Next Article in Journal
Higher Hamstrings Strength and Stability Are Related to Lower Kinematics Alteration during Running after Central and Peripheral Fatigue
Next Article in Special Issue
Battery-Less NFC Potentiostat for Electrochemical Point-of-Care Sensors Based on COTS Components
Previous Article in Journal
Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles
Previous Article in Special Issue
EMV-Compatible Offline Mobile Payment Protocol with Mutual Authentication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Contactless Credit Cards Payment Fraud Protection by Ambient Authentication

by
Ming-Hour Yang
1,*,
Jia-Ning Luo
2,
Murugesan Vijayalakshmi
3 and
Selvaraj Mercy Shalinie
3
1
Department of Information and Computer Engineering, Chung Yuan Christian University, Taoyuan 32023, Taiwan
2
Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan 335009, Taiwan
3
Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai 625015, India
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(5), 1989; https://doi.org/10.3390/s22051989
Submission received: 13 January 2022 / Revised: 25 February 2022 / Accepted: 28 February 2022 / Published: 3 March 2022

Abstract

:
In recent years, improvements to the computational ability of mobile phones and support for near-field-communication have enabled transactions to be performed by using mobile phones to emulate a credit card or by using quick response codes. Thus, users need not carry credit cards but can simply use their mobile phones. However, the Europay MasterCard Visa (EMV) protocol is associated with a number of security concerns. In contactless transactions, attackers can make purchases by launching a relay attack from a distance. To protect message transmission and prevent relay attacks, we propose a transaction protocol that is compatible with EMV protocols and that can perform mutual authentication and ambient authentication on near-field-communication-enabled mobile phones. Through mutual authentication, our protocol ensures the legitimacy of transactions and establishes keys for a transaction to protect the subsequent messages, thereby avoiding security problems in EMV protocols, such as man-in-the-middle attacks, skimming, and clone attacks on credit cards. By using ambient factors, our protocol verifies whether both transacting parties are located in the same environment, and it prevents relay attacks in the transaction process.

1. Introduction

Mobile payment can be classified into three types according to the technology it uses [1]. The first type entails the short message service (SMS); transactions can be completed simply by sending an SMS without the use of a credit card or a bank account. However, transactions performed using SMS payments are therefore vulnerable to eavesdropping or tampering [2]. For this reason, SMS is rarely offered for transactions except, occasionally, for making donations to charity organizations. The second type of mobile payment involves a quick response code (QR code). Nonetheless, the susceptibility of QR code payment to structured query language injection, command injection, and phishing [3], coupled with the convenience of shopping, has engendered consumer acceptance of transactions involving near-field-communication (NFC) technology [1]. The third type is NFC-based mobile payment. Mobile phones adopt NFC card-emulation mode to emulate a secure transaction environment for Europay MasterCard Visa (EMV) contactless chip cards, thus enabling conventional credit cards to be stored in NFC-based phones as virtual cards for mobile payment. To strengthen transaction security by preventing the direct interception of credit card numbers and to protect user privacy, EMVCo [4] proposed using token numbers in place of primary account numbers (PANs), which are fixed credit card numbers. Token numbers change for every new transaction process to avoid replay attacks, in which attackers intercept another person’s PAN from a single transaction and use this PAN to perform transactions with other merchants [5].
A number of security problems continue to affect EMV contactless card payment standards [6]. Attackers can adopt man-in-the-middle (MITM) attacks to impersonate EMV credit cards in response to the authentication approval message of a merchant’s point of sale (POS) terminal. Attackers then enter an arbitrary personal identification number (PIN) to complete a transaction, rendering the PIN of the original credit card invalid [7,8]. Because EMV has not mandated the encryption of credit card transaction messages, attackers can steal credit card numbers and other personal information [9,10] and, in turn, access transaction information that facilitates attackers’ online [9] and offline [11] use of a credit card stolen from the original cardholder. If a credit card uses dynamic data authentication (DDA) or combined DDA/application cryptogram generation (CDA) to protect and confirm the source of transaction messages, then the data freshness of every transaction can be ensured to avoid replay attacks because the Dynamic Data Authentication Data Object List (DDOL), which is a transaction message generated through DDA regulation, must contain Signed Dynamic Application Data (SDAD), which is composed of POS-generated random numbers, DDOL-designated POS dynamic data, and dynamic numbers generated with time-variant parameters. However, because the subsequent transaction message is unsigned, verifying that the subsequent transaction is conducted by the same card remains impossible [12]. For CDA, because transaction messages are not included in a card reader’s identification information, malicious attackers can impersonate an automated teller machine (ATM) or POS and send a message regarding the expected time of attack to trick a user’s card into performing transactions. Moreover, random number generators used in POS and ATMs can predict the subsequent random number; this type of attack is called a preplay attack [13,14,15]. To address this problem, Yang developed an EMV credit card protocol (EPMAR) [16], using mutual authentication to verify the POS identity of the store communicating with the card. This protocol can prevent attackers from masquerading as a POS to preplay messages. With a session key, the protocol avoids the problem whereby the same random number can generate identical messages regarding legitimate transactions. Tso’s protocol further enhanced consumer privacy [17].
In this study, we propose a transaction protocol that is applicable to devices, compatible with EMV protocols, requires no alteration of user behavior, and avoids relay attacks on ambient authentication. Moreover, the proposed protocol can address the following security problems:
  • Cardholder authentication problems: Murdoch et al. [8] indicated that, in EMV protocols, because a card reader and credit card are not synchronized for PIN verification and signature verification, attackers are able to enter arbitrary PINs to complete a transaction.
  • EMV authenticates only the card, not the POS terminal: Liu et al. [7] and Murdoch et al. [8] indicated that attackers can access card information by using EMV-supported readers.
  • Transaction message is not encrypted: Haselsteiner et al. [9] and Hancke et al. [10] identified that an unencrypted transaction message communicated through NFC is susceptible to skimming. Attackers can use this message to successfully perform online [9] or offline [11] transactions.
  • Preplay attacks: Attackers use prerecorded transaction messages to perform transactions with the same random number and payment amount [13,14,15].
  • Relay attacks: Attackers holding a device in close proximity to a POS terminal forward a transaction to the device performing the real transaction from a distance, and the merchant unknowingly completes the transaction with a remote victim’s credit card.
Section 2 of this paper discusses the attack model, Section 3 summarizes the related works, Section 4 of this paper presents a discussion of our proposed method, Section 5 describes our ambient authentication experimental results, Section 6 provides a security analysis of our proposed protocol, and Section 7 concludes this study and provides future research directions.

