recognize the client. This rearrangements eases the communication trouble with the coin component that influenced our past approach. The fundamental advantage is a less complex, speedier, and more secure cooperation between the included performing actors/entities. Among different properties, this two-stage protocol permits the bank or the coin component guarantor to outline computerized coins to be perused just by a specific character component, i.e. by a particular client. Besides, the character component used to enhance the security of the clients can likewise be utilized to obstruct malicious clients. To the best of our insight, this is the principal arrangement that can give secure completely off-line payments while being flexible to all as of now known PoS breaches.


J. Lewandowska. (2013). [Online]. Available: http://www.frost.com/prod/servlet/press-release.pag?docid=274238535

R. L. Rivest, “Payword and micromint: Two simple micropayment schemes,” in Proc. Int. Workshop Security Protocols, 1996, pp. 69–87.

S. Martins and Y. Yang, “Introduction to bitcoins: A pseudoanonymous electronic currency system,” in Proc. Conf. Center Adv. Stud. Collaborative Res., 2011, pp. 349–350.

Verizon, “2014 data breach investigations report,” Verizon, Tech. Rep., 2014, http://www.verizonenterprise.com/DBIR/2014

T. Micro, “Point-of-sale system breaches, threats to the retail and hospitality industries,” University of Zurich, Department of Informatics, 2010.

Mandiant, “Beyond the breach,” Mandiant, 2014, https://dl.mandiant.com/EE/library/WP_M-Trends2014_140409.pdf

Bogmar, “Secure POS & kiosk support,” Bogmar, 2014, http://www.bomgar.com/assets/documents/Bomgar_Remote_Support_for_POS_Systems.pdf

V. Daza, R. Di Pietro, F. Lombardi, and M. Signorini, “FORCEFully off-line secure credits for mobile micro payments,” in Proc. 11th Int. Conf. Security Cryptography, 2014, pp. 125–136.

W. Chen, G. Hancke, K. Mayes, Y. Lien, and J.-H. Chiu, “Using 3G network components to enable NFC mobile transactions and authentication,” in Proc. IEEE Int. Conf. Progress Informat. Comput., Dec. 2010, vol. 1, pp. 441–448.

S. Golovashych, “The technology of identification and authentication of financial transactions. from smart cards to NFC-terminals,” in Proc. IEEE Intell. Data Acquisition Adv. Comput. Syst., Sep. 2005, pp. 407–412.

G. Vasco, Maribel, S. Heidarvand, and J. Villar, “Anonymous subscription schemes: A flexible construction for on-line services access,” in Proc. Int. Conf. Security Cryptography, Jul. 2010, pp. 1–12.

K. S. Kadambi, J. Li, and A. H. Karp, “Near-field communicationbased secure mobile payment service,” in Proc. 11th Int. Conf. Electron. Commerce, 2009, pp. 142–151.

V. C. Sekhar and S. Mrudula, “A complete secure customer centric anonymous payment in a digital ecosystem,” in Proc. Int. Conf. Comput., Electron. Elect. Technol., 2012, pp. 1049–1054.

S. Dominikus and M. Aigner, “mCoupons: An application for near field communication (NFC),” in Proc. 21st Int. Conf. Adv. Inf. Netw. Appl. Workshops, 2007, pp. 421–428.

T. Nishide and K. Sakurai, “Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited,” in Proc. 3rd Int. Conf. Intell. Netw. Collaborative Syst., 2011, pp. 656–661.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.