SlideShare une entreprise Scribd logo
1  sur  22
P R E S E N T E D B Y :
G A U T H A M . U
( 4 P A 1 0 T E 0 1 1 )
Conditional Privacy Preserving
Security Protocol for NFC
Applications
3/14/2014
1
PACE TE DEPT
Contents
 Introduction
 Background
 NFC Environment
 Security Threats In The NFC
 Proposed Method
 Conclusion
3/14/2014
2
PACE TE DEPT
Introduction
Near Field Communication(NFC)
 Short Range Wireless Communication Technology
 Operational Frequency is 13.56MHz
 Speed is 106Kbps to 424Kbps
 Credit Card can be replaced by NFC in e-payment
3/14/2014
3
PACE TE DEPT
3/14/2014
4
PACE TE DEPT
3/14/2014
5
PACE TE DEPT
Background
 This section introduces NFCIP-1 and also NFC-SEC
the security method
 NFCIP-1 is a near field communication interface and
protocol.
 NFC-SEC is a NFCIP-1 security services and
protocol.
 Pseudonyms
3/14/2014
6
PACE TE DEPT
3/14/2014
7
PACE TE DEPT
3/14/2014
8
PACE TE DEPT
NFC Environment
 TSM is a institution that transfers the mobile
financial data of customers to financial institutions
safely.
 SE is the security area that can safely store important
data such as financial information ,authentication
information and service applications.
3/14/2014
9
PACE TE DEPT
NFC Features
 One to One communication
 Near Field Communication
 Sporadic Communication
3/14/2014
10
PACE TE DEPT
Security threats in the NFC
 MITM attack
 Eaves Dropping and Data Modulation
 Privacy
 Security Requirement
3/14/2014
11
PACE TE DEPT
Security Requirement
3/14/2014PACE TE DEPT
12
 Data Confidentiality : Required to protect data from
unauthorized users.
 Data Integrity : Transmitted data should be identical
to source data.
 Unobservability : Data of specific users should not be
distinguished from multiple data.
 Unlinkability : When 2 data generated by the same
user is presented ,the connectivity between the 2
data should not be identified.
 Tracability :It is required to enable to find out who
generated the data if a problem occurs.
Proposed Method
 The conditional privacy method has widely been
studied in the light of pseudonyms when the privacy
protection is required.
 Since the proposed method can reuse NFCIP-1 and
NFC-SEC ,the NFC standards in most cases more
efficient production is possible in the chip design
sector and implementation
3/14/2014
13
PACE TE DEPT
Methods
 MuPM method : If user A requests TSM for
pseudonyms , TSM generates n pseudonyms and
transmit it to user A ,then TSM stores the
transmitted pseudonyms and ID of the user A.
 A Pseudonym composed of public key , private key
ID of the TSM and signature of the TSM
• pseudonyms is generated as follows
3/14/2014
14
PACE TE DEPT
 SuPM method: if we consider the NFC features in the
protocol design process,the protocol can be
configured so that it can update pseudonym without
the need to communicate with TSM.
 The communication with the TSM can be used only
to keep track of the message constructor.
3/14/2014
15
PACE TE DEPT
3/14/2014
16
PACE TE DEPT
 Conditional Privacy PDU:
In case information is hidden in all situations , there
arises a problem where the personalized service is
not provided.
In this method users can request services through
protected PDU if they want to receive the
personalized service
3/14/2014
17
PACE TE DEPT
3/14/2014
18
PACE TE DEPT
Analysis
3/14/2014PACE TE DEPT
19
MuPM method :
Additional storage to maintain the
pseudonyms.
SuPM method :
Additional computation time.
Additional transference time.
Conclusions
 With recent release of various terminals equipped
with NFC , e-payment using NFC is expected to be
activated.
 In such situation , the user’s transaction information
leaks can lead to the invasion of privacy.
 In this situation , the conditional privacy protection
methods are proposed to solve the aforementioned
problems.
 In conclusion , it is expected that the proposed
method will help users to protect their privacy and
use personalized services.
3/14/2014
20
PACE TE DEPT
References
3/14/2014
21
PACE TE DEPT
3/14/2014
22
PACE TE DEPT

Contenu connexe

Tendances

Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)Togis UAB Ltd
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail DetectionIRJET Journal
 