2. Attack Model

Attackers can, nonetheless, launch a relay attack, in which an attacker holding a device near a POS terminal forwards a transaction to the device performing the actual transaction from a distance, and the merchant unknowingly completes a transaction with a remote victim’s credit card. Relay attacks can be divided into three types according to the degree of influence and impact [18]. The first type of relay attack is the distance fraud attack [19] or wormhole attack [20], as illustrated in Figure 1; an attacker’s transaction device shortens message transmission time by relaying a POS demand in advance. This enables the attacker to misrepresent the distance between a POS and a transaction device as being shorter than it is. This type of attack is realistically unlikely to result in monetary loss because merchants are usually aware that the consumer is physically absent.
The second type of relay attack is the terrorist fraud attack [21], as shown in Figure 2. Attacker 1 relays a transaction message to Attacker 2, who is farther away, leading the merchant’s POS to believe that Attacker 1 is in close proximity, and the merchant therefore completes the transaction with Attacker 1. In this attack mode, Attacker 2, who completes the transaction, is proof that he or she (Attacker 2) is not at the purchase location, and the bank may thus have to bear the cost of consumption. However, the impact of this attack is relatively limited because the attacker must partake in all dispute-handling processes, increasing his or her identity exposure.
The third type of relay attack is a mafia fraud attack, which has the largest impact. As shown in Figure 3, an attacker initiates an authentication request by using the Malicious POS controlled by the attacker and a victim’s credit card. The attacker then sends information that he or she obtains to the device of another attacker who is farther away. This type of attack was first developed by Desmedt et al. [22].

3. Related Works

As described in the previous attack model, Mafia fraud attacks have been proven by numerous studies to successfully facilitate the unauthorized use of a victim’s credit card for contactless payments [23,24,25] or NFC-based phones [5,26,27,28,29,30,31]. Because credit cards in general are not equipped with a block-reading function, attackers can complete numerous contactless transactions with a victim’s credit card in a crowded environment, such as the Taipei Metro, during rush hour. Frequent launches of this type of attack pose problems for financial order.
To solve relay attack problems, Chothia et al. developed a PaySafe protocol to ensure that a merchant’s POS and the credit card with which the transaction is performed are in close proximity [32]. Thereafter, in 2015, EMV integrated distance-bounding protocols into contactless card transaction standards to detect relay attacks [33]. However, card response time and card transaction time must be a maximum of 0.1 s and 0.5 s, respectively [34]; therefore, a highly accurate timer and special hardware are required to calculate message response time to detect relay attacks and avoid false positive and false negative results [35]. Studies have focused on the use of built-in mobile-phone sensors to verify whether a consumer’s payment device is located in the same environment as a merchant’s POS.
Ambient authentication involves, for example, the use of global positioning systems (GPSs), Bluetooth, Wi-Fi, audio sensors, light, or temperature sensors [35,36,37,38,39,40] in mobile phones to verify that two devices are at the same location and thus reduce the threat of relay attacks. Mehrnezha et al. compared the similarity of the accelerometer data measured when the mobile phone is used to tap the POS to ensure that both devices are at the same location [39]. However, this solution is only effective if users change the manner in which they use credit cards. Halevi et al. proposed a detection method that uses sound or light [35]; when sampling ambient factors, Halevi et al. did not account for the sound randomly generated by the POS terminal at the time or the sound used in combination with an ambient-light-sensing message. For this reason, attackers can forward a transaction message to other locations with similar ambient audio and light factors to pass authentication, or attackers can relay previously recorded ambient authentication information to bypass authentication checks. Ma et al. proposed the use of GPS to verify that a POS and credit card-linked phone are at the same location [37]. For this solution, Ma et al. did not indicate methods to integrate sensing information into EMV protocols and achieve compatibility with existing EMV protocols, nor did they prove their method to be resistant to the majority of currently known attacks on online and offline card transactions.

