Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

IDL - International Digital Library Of

Technology & Research


Volume 1, Issue 2, Mar 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

Fraud Resilient System for Off-Line Micro-


Payments
MS. RAJANI D 1, MRS. SHASHIREKHA H 2
Dept. of Computer Science
1
MTech, Student VTU PG Center, Mysuru, India
2
Guide, Assistant Professor VTU PG Center, Mysuru, India

SURVEY PAPER The previous work called FORCE that, similarly to


1 ABSTRACT: Credit and debit card data theft is one FRoDO, was built using a PUF based architecture.
of the earliest forms of cybercrime. Still, it is one of FORCE provided a weak prevention strategy based on
the most common nowadays. Attackers often aim at data obfuscation and did not address the most relevant
stealing such customer data by targeting the Point of attacks aimed at threatening customer sensitive data,
Sale (for short, PoS) system, i.e. the point at which a thus being vulnerable to many advanced attack
retailer first acquires customer data. Modern PoS techniques Market analysts have predicted that mobile
systems are powerful computers equipped with a card payments will overtake the traditional marketplace, thus
reader and running specialized software. Increasingly providing greater convenience to consumers and new
often, user devices are leveraged as input to the PoS. sources of revenue to many companies. This scenario
In these scenarios, malware that can steal card data as produces a shift in purchase methods from classic credit
soon as they are read by the device has flourished. As cards to new approaches such as mobile-based
such, in cases where customer and vendor are payments, giving new market entrants novel business
persistently or intermittently disconnected from the chances. Widely supported by recent hardware, mobile
network, no secure on-line payment is possible. This payment technology is still at its early stages of
paper describes FRoDO, a secure off-line micro- evolution but it is expected to rise in the near future as
payment solution that is resilient to PoS data breaches. demonstrated by the growing interest in crypto
Our solution improves over up to date approaches in currencies. The first pioneering micro-payment scheme
terms of flexibility and security. To the best of our was proposed by Rivets and Shamir back in 1996.
knowledge, FRoDO is the first solution that can Nowadays, crypto-currencies and decentralized
provide secure fully off-line payments while being payment systems are increasingly popular, fostering a
resilient to all currently known PoS breaches. In shift from physical to digital currencies. However, such
particular, we detail FRoDO architecture, components, payment techniques are not yet commonplace, due to
and protocols. Further, a thorough analysis of FRoDO several unresolved issues, including a lack of widely-
functional and security properties is provided, showing accepted standards, limited interoperability among
its effectiveness and viability. systems and, most importantly, security.
Off-line scenarios are harder to protect, customer data is
2 INTRODUCTION kept within the PoS for much longer time, thus being
PoS systems act as gateways and require some sort of more exposed to attackers. Skimmers: in this attack, the
network connection in order to contact external credit customer input device that belongs to the PoS system is
card processors. This is mandatory to validate replaced with a fake one in order to capture customers
transactions. To reduce cost and simplify card data. The main issue with a fully off-line approach
administration and maintenance, PoS devices may be is the difficulty of checking the trustworthiness of a
remotely managed over these internal networks. transaction without a trusted third party. In fact, keeping
Mobile payment solutions proposed so far can be track of past transactions with no available connection
classified as fully on-line, semi off-line, weak off-line to external parties or shared databases can be quite
or fully off-line. difficult, as it is difficult for a vendor to check if some
digital coins have already been spent. This is the main

IDL - International Digital Library 1|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 2, Mar 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