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Palash Mehar
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocolseSAT Journals
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with securityeSAT Publishing House
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedInfoSec Institute
 

Tendances (14)

Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail Detection
 
Practical Network Security
Practical Network SecurityPractical Network Security
Practical Network Security
 
Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)Privacy Enhanced Mail (PEM)
Privacy Enhanced Mail (PEM)
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Man in the middle
Man in the middleMan in the middle
Man in the middle
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
 

En vedette

Differential Privacy Preservation for Deep Auto-Encoders
Differential Privacy Preservation for Deep Auto-EncodersDifferential Privacy Preservation for Deep Auto-Encoders
Differential Privacy Preservation for Deep Auto-EncodersNhatHai Phan
 
Cools sap&tic marseille_septembre2012
Cools sap&tic marseille_septembre2012Cools sap&tic marseille_septembre2012
Cools sap&tic marseille_septembre2012CNR_Sante
 
Connected Health & Ambient Assisted Living Symposium 2011
Connected Health & Ambient Assisted Living Symposium 2011Connected Health & Ambient Assisted Living Symposium 2011
Connected Health & Ambient Assisted Living Symposium 2011CASALA CENTRE
 
Smart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted LivingSmart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted Livingcampone
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Ambient Intelligence: An Overview
Ambient Intelligence: An OverviewAmbient Intelligence: An Overview
Ambient Intelligence: An OverviewLuigi De Russis
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
Ambient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali JindalAmbient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali JindalShifaliJindal
 
Big Data Fusion for eHealth and Ambient Assisted Living Cloud Applications
Big Data Fusion for eHealth and Ambient Assisted Living Cloud ApplicationsBig Data Fusion for eHealth and Ambient Assisted Living Cloud Applications
Big Data Fusion for eHealth and Ambient Assisted Living Cloud ApplicationsAccelerate Project
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligencecurlie
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencechandrika95
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient IntelligenceRam Inamdar
 

En vedette (20)

Differential Privacy Preservation for Deep Auto-Encoders
Differential Privacy Preservation for Deep Auto-EncodersDifferential Privacy Preservation for Deep Auto-Encoders
Differential Privacy Preservation for Deep Auto-Encoders
 
Cools sap&tic marseille_septembre2012
Cools sap&tic marseille_septembre2012Cools sap&tic marseille_septembre2012
Cools sap&tic marseille_septembre2012
 
Katawave
KatawaveKatawave
Katawave
 
First announcement - BigData and eHealth
First announcement - BigData and eHealthFirst announcement - BigData and eHealth
First announcement - BigData and eHealth
 
Psp12
Psp12Psp12
Psp12
 
Connected Health & Ambient Assisted Living Symposium 2011
Connected Health & Ambient Assisted Living Symposium 2011Connected Health & Ambient Assisted Living Symposium 2011
Connected Health & Ambient Assisted Living Symposium 2011
 
Smart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted LivingSmart Environments and Ambient Assisted Living
Smart Environments and Ambient Assisted Living
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
AAL Forum 2016
AAL Forum 2016AAL Forum 2016
AAL Forum 2016
 
Ambient Intelligence: An Overview
Ambient Intelligence: An OverviewAmbient Intelligence: An Overview
Ambient Intelligence: An Overview
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Ambient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali JindalAmbient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali Jindal
 
Big Data Fusion for eHealth and Ambient Assisted Living Cloud Applications
Big Data Fusion for eHealth and Ambient Assisted Living Cloud ApplicationsBig Data Fusion for eHealth and Ambient Assisted Living Cloud Applications
Big Data Fusion for eHealth and Ambient Assisted Living Cloud Applications
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 

Similaire à Conditional privacy preserving security protocol for nfc applications

NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsIRJET Journal
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) ijwmn
 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYcscpconf
 
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologycsandit
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONNaveen Sampath
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkRachel Phillips
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...
Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...
Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...Robert Chang
 
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaVPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaHanaysha
 
Cloud network management model a novel approach to manage cloud traffic
Cloud network management model   a novel approach to manage cloud trafficCloud network management model   a novel approach to manage cloud traffic
Cloud network management model a novel approach to manage cloud trafficijccsa
 

Similaire à Conditional privacy preserving security protocol for nfc applications (20)

NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
 
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
A370110
A370110A370110
A370110
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical Network
 