4. An Ambient Authentication Payment Fraud Protection Method Compatible with EMV Card Protocol

We propose an EMV-compatible transaction protocol that avoids the distance fraud attack, the terrorist attack, and the Mafia fraud attack. We used only current EMV commands and adopted the reserved-for-future-use (RFU) field in the command parameter to send the message we added, thereby further securing user–merchant transactions. The proposed protocol performs a transaction through the EMV transaction protocol and is integrated with ambient authentication to avoid relay attacks.
The EMPAS protocol involves the same participating roles as the original EMV protocol. These include the acquiring bank, issuing bank, token service provider (TSP), user with NFC-enabled phone, and merchant (POS). Assumptions for their functions and environment are defined as follows:
  • User’s NFC-enabled phone: This has a secure storage environment to ensure that it possesses an SE or HCE-sensitive data (including tokens, keys, and programs deployed within).
  • TSP: In the initial phase, the TSP generates a unique token number, and the token is securely sent to a secure storage environment in the user’s phone.
  • Acquiring bank: This bank is responsible for deploying a POS to merchants. It connects to the issuing bank through a financial network to verify the transaction information.
  • Issuing bank: This cooperates with the TSP and is responsible for managing user’s cards.
  • Merchant: This uses an acquiring bank’s POS terminal and user’s NFC-enabled phone to send transaction information to the acquiring bank through a financial network.
The symbols and their definitions are presented in Table 1.
Figure 4 illustrates the four transaction phases when users use mobile devices to pay with their credit card. Phase 1 is the ambient factor sampling phase. Before a phone and POS commence the EMV protocol, accelerometer values change when users tap their phones to the POS terminal, and the POS terminal requests audio sampling by the user and merchant. This phase occurs before the EMV transaction protocol is initiated; it therefore does not include the sampling time as adopted for EMV’s maximum 500 ms transaction time requirement. Phase 2 is the mutual authentication phase, in which the user and merchant use their certificate to authenticate each other. Phase 3 is the ambient authentication phase: After the merchant receives the user’s ambient samples, the ambient samples of both parties are compared to verify that both transacting parties are at the same location. The actual transaction phase ensues when authentication is successful; otherwise, transaction is terminated. Phase 4 is the transaction phase.
  • Phase 1 Ambient Factor Sampling Phase
Consumers swipe their credit cards by tapping their mobile phones to the merchant’s POS terminal, changing the POS terminal’s accelerometer value. At this point, the POS terminal randomly generates a soundwave of frequency 18 to 22 KHz that is imperceptible to the human ear but supported by general phone speakers. The terminal then sends out a message requesting that the phone conduct sound sampling. After the message is sent, the POS terminal plays this soundwave as a challenge message. After a consumer’s phone receives the challenge, the phone and POS concurrently record the ambient sound for 1 s. At the end of sampling, the phone stores the audio samples and valid time in a secure storage environment. Thus, for every transaction, this approach can prevent attackers from forwarding transaction messages to a place with a similar environment and from replaying previously recorded ambient sounds to pass authentication.
  • Phase 2 Mutual Authentication Phase
When users initiate a transaction, they must unlock their payment app first. After unlocking is complete, the transaction proceeds as shown in Figure 5. The merchant sends a SELECT message to request the card to provide the type of card it supports. After the message is received, the card responds to the merchant with the application identifier (AID) of the phone-supporting card type, and the merchant then returns the selected AID. After the message is received, the phone generates a random number R p and sends the file control information (FCI) message required for subsequent messages, where FCI = (PDOL, R p ) . Because the Processing Options Data Object List (PDOL) must be used in the next command to send the protocol’s new certificate data, EMV’s optional tag is used to indicate data the merchant must send in the PDOL field in the next command GET PROCESSING OPTIONS. In addition, we followed EMV’s Book 3 specifications [34] to create a new tag providing returned messages with a new field to send the random number R p to the merchant.
Next, Messages 3–4 are as illustrated in Figure 5. The protocol of mutual authentication between the merchant and credit card employs EMV’s original three-level certificate verification mechanism [34].
The merchant first receives the response message, comprising the successfully selected card AID, the random number Rp, and the control message FCI of the PDOL, requesting that the merchant send data. The merchant sends the command GET PROCESSING OPTIONS to return the completed PDOL field required by the card and three tags newly defined for the EPMAR to enable the card to verify the merchant’s message: a random number Rm, the merchant’s certificate C e r t m a c q , and the acquiring bank’s certificate C e r t a c q f c a , as well as the list of authentication methods supported by the credit card in the mobile phone as stipulated in the EMV protocol and the data that must be accessed afterwards. After the phone receives the message, it uses the public key P K f c a to verify the source of C e r t a c q f c a and takes the acquiring bank’s public key P K a c q q to verify the source of C e r t m a c q . If the two certificates are verified, then the phone implements the following:
  • It retrieves the merchant’s public key P K m from the merchant’s C e r t m a c q .
  • It increases the application transaction counter (ATC) by 1.
  • It generates a random number Sp and uses it as the key to hash S m a s = H M A C S p R p ,   R m and TK= H M A C S m a s R p ,   R m , and it writes the encrypted secret E P K m S p and encrypted certificates E T K C e r t e m v i s s ,   C e r t i s s f c a into the first designated address of the application file locator (AFL).
  • It sends the address to the merchant and then uses the command READ RECORD to sequentially read the AFL, which is the address of all the card information including authentication and transaction procedures.
  • It sends the application interchange profile (AIP), which is tagged to indicate support for mutual authentication.
If verification fails, the transaction is aborted.
  • Message 5
After the merchant receives the message indicating support for mutual authentication, it uses GET DATA to request the card’s ATC. Mutual authentication commences.
