A Trusted Mobile Payment Scheme Based on Body Area Networks
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2015, Vol 2, Issue 2
Abstract
With the development of intelligent mobile phones and the improvement of wireless communication infrastructure, mobile payment is gradually accepted by the public. However, since intelligent mobile phones are not trusted devices, mobile payment faces serious security problems. To address the problems, this paper designs a trusted mobile payment scheme based on body area networks. The scheme builds a bridge between a body area network deployed on the human body and an intelligent mobile phone by the fuzzy vault technology and the human interference, and imports the security from a body area network to the mobile payment to establish a trusted mobile payment system. Because the scheme uses PPG signals with high-entropies to produce authentication data, its security is superior to traditional mobile payment schemes; at the same time the scheme uses trusted body area networks to design mobile payment systems and does not use external trusted devices, which is convenient to the users.
Authors and Affiliations
Huawei Zhao, Jiankun Hu
Light-weight Key Management Scheme for Active RFID Applications
Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constraine...
Comparative Study on Power Gating Techniques for Lower Power Delay Product, Smaller Power Loss, Faster Wakeup Time
The power gating is one of the most popular reduction leakage techniques. We make comparison among various power gating schemes in terms of power delay product, energy loss, and wake-up time using the 45-nm Predictive Te...
Attribution of Cyber Attacks on Industrial Control Systems
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or nationa...
Mobile Application Search: A QoS-Aware and Tag-Based Approach
The availability of enormous numbers of mobile applications (apps) is driving demand for the means to search for, recommend, and manage apps. Existing search engines provide basic search functionalities that enable users...
Hardware-software co-simulation for medical X-ray control units
In this paper we present our solution to master the complex- ity of product adaption cycles of a medical X-ray control unit. We present the real hardware and software platform and our mapping of it to a virtual X-ray con...