reason why during last few years, many different performs all payment process, whereas the PoS system
approaches have been proposed to provide a reliable is that the tool utilized by the cashier or shopper. Point
off-line payment scheme. Although many works have of Sale is the time and place where a retail exchange is
been published, they all focused on transaction finished.
anonymity and coin enforceability. However, previous At the point of sale, the dealer would set up a receipt
solutions lack a thorough security analysis. While they for the client or generally figure the sum owed by the
focus on theoretical attacks, discussion on real world client and give choices to the client to make payment.
attacks such as skimmers, scrapers and data In this transaction process, there is chance to attackers
vulnerabilities is missing. often aim at stealing such customer data by targeting
the Point of Sale. Modern PoS systems are powerful
3 SURVEY computers equipped with a card reader and running
3.1 Fraud Resilient Device for Off-line micro- specialized software. Increasingly typically, user
payments Here author vanisa daza said market devices are utilized as input to the PoS. In these
analysts have predicted that mobile payments will scenarios, malware that can take card information
overtake the traditional marketplace, thus providing when they are read by the device has thrived. So that
greater convenience to consumers and new sources of we proposed FRODO techniques, a safe disconnected
revenue to many companies. This scenario produces a from the net transaction arrangement that is strong to
shift in purchase methods from classic credit cards to PoS information breaches. Our solution enhances over
new approaches such as mobile-based payments, exceptional methodologies as far as adaptability and
giving new market entrants novel business chances. security.
Widely supported by recent hardware, mobile payment
technology is still at its early stages of evolution but it 3.3 OFF-Line Secure Credits For Micro Payments
is expected to rise in the near future as demonstrated Using FRoDO Resilient Device This survey mainly
by the growing interest in crypto-currencies. The first concentrate on micro payments, with network security
pioneering micro-payment scheme. Nowadays, crypto- and its consists of the policies and practices adopted to
currencies and decentralized payment systems are prevent and monitor access, misuse, modification, or
increasingly popular, fostering a shift from physical to denial of a computer network and network-accessible
digital currencies. However, such payment techniques resources.
are not yet commonplace, due to several unresolved Network security involves the authorization of access
issues, including a lack of widely-accepted standards, to data in a network, which is controlled by the
limited interoperability among systems and, most network administrator Users choose or are assigned an
importantly, security. ID and password or other authenticating information
that allows them access to information and programs
3.2 Secure Payment Solutions Fully Off-Line within their authority. Network security covers a
Functions on Frodo In this survey says nowadays variety of computer networks, both public and private,
online payments are one of the most popular, when the that are used in everyday jobs; conducting transactions
customer or buyer makes his payment transactions for and communications among businesses, government
the goods purchased with the use of the online money agencies and individuals. Here other survey says that
payment. In that the purchase methods from classic NetBill is a transactional payment protocol with
credit or debit cards to new approaches like mobile- many advanced features (atomicity, group
based payments, giving new market entrants novel membership, pseudonyms, etc.) that requires
business probabilities. communication with the NetBill server for each
However, many of us still resist the attractiveness and transaction, thus exhibiting the same drawback with
ease of revolving credit transactions because of respect to micropayments as the simpler online
security issues. So far there are a high risk for taken protocols already mentioned. Other general-purpose
cards, fraud so the purchasers worry debit-card fraud payment protocols are unattractive for micropayments
by merchants and different third parties. Payment for these same reasons.
transactions are usually processed by an electronic NetCents and Millicent [Man95] are scrip-based
payment system (for short, EPS). The EPS is a off-line-friendly micropayment protocols. As the
separate function from the typical point of sale monetary unit used in these protocols is vendor-
function, although the EPS and PoS system may be specific, double-spending is made very difficult (if not
co-located on constant machine. In general, the EPS impossible). The assumption behind both protocols is

IDL - International Digital Library 2|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 2, Mar 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


that people tend to re-use the same merchants motivate device owners that are not known to each
repeatedly. other in general and, thus, do not pursue a common
goal spend energy on behalf of others. Such
3.4 Preserving Micro-Payments in Deception of mechanisms can be provided by incentive systems.
Resilient Devices The vendor have been victims of These systems could recompense the energy spent for
information security breaches and payment data theft serving a remote resource request, and allow to use the
targeting consumer payment card data and Personally refund in turn to recompense others for using their
Identifiable Information(PII).The user data can be resources. Many incentive systems for motivating
used by the criminals for fraud operations. For cooperation among users have been proposed with
improving security, the credit card and debit card different application scenarios in mind, e. g. MilliCent,
holders use Payment card industry Security Standard NetPay, and Micromint.
Council. PoS system always handles critical However, most of them cannot be used to motivate
information and requires remote management. PoS resource sharing among mobile devices, since they
System acts as gateways and requires network either require trusted hardware, connections to a
connection to work with external credit card central broker or other third parties on each interaction
processors. However, a network connection not be that requires a refund, or utilize refunds that cannot be
available due to either a temporary network service or reused without opening the door for fraud. An even
due to permanent lack of network coverage. On more important drawback when it comes to providing
solutions are not very efficient since remote incentives for spending energy is that must systems
communication can introduce delays in the payment consume lots of energy by themselves, e. g., by
process. Brute forcing remote access connections and requiring the use of public key cryptography on each
stolen credentials involved in PoS intrusions. payment, contradicting the primary goal of the
incentive system.
3.5 A Resilient and Energy-saving Incentive System
for Resource Sharing Current sales indicate a 3.6 Offline Micropayments without Trusted
significant increase in the popularity of smart phones Hardware Current electronic payment systems are
and evidently show a trend towards feature-rich not well matched to occasional, low-valued
mobile devices. Besides offering computing and transactions. (For the purposes of this discussion, we
storage resources almost comparable to desktop PCs use the term electronic payment system broadly, to
ten years ago, such devices offer a variety of other encompass conventional credit cards, stored-value
resources, including different communications cards, online and offline digital cash, etc.) A central
capacities like 3G, WiFi, and Bluetooth, as well as requirement for any electronic payment system is that
sensors for position, acceleration, light, and a single compromise or failure should not have
temperature. catastrophic consequences. For example, it should not
Combining the resources provided by multiple devices be possible to double spend in a digital cash system,
enables new and exciting applications. These are nor should the compromise of a clients authorization
typically observed as a natural subset of pervasive secret entail unlimited client liability or uncollectible
computing and find increasing interest in many other transactions. Traditional payment systems are
disciplines of distributed computing, e. g., in Grid designed to prevent such failures. Unfortunately, the
computing and service overlays. Example applications prevention mechanisms are generally too expensive to
range from pooling capacities of the cellular support occasional, low-valued transactions.
connections of multiple devices to speed up Typically, such systems require online transactions,
downloads to people-centric sensing exploiting the trusted client hardware such as smartcards, or must
sensors of thousands of smart-phones. Unfortunately, assume conditions that are not always true, such as
despite of the growth in resource variety, processor that payers can be held responsible for any and all
speed, memory size, and communication bandwidth, fraud or misuse of their authorization secrets. In this
battery capacity remains the limiting factor for paper, however, we present a new approach that
realizing the vision described above. Providing focuses instead on risk management. Our central
resources for applications running on remote devices observation is that in some applications we can relax
may consume a significant amount of energy, limiting many of the expensive requirements associated with
the operating time of a mobile device for the owners electronic payment systems while still keeping fraud
personal use. In fact, mechanisms are required to or uncollectible transactions within acceptable levels.