  • Message 6
When the merchant receives an ATC message from the phone, the merchant sends the command READ RECORD containing the first AFL address to the phone. When the phone receives this command, it follows the command and retrieves the E P K m S p and E T K C e r t e m v i s s ,   C e r t i s s f c a , which are calculated in advance when Message 3 is received, from the address indicated in the AFL, and then sends it directly to the merchant, thus enabling the merchant that owns the corresponding private key to decrypt the data to protect the certificate C e r t e m v i s s containing private information PAN.
  • Messages 7~8
When the merchant receives the encrypted certificate E P K m S p , it retrieves Sp by using its private key S K m to decrypt E P K m S p . It employs the secret value Sp and the key hash function to create S m a s = H M A C S p R p ,   R m and TK= H M A C S m a s R p ,   R m , and it then uses the session key TK to decrypt E T K C e r t e m v i s s ,   C e r t i s s f c a , retrieving the certificates C e r t e m v i s s   and   C e r t i s s f c a . Next, it uses the public key P K f c a to verify the source of the issuing bank’s C e r t i s s f c a and the user’s C e r t e m v i s s . If both certificates are verified, the phone adopts the following steps:
  • It retrieves the card’s public key P K e m v from the card’s certificate C e r t e m v i s s . It uses S m a s as a key to hash all previously received messages and the ATC-calculated message authentication code (MAC) H M A C S m a s ( R p || R m || C e r t m a c q || C e r t e m v i s s || S p ||ATC), using the private key S K m to encrypt and produce a u t h m = E S K m ( H M A C S m a s ( R p || R m || C e r t m a c q || C e r t e m v i s s || S p ||ATC)), where the ATC is the current transaction number, which ensures that both parties are in the same session.
  • In an EPMAR, the merchant uses the RFU field of the command VERIFY to send a u t h m for the phone to authenticate the merchant.
When the phone receives the command VERIFY with a u t h m , it uses the merchant’s public key P K m to retrieve the MAC from a u t h m and uses the previously stored messages, S m a s , and key hash function to calculate the MAC and establish whether the received MAC equals the calculated MAC. If both MAC values are equal, the merchant is authenticated. Subsequently, the phone implements the following:
The phone uses S m a s to hash all previously received messages and uses the ATC to calculate a MAC. It then uses the private key S K e m v to encrypt the MAC into a u t h p = E S K e m v ( H M A C S m a s ( R p || R m || C e r t m a c q || C e r t e m v i s s || S p || a u t h m ||ATC)) and saves a u t h p in the AFL location of the second data set.
  • The phone hashes ambient factor data into the MAC, after which it employs the generated session key to encrypt the transaction data Data e m v , the ambient factor message A m b i e n t D a t a p , and the MAC H( A m b i e n t D a t a p ), all of which are subsequently used, into E T K ( D a t a e m v , A m b i e n t D a t a p , H( A m b i e n t D a t a p )), and saves it in the location of the third dataset in AFL.
  • The phone returns a message to indicate successful authentication.
Otherwise, the phone returns a message to indicate failed authentication and aborts the transaction.
  • Message 9
When the phone receives the merchant’s command READ RECORD containing the second AFL address, the phone sends the preproduced a u t h p to the merchant. After the merchant receives a u t h p , it decrypts a u t h p with the public key P K e m v , and retrieves the MAC from it. The merchant then uses S m a s as a key to hash the previously saved messages to calculate the authentication code and compare the retrieved MAC with the calculated code for credit card authentication. If both codes match, authentication is successful, and mutual authentication is completed.
In Message 3, GET PROCESSING OPTIONS is used to send the merchant and acquiring bank’s certificates to the user; after the mutual authentication phase, the user and merchant have verified each other’s identity. In the next phase, the user advances into the ambient authentication phase.
  • Phase 3 Ambient Authentication Phase
After mutual authentication is completed, the mobile phone receives the merchant’s command READ RECORD containing the third AFL address, as shown in Figure 6, to request the data required for the transaction from the phone. After the phone receives this command, it sends the E T K ( D a t a e m v , A m b i e n t D a t a p ,H( A m b i e n t D a t a p )) produced in the authentication phase to the merchant.
After the message is received from the phone, the merchant decrypts it with the session key TK, retrieving D a t a e m v , A m b i e n t D a t a p ,H( A m b i e n t D a t a p ). First, the phone follows the EMV protocol, using the original static data authentication (SDA) and the issuing bank’s signed static data authentication (SSAD) in Data e m v to verify the integrity of other data Data e m v . If the integrity is verified, the received A m b i e n t D a t a p is hashed, using the same hash function, into H A m b i e n t D a t a p , which is then compared with the hash value from the phone to determine whether they match. If the two match, the validity of E x p i r e T i m e a u d i o from the phone is verified. If the valid time is valid, the verification result is written into b3 (the RFU field) of the terminal verification results’ (TVR’s) Byte 4. If all comparisons are correct and the ambient factor is received in time, then (1) to (3) are used to compare the received and self-recorded ambient factors [35]. Ambient factors are compared using different domains:
  • Time domain: To test the similarity between time-based signals X i and X j , their energy is first normalized such that the total energy of each signal equals 1. Next, a correlation or difference comparison is conducted. In the correlation comparison method, the correlation between every two signals is calculated, and the largest correlation is adopted:
    S c ( i , j ) = max ( Cross     Corr ( X i , X j ) )   and   D c ( i , j ) = 1 S c ( i , j )
In the difference comparison method, the distance between the signal’s bit is calculated:
D d ( i , j ) = | | X i     X j | |   and   S d ( i , j ) = 1 D d ( i , j )
  • Frequency domain: Fast Fourier transform (FFT) is used to convert signals from the time domain to the frequency domain, and the frequency coefficient of each signal is calculated. Next, the correlation and the difference between the FFT coefficients are calculated to assess the similarity of the two.
  • Time–frequency-based: Time domain and frequency domain results are combined, and (3) is employed:
    D ( i , j ) = D c , t i m e i , j 2 + D d , f r e q u c n c y i , j 2 and   S ( i , j ) = 1     D ( i , j )