Peer to peer connection
Peer to peer connectionPeer to peer connection
Peer to peer connection
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...
Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...
Pournaghshband_End-to-End-Detection-of-Compression-of-Traffic-Flows-by-interm...
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq HanayshaVPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
VPN Types, Vulnerabilities & Solutions - Tareq Hanaysha
 
Cloud network management model a novel approach to manage cloud traffic
Cloud network management model   a novel approach to manage cloud trafficCloud network management model   a novel approach to manage cloud traffic
Cloud network management model a novel approach to manage cloud traffic
 

Dernier

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Dernier (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Conditional privacy preserving security protocol for nfc applications

  • 1. P R E S E N T E D B Y : G A U T H A M . U ( 4 P A 1 0 T E 0 1 1 ) Conditional Privacy Preserving Security Protocol for NFC Applications 3/14/2014 1 PACE TE DEPT
  • 2. Contents  Introduction  Background  NFC Environment  Security Threats In The NFC  Proposed Method  Conclusion 3/14/2014 2 PACE TE DEPT
  • 3. Introduction Near Field Communication(NFC)  Short Range Wireless Communication Technology  Operational Frequency is 13.56MHz  Speed is 106Kbps to 424Kbps  Credit Card can be replaced by NFC in e-payment 3/14/2014 3 PACE TE DEPT
  • 6. Background  This section introduces NFCIP-1 and also NFC-SEC the security method  NFCIP-1 is a near field communication interface and protocol.  NFC-SEC is a NFCIP-1 security services and protocol.  Pseudonyms 3/14/2014 6 PACE TE DEPT
  • 9. NFC Environment  TSM is a institution that transfers the mobile financial data of customers to financial institutions safely.  SE is the security area that can safely store important data such as financial information ,authentication information and service applications. 3/14/2014 9 PACE TE DEPT
  • 10. NFC Features  One to One communication  Near Field Communication  Sporadic Communication 3/14/2014 10 PACE TE DEPT
  • 11. Security threats in the NFC  MITM attack  Eaves Dropping and Data Modulation  Privacy  Security Requirement 3/14/2014 11 PACE TE DEPT
  • 12. Security Requirement 3/14/2014PACE TE DEPT 12  Data Confidentiality : Required to protect data from unauthorized users.  Data Integrity : Transmitted data should be identical to source data.  Unobservability : Data of specific users should not be distinguished from multiple data.  Unlinkability : When 2 data generated by the same user is presented ,the connectivity between the 2 data should not be identified.  Tracability :It is required to enable to find out who generated the data if a problem occurs.
  • 13. Proposed Method  The conditional privacy method has widely been studied in the light of pseudonyms when the privacy protection is required.  Since the proposed method can reuse NFCIP-1 and NFC-SEC ,the NFC standards in most cases more efficient production is possible in the chip design sector and implementation 3/14/2014 13 PACE TE DEPT
  • 14. Methods  MuPM method : If user A requests TSM for pseudonyms , TSM generates n pseudonyms and transmit it to user A ,then TSM stores the transmitted pseudonyms and ID of the user A.  A Pseudonym composed of public key , private key ID of the TSM and signature of the TSM • pseudonyms is generated as follows 3/14/2014 14 PACE TE DEPT
  • 15.  SuPM method: if we consider the NFC features in the protocol design process,the protocol can be configured so that it can update pseudonym without the need to communicate with TSM.  The communication with the TSM can be used only to keep track of the message constructor. 3/14/2014 15 PACE TE DEPT
  • 17.  Conditional Privacy PDU: In case information is hidden in all situations , there arises a problem where the personalized service is not provided. In this method users can request services through protected PDU if they want to receive the personalized service 3/14/2014 17 PACE TE DEPT
  • 19. Analysis 3/14/2014PACE TE DEPT 19 MuPM method : Additional storage to maintain the pseudonyms. SuPM method : Additional computation time. Additional transference time.
  • 20. Conclusions  With recent release of various terminals equipped with NFC , e-payment using NFC is expected to be activated.  In such situation , the user’s transaction information leaks can lead to the invasion of privacy.  In this situation , the conditional privacy protection methods are proposed to solve the aforementioned problems.  In conclusion , it is expected that the proposed method will help users to protect their privacy and use personalized services. 3/14/2014 20 PACE TE DEPT