remd racket eradicate mechanism designed for on-line operating cost

S.R.Ranjith,

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:2         Year: 20 December,2016         Pages:1123-1128

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Credit and debit card data theft is one of the earliest forms of cybercrime. Still, it is one of the most common nowadays. Attackers often aim at stealing such customer data by targeting the Point of Sale (for short, PoS) system, i.e. the point at which a retailer first acquires customer data. Modern PoS systems are powerful computers equipped with a card reader and running specialized software. Increasingly often, user devices are leveraged as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished. As such, in cases where customer and vendor are persistently or intermittently disconnected from the network, no secure on-line payment is possible. This paper describes REMD, a secure off-line micro-payment solution that is resilient to PoS data breaches. Our solution improves over up to date approaches in terms of flexibility and security. To the best of our knowledge, REMD is the first solution that can provide secure fully off-line payments while being resilient to all currently known PoS breaches. In particular, we detail REMD architecture, components, and protocols. Further, a thorough analysis of REMD functional and security properties is provided, showing its effectiveness and viability.

Kewords

mobile secure payment, architecture, algorithm,racket-resilience

Reference

[1] Crypto-analyses on user efficient recoverable off-line e-cashs scheme with fast anonymity revoking yalin Chen. et al., 2012 [2] Modelling Attacks on Physical Unclonable Function Ulrich Ruhrmair. et al., July 2013 [3] PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich Ruhrmair. et al., Nov 2012 [4] Fully Off-line Secure Credits for Mobile Micro Payments(FORCE) VanesaDaza. Et al., July 2011 [5] Windows Mobile LiveSD Forensics Ey up S. Canlar . et al. 2013 [6] A Live Digital Forensic system for Windows networks Roberto Battistoni,. Et al., 2011 [7] Circuit Level IC Protection Through Direct Injection of Process Variations W. Paul Griffin. Et al., May 2012 [8] Robust Key Extraction from Physical Uncloneable Function B.Skorie. Et al.,2007 [9] Extracting Secret Keys from Integrated Circuits Daihyun Lim, Et al., Oct 2005 [10] Reliable OSPM Schema for Secure Transaction using Mobile Agent in Micropayment System Chaitra Kiran N. Et al., 2011 [11]REMD: Fraud Resilient Device for Off-line micro-payment Vanesa Daza, Roberto Di Pietro, Flavio Lombardi