If similarity is smaller than the threshold value, the verification result is written into b1 (RFU field) of TVR’s Byte 2. Finally, the merchant determines whether to reject the transaction or enter the transaction phase, depending on the TVR, as shown in Figure 7.
When the verification results do not match, and a merchant opts to reject a transaction, the merchant writes CDOL1 in D a t a e m v into D a t a c d o l 1 —the data required by the issuing banking requires for a transaction—and encrypts it with TK. As shown in Figure 8, the merchant follows EMV protocol specifications to transmit the command GENERATE AC containing AAC (rejection of transaction) and previously produced D a t a c d o l 1 to the mobile phone. After the phone receives the command, it decrypts E T K ( D a t a c d o l 1 ) with TK, obtaining D a t a c d o l 1 .
Next, the phone follows EMV’s protocol content, employing the user–issuer shared key K m a c e m v to hash the received D a t a c d o l 1 , the current transaction number ATC, and a random number R m obtained from the merchant during mutual authentication, into message AC. Finally, the phone encrypts AAC, ATC, and AC with TK and returns the encrypted message to the merchant.
If a user’s transaction is not rejected, the merchant requests that the phone generate an online Authorization Request Cryptogram (ARQC) and write CDOL1 in D a t a e m v into D a t a c d o l 1 , the data that the issuing bank requires for a transaction, to carry out the transaction.
  • Phase 4 Transaction Phase
When the function in Phase 3 confirms a transaction, the transaction process is as shown in Figure 9. The merchant sends a request (Req) for an online transaction and uses the session key TK to encrypt D a t a c d o l 1 from Phase 3 into E T K D a t a c d o l 1 , and it then sends Req and E T K D a t a c d o l 1 to the phone with the command GENERATE AC.
  • Messages 10~11
When the phone receives the command GENERATE AC with Req from the merchant, it decrypts the transaction data with TK to obtain D a t a c d o l 1 .
At this point, the transaction amount in D a t a c d o l 1 is displayed on the phone screen for consumer verification. If its correct, the phone proceeds with three steps to generate the data required for EMV payment:
  • It uses K m a c e m v , the key shared with the issuing bank, to hash the transaction data D a t a c d o l 1 received from the merchant, the current transaction number ATC, and a random number R m from mutual authentication, as well as the ambient factor of the transaction A m b i e n t D a t a p , into MAC AC1= M A C K m a c e m v D a t a c d o l 1 ,   A T C ,   R m ,   A m b i e n t D a t a p .
  • It hashes the random number from mutual authentication Rp, the type of AC1 Req, AC1, and the data of AC1   D a t a c d o l 1 ,   A T C ,   R m , A m b i e n t D a t a p .
  • It uses the private key SK emv of the EMV credit card to generate SDAD from R p ,   R e q ,   A C 1 , and the hash result H ( R p , R e q , A C 1 , R m , D a t a c d o l 1 , A T C , A m b i e n t D a t a p ) from the preceding step.
Finally, the phone uses the session key TK to encrypt R e q , A T C , and SDAD and transmits the encryption to the merchant.
  • Messages 12~13
After the merchant receives E T K R e q , A T C , S D A D from the phone, it decrypts the received message with TK, obtaining R e q , A T C , and SDAD. The merchant then uses the card’s public key P K e m v to decrypt SDAD and verifies that its hashed value is correct. If the value is correct, the merchant sends R e q ,   D a t a c d o l 1 ,   A T C ,   R m ,   A C 1 ,   A m b i e n t D a t a p   and   AmbAuthResult to the issuing bank for online transaction. A m b i e n t D a t a p and AmbAuthResult are also sent for the issuing bank to verify whether the ambient factor has expired and whether it is within the valid period at the time of verification.
The bank uses shared key K m a c e m v ,   D a t a c d o l 1 in the message, A T C ,   R m ,   A m b i e n t D a t a p to calculate the MAC value and compares it with the received AC1 to determine whether they are equal. The bank then verifies whether the E x p i r e T i m e a u d i o in A m b i e n t D a t a p has expired, whether AmbAuthTime in AmbAuthResult is within the E x p i r e T i m e a u d i o , and whether CompareResult matches the configured threshold value.
If the message is correct, the issuing bank conducts a risk management check required for online transactions with the original credit card; for example, it checks whether the accumulated transaction exceeds the credit limit. If AC1 is incorrect, the E x p i r e T i m e a u d i o in A m b i e n t D a t a p has expired, AmbAuthTime in AmbAuthResult is not within the E x p i r e T i m e a u d i o , and CompareResult does not match the threshold value or the transaction is rejected after a risk management check, ARC is set as fail. Otherwise, ARC is set as success. Finally, the issuing bank follows EMV rules to use K m a c e m v to produce the mutual exclusivity result of ARC and AC into M A C K m a c e m v A C A R C with K m a c e m v and sends ARC to the merchant.
  • Messages 14~15
After a merchant receives an authorization result from the bank, the merchant uses command EXTERNAL AUTHENTICATE to decrypt the bank’s message M A C K m a c e m v A C A R C and ARC with TK and sends the decrypted message to the consumer’s phone.
When the phone receives the message, it decrypts the message with session key TK, conducts XOR with the calculated AC and the decrypted ARC, uses the shared key K m a c e m v to compute M A C K m a c e m v A C A R C , and checks whether the calculated MAC matches the received M A C K m a c e m v A C A R C . If both MAC match, ACK is set as success. Otherwise, ACK is set as fail. Finally, ACK is encrypted with TK and is returned to the merchant.
  • Messages 16~17
After the merchant receives a response from the phone, it unlocks the message with TK, obtaining ACK. If ARC in Message 13 is set as success and ACK is set as success, the merchant sets Req = TC to indicate that the transaction is complete. Otherwise, it sets Req = AAC to indicate that the transaction is declined. The merchant then uses TK to send D a t a c d o l 2 , the data required for the second GENERATE AC command as stipulated by the EMV protocol and the completed Req to the phone. When the user receives the second GENERATE AC command, the user follows the EMV protocol to hash all necessary data with the shared key K m a c e m v to generate A C 2 = M A C K m a c e m v D a t a c d o l 1 , D a t a c d o l 2 , A T C ,   R m , and then uses TK to encrypt Req, ATC, and AC2 to the merchant.
  • Message 18
After the merchant receives the message from the phone, it decrypts the message with TK and follows the original process to send the EMV-required data to the issuing bank for completion of the online transaction.