IDL - International Digital Library 3|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 2, Mar 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


We shift the security functions performed by online [2] R. L. Rivest, Payword and micromint: two simple
authorization of transactions to certified code that can micropayment schemes, in CryptoBytes, 1996, pp.
authorize offline transactions under certain conditions. 6987 2015.
These conditions are customized to each client [3] S. Martins and Y. Yang, Introduction to bitcoins:
according to a risk management strategy customized to a pseudo-anonymous electronic currency system, ser.
the application. There are three main contributions in CASCON 11. Riverton, NJ, USA: IBM Corp., 2011,
this paper. First, we describe a framework in which pp. 349350.
certified offline authorizations created by a risk [4] Verizon, 2014 data breach investigations report,
management strategy replace online authorizations for Verizon, Technical Report, 2014.
occasional, low-valued transactions. We then describe [5] T. M. Incorporated, Point-of-sale system
architecture for a practical payment system in which a breaches, Trend Micro Incorporated, Technical
trust management system is used to encode the client Report, 2014.
risk management strategy. Finally, we describe a [6] Mandiant, Beyond the breach, Mandiant,
prototype implementation based on the KeyNote trust Technical Report, 2014.
management toolkit, in which users can purchase [7] Bogmar, Secure POS & kiosk support, Bogmar,
vending machine items using credentials stored on Technical Report, 2014.
conventional palmtop computers. [8] V. Daza, R. Di Pietro, F. Lombardi, and M.
This is the main reason why during last few years, Signorini, FORCE Fully Off-line secuRe CrEdits
many different approaches have been proposed to for Mobile Micro Payments, in 11th Intl. Conf. on
provide a reliable offline payment scheme. Although Security and Cryptography, SCITEPRESS, Ed., 2014.
many works have been published, they all focused on [9] W. Chen, G. Hancke, K. Mayes, Y. Lien, and J.-H.
transaction anonymity and coin enforceability. Chiu, Using 3G network components to enable NFC
However, previous solutions lack a thorough security mobile transactions and authentication, in IEEE PIC
analysis. While they focus on theoretical attacks, 10, vol. 1, Dec 2010, pp. 441 448.
discussion on real world attacks such as skimmers, [10] S. Golovashych, The technology of
scrapers and data vulnerabilities is missing. identification and authentication of financial
transactions. from smart cards to NFC-terminals, in
4 CONCLUSION IEEE IDAACS 05, Sep 2005, pp. 407412.
Our survey mainly conclude that the first data-breach- [11] G. Vasco, Maribel, S. Heidarvand, and J. Villar,
resilient fully off-line micro payment approach. The Anonymous subscription schemes: A flexible
security analysis shows that FRoDO does not impose construction for on-line services access, in
trustworthiness assumptions. Further, FRoDO is also SECRYPT 10, July 2010, pp. 112.
the first solution in the literature where no customer [12] K. S. Kadambi, J. Li, and A. H. Karp, Near-field
device data attacks can be exploited to compromise the communication-based secure mobile payment
system. This has been achieved mainly by leveraging a service, in ICEC 09. ACM, 2009.
novel erasable PUF architecture and a novel protocol
design. Furthermore, our proposal has been thoroughly [13] V. C. Sekhar and S. Mrudula, A complete secure
discussed and compared against the state of the art. customer centric anonymous payment in a digital
Our analysis shows that FRoDO is the only proposal ecosystem, ICCEET 12, 2012.
that enjoys all the properties required to a secure
micro-payment solution, while also introducing
flexibility when considering the payment medium
(types of digital coins). Finally, some open issues have
been identified that are left as future work. In
particular, we are investigating the possibility to allow
digital change to be spent over multiple off-line
transactions while maintaining the same level of
security and usability.

OTHER REFERENCES
[1] J. Lewandowska, http:// www.frost.com /prod/
servlet/ press-release.pag? docid=274238535, 2013.

IDL - International Digital Library 4|P a g e Copyright@IDL-2017

You might also like