5. Experimental Results and Performance Analysis

5.1. Physical Environment

In our experiments, we used an NFC-enabled smartphone to simulate a consumer, and another smart phone to act as a POS. To simulate the real consumption environment, we performed experiments from areas where mobile payment is commonly used, including restaurants, convenience store A, convenience store B, and a hypermarket.
The consumer’s phone featured a Qualcomm SDM845 2.8-GHz CPU, a 6-GB memory, and the Android 10 operating system. The phone used as a POS featured a Qualcomm S4 APQ8064 1.5-GHz CPU, a 2-GB memory, and the Android 5.1.1 operating system. We adopted the Android API Level 29 library to implement EMPAS’s and EMV’s consumer-end programs and the Android API Level 22 library to implement EMPAS’s and EMV’s merchant-end programs.
To analyze the lengths of protocol-required messages, we organized EMV-defined [34] data lengths, as shown in Table 2. For example, the SDAD used for card authentication is defined as Lr, where Lr denotes the length of the RSA key used.

5.2. Ambient Factor Sampling and Comparison Method

In this experiment, when users pay with their mobile phones, the phone’s accelerometer value changes, and, when the phone is tapped on a POS, the POS’s accelerometer value also changes, providing an extremely intuitive method of triggering the POS for the subsequent action. Sound was used to represent the unique moment of every sampling. Therefore, we generated additional soundware of frequency 18 to 22 GHz to ensure the sampling of various ambient factors every time. We collected samples from the experiment areas and the sampling results were paired for comparison to ensure the ability of our protocol to detect two devices at the same location. Regarding audio comparison methods, Halevi et al. [35] found that time–frequency-based methods are the most accurate (53%), followed by frequency-based methods (50%), and time-based methods are the least accurate (38% and 14%).
In our experiment, we selected the frequency-based method for comparison because, although the time–frequency-based method demonstrates the greatest accuracy, the correlation comparison of the frequency domain coefficient in equation (3) computed using our Sony Xperia XZ2 has exceeded EMV’s specification that the NFC between a phone and POS must be less than 100 ms. Frequency-based calculation using (1) takes 94 ms and, because NFC message-transmission time must be less than 100 ms, we adopted the frequency domain method in (1) to compare ambient sounds.

5.3. Comparison Results

Per the experimental results, various threshold values were used to calculate the false positive rate (FPR) and false negative rate (FNR). The FPR and FNR were calculated using (4), and the results were plotted onto a receiver operating characteristic (ROC) curve. As shown in Figure 10, when the threshold = 0.606, the point of intersection of the two curves is the equal error rate (9.6%) of this method. Our experimental results reveal that our use of an accelerometer combined with a comparison of ambient sounds exceeded 90% accuracy irrespective of whether an attacker was located in a space similar to the audio environment:
FPR = F P F P + T N ,   FNR = F N F N + T P

5.4. Execution Time

To ensure that the overall transaction time of our EMPAS protocol remains within the EMV-required transaction time, we analyzed our protocol’s total duration, including transmission time and computational time used by a POS and a mobile phone, to verify that the proposed verification procedure does not cause transaction failure.
According to the total message length required in Table 3, we used the fastest transmission speed of 6780 kbit/s when both NFC devices were in active mode for transmission to calculate our protocol-required transmission time, as shown in Table 4.
Our calculated computational time includes expressions for encryption or decryption, hash generation, random number generation, key generation, and ambient factor comparison, as indicated in Table 5 and Table 6.
Because the EMV standards require a transaction to be completed in 500 ms [34], we defined protocol execution time as the sum of card computational time, merchant computational time, and message transmission time. As shown in Table 7, an RSA of 3072 bits causes the protocol to exceed the EMV-required time, but an RSA smaller than or equal to 2560 bits enables the protocol to complete a transaction within 500 ms.

6. Security Analysis

Our protocol assumes that mobile phones have a secure storage and execution environment, that the merchant’s reader is secure, and that the reader communicates with the bank through a secure channel. In this section, we discuss how messages communicated between a phone and reader can be eavesdropped, tampered, and subjected to replay and relay attacks.
A.
Mutual authentication:
Our method assumes that a mobile phone and a merchant’s reader can exchange and verify the certificates. Therefore, the phone and the reader can obtain each other’s public keys. Next, the reader uses its private key to encrypt all the received data into a u t h m and sends it to the phone in Message 7. The phone uses the merchant’s public key P K m to decrypt a u t h m and verify data. At this point, the phone has completed authenticating the merchant. Likewise, the phone sends the private-key-encrypted a u t h p in Message 9, and the merchant decrypts it and verifies the data, thus authenticating the phone.
B.
Confidentiality:
In Message 3, the phone receives R m from the merchant, generates another secret value S p , and creates a session key TK. In Message 6, the phone encrypts the secret value S p with the merchant’s public key. All messages after Message 6 are encrypted with this session key TK, thereby ensuring the confidentiality of the messages, and guaranteeing that transaction messages including the credit card number, transaction data, and the transaction amount are not accessed by a third party other than the merchant.
C.
Prevention of replay attack:
Because messages following Message 6 are all encrypted by TK and because TK is created with the random numbers R m , R p , and S p , an attacker cannot replay previous transaction messages, nor can they deceive a merchant because the current TK is different from the previous TK. Moreover, an ambient factor’s valid time is checked in the ambient authentication phase, and replaying a message causes a transaction to be declined because it has passed the valid time.
In each transaction, we created additional noise to ensure the sampling of various ambient factors every time to prevent replay attack. High-frequency sound decays as it is transmitted through the air. At more than one meter, the intruder will not be able to retrieve the original sample. When users pay with their mobile phones, the phone’s accelerometer value changes, and, when the phone is tapped on a POS, the POS’s accelerometer value also changes. The attacker cannot retrieve the accelerometer value. Therefore, it is difficult for an attacker to replay the message without being discovered by the user.
D.
Integrity:
Messages in all transmitted data contain an MAC, such as Messages 3 and 6 or a u t h p and a u t h m in the MAC of Messages 7 and 9. In the ambient authentication phase, SSAD, the hash value of all data D a t a e m v is retrieved from the card to confirm whether a message has been modified. In the transaction phase, message integrity is protected using the same method as that for existing credit card transactions. Therefore, if an attacker modifies a message, it can be detected by the MAC.
E.
Non-repudiation:
With our protocol, a phone and merchant can authenticate each other, and the EMV’s transaction protocol in the phone requires a signed AC’s private key, S K p , and a secure storage and computation environment. Our transaction process follows EMV standards, except that the merchant–phone communications are encrypted with a shared session key; therefore, our protocol and EMV protocol both possess nonrepudiation of card and merchant transactions.
F.
Prevention of MITM attacks:
Because communications between a phone and merchant are encrypted, the phone and merchant perform mutual authentication to verify each other’s identity before ambient authentication and transaction are possible. In addition, attackers cannot launch replay attacks to pass mutual authentication and ambient authentication, and our protocol verifies message integrity. Attackers are discovered if they insert any message. Therefore, attackers cannot masquerade as a merchant or phone to launch MITM attacks.
G.
Prevention of preplay attacks:
Bond et al. [14] indicated that a malicious merchant may record a transaction message and replay it in a legitimate store because the merchant’s random number generator is problematic. Our protocol provides mutual authentication, which requires attackers to communicate with merchants by using the correct private key before they can pass mutual authentication. Therefore, attackers cannot prerecord messages without the collaboration of a legitimate store. Because attackers cannot retrieve or create a u t h m , which is exclusive to the merchant, they cannot generate the MAC a u t h p required for a u t h m in advance. During ambient factor sampling, attackers cannot easily make legitimate stores replay an audio frequency identical to that which has been prerecorded to pass the ambient authentication phase.
H.
Prevention of relay attacks:
In the ambient factor sampling phase, we incorporated a challenge sound that is imperceptible to the human ear. The POS terminal and mobile phone simultaneously sampled the sound and assigned a valid time for the sample value. During the ambient authentication phase, the phone transmits the sampling result and valid time to the POS, and verification is performed by the POS. If similarity reaches the threshold value, the transaction commences; otherwise, the transaction is rejected. Similar ambient factors mean that both parties are located in a similar environment and, therefore, can be confirmed to be in close proximity, thereby preventing a relay attack. The summary of security analysis is shown in Table 8.
Next, we use the GNY logic to proof the correctness of our work [41]. The symbols used in the GNY logic proof can be found in Table 9.
Table 9. Notations of the proof.
Table 9. Notations of the proof.
PPhone
MMerchant
{ X } K ,   { X } K 1 Uses the symmetric key K to encrypt/decrypt the message X .
{ X } + K ,   { X } K Uses the asymmetric key K to encrypt/decrypt the message X .
H X Message X is protected by a one-way hash function H X .
P X P has received message X .
P X P possesses message X .
P X P is told for X which he did not convey previously.
P X P believes X is fresh.
P X P believes   X is recognizable.
P P S Q P believes S is shared by P and Q .
A. Initial assumption:
In the beginning of the protocol, the phone holds
  Data e m v , S K e m v , C e r t e m v i s s , C e r t i s s f c a , P K f c a
And the merchant holds
So,
P D a t a e m v
P S K e m v
P P K f c a
P C e r t e m v i s s
P P K e m v + S K i s s
P C e r t i s s f c a
P   P K i s s + S K f c a
And
M S K m
M P K f c a
M C e r t m a c q
M P K m + S K a c q
M C e r t a c q f c a
M P K a c q + S K f c a
B. Goal of the proof:
Goal #1: M P S p M (M believes he share S p with P)
Goal #2: P M P R p ,   R m M (Both M and P believe they share R p ,   R m )
Goal #3: P   M P T K M (Both M and P believe they share T K )
Goal #4: P   P A m b i e n t D a t a p M (M believes he shares AmbientDatapwith P)
C. Proofple:
Mutual Authentication Phase:
Message 2:
P R p
M   R p
M R p
M   R p (Rule T1)
M   R p (Rule P1)
Message 3:
M R m
P     R m ,   C e r t m a c q ,   C e r t a c q f c a
P   R m ,   C e r t m a c q ,   C e r t a c q f c a
P   R m ,   C e r t m a c q ,   C e r t a c q f c a (Rule T1)
P   R m ,   C e r t m a c q ,   C e r t a c q f c a (Rule P1)
P   R m ,     P K m + S K a c q ,   P K a c q + S K f c a
P   P K a c q (Rule P8)
P   P K m (Rule P8)
P   R m   (Rule P1)
P   P K a c q (Rule T1)
P   P K m (Rule T1)
P   R m   (Rule F1)
Message 4:
P S p
Message 5:
M     A T
M   A T C
P   A T C (Rule T1)
P   A T C (Rule P1)
Message 6:
M     S p + P K m ,   C e r t e m v i s s , C e r t i s s f c a T K
M     S p + P K m ,   C e r t e m v i s s , C e r t i s s f c a T K
M     S p + P K m ,   C e r t e m v i s s , C e r t i s s f c a T K (Rule T1)
M     S p     (Rule T4)
M     S p (Rule P1)
M P     S p   (Rule I6)
M   P S p   M (Goal #1)
M       C e r t e m v i s s , C e r t i s s f c a (Rule T3)
M       C e r t e m v i s s , C e r t i s s f c a (Rule P1)
Since C e r t e m v i s s = P K e m v + S K i s s ,   C e r t i s s f c a = P K i s s + S K f c a , we got
M     P K e m v + S K i s s
M   P K i s s + S K f c a
M     P K i s s (Rule P8)
M     P K e m v   (Rule P8)
M   H S p R p ,   R m   (Rule P2)
M     S m a s
M     H S m a s R p ,   R m   (Rule P2)
M   T K
M   E S K m ( H m a s R p R m C e r t m a c q   C e r t e m v i s s S p A T C (Rule P2)
M E S K m ( H m a s R p R m C e r t m a c q   C e r t e m v i s s S p A T C (Rule P2)
Message 7:
P     a u t h m
P   a u t h m
P   a u t h m (Rule T1)
P   a u t h m (Rule P1)
P   { H S m a s ( R p R m C e r t m a c q C e r t e m v i s s S p A T C } + S K m
P H S m a s R p R m C e r t m a c q C e r t e m v i s s S p A T C (Rule T6)
P   R p R m C e r t m a c q C e r t e m v i s s S p A T C (Rule F11)
P M   R p R m C e r t m a c q C e r t e m v i s s S p A T C (Rule I6)
P M   R p R m (Goal #2)
Message 9:
M     a u t h p
M   a u t h p
M   a u t h p (Rule T1)
M   a u t h p (Rule P1)
M { H s m a s ( R p R m C e r t m a c q C e r t e m v i s s S p a u t h m A T C } S K e m v  
M H s m a s ( R p R m C e r t m a c q C e r t e m v i s s S p a u t h m A T C )   (Rule T6)
M R p R m C e r t m a c q C e r t e m v i s s S p a u t h m A T C (Rule F11)
M P   R p R m C e r t m a c q C e r t e m v i s s S p a u t h m A T C (Rule I6)
M P   R p R m   P M P R p ,   R m M (Rule J2), (Goal #3)
Ambient Authentication Phase
(Phone side)
P D a t a e m v ,  
P A m b i e n t D a t a p  
P T K
P H A m b i e n t D a t (Rule P4)
P D a t a e m v ,   A m b i e n t D a t a p ,   H A m b i e n t D a t a p T K (Rule P6)
(Merchant side)
M   D a t a e m v ,   A m b i e n t D a t a p ,   H A m b i e n t D a t a p T K
M   D a t a e m v ,   A m b i e n t D a t a p ,   H A m b i e n t D a t a p T K
M T K
M   D a t a e m v ,   A m b i e n t D a t a p ,   H A m b i e n t D a t a p T K (Rule T1)
M   D a t a e m v ,   A m b i e n t D a t a p ,   H A m b i e n t D a t a p T K . (Rule P1)
M   D a t a e m v ,   A m b i e n t D a t a p ,   H A m b i e n t D a t a p
(Rule T3)
M P D a t a e m v ,   A m b i e n t D a t a p M (Rule J2), (Goal #4)

7. Conclusions

We proposed an EMV-compatible transaction protocol that not only incorporates three additional commands in the mutual authentication phase to complete mutual authentication, but also involves the same transaction-required commands and sequences used in EMV protocols.
In our protocol, ambient authentication is used to prevent relay attacks. Through the addition of a challenge sound to the original ambient sound, we prevented attackers from passing ambient authentication and completing a transaction in a similar environment.
Compared with the original EMV protocol, our protocol authenticates merchants, encrypts sent messages, and achieves ambient authentication. Our protocol has the ability to detect whether the consumer and the POS are at the same location.
Our approach is not limited to the use of sound as ambient authentication. We use the phone’s accelerometer as another authentication factor. The attacker cannot retrieve the accelerometer value. Therefore, it is difficult for an attacker to replay the message without being discovered by the user.
In addition, the proposed protocol prevents the majority of known attacks in the original EMV protocols, such as MITM and clone attacks, and concurrently protects personal credit card information. Although mutual authentication, ambient authentication, and message encryption considerably increase the computation, message transmission, and storage loads of our protocol compared with EMV protocols, our experimental analysis results reveal that, for an RSA smaller than 2560 bits, the proposed protocol enables a transaction to be performed within EMV’s time requirement of 500 ms.

Author Contributions

Conceptualization, M.-H.Y. and J.-N.L.; Methodology, J.-N.L.; Writing—original draft, M.-H.Y.; Writing—review & editing, M.V. and S.M.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by the Ministry of Science and Technology of Taiwan under Grant MOST 110-2221-E-033-008-and MOST 110-2218-E-A49-011 -MBK and MOST 110-2218-E-002-045–.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. De Luna, I.R.; Liébana-Cabanillas, F.; Sánchez-Fernández, J.; Muñoz-Leiva, F. Mobile payment is not all the same: The adoption of mobile payment systems depending on the technology applied. Technol. Forecast. Soc. Change 2019, 146, 931–944. [Google Scholar] [CrossRef]
  2. Nyamtiga, B.W.; Sam, A.; Laizer, L.S. Security perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania. Intl. J. Tech. Enhanc. Emerg. Eng. Res. 2013, 1, 38–43. [Google Scholar]
  3. Kieseberg, P.; Leithner, M.; Mulazzani, M.; Munroe, L.; Schrittwieser, S.; Sinha, M.; Weippl, E. QR code security. In Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010), Paris, France, 8–10 November 2010. [Google Scholar]
  4. EMVCo. Payment Tokenisation Specification; Version 2.0 ed.; EMVCo, LLC: Foster City, CA, USA, September 2017. [Google Scholar]
  5. Roland, M.; Langer, J.; Scharinger, J. Applying relay attacks to Google wallet. In Proceedings of the 5th International Workshop on Near Field Communication (NFC), Zurich, Switzerland, 5 February 2013; pp. 1–6. [Google Scholar]
  6. Breekel, J.V.D.; Ortiz-Yepes, D.A.; Poll, E.; Ruiter, J.D. Emv in a Nutshell; Technical Report; KPMG: Amstelveen, The Netherlands, 2016. [Google Scholar]
  7. Liu, M.; Xin, Y.; Yang, Y.; Niu, X. Security Mechanism Research of EMV2000. In Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, Silicon Valley, CA, USA, 5–12 November 2007; pp. 307–310. [Google Scholar]
  8. Murdoch, S.J.; Drimer, S.; Anderson, R.; Bond, M. Chip and pin is broken. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 16–19 May 2010; pp. 433–446. [Google Scholar] [CrossRef]
  9. Haselsteiner, E.; Breitfuß, K. Security in Near Field Communication (NFC) Strengths and Weaknesses. In Proceedings of the 2006 Workshop on RFID Security, Graz, Austria, 12–14 July 2006. [Google Scholar]
  10. Hancke, G.P. Practical eavesdropping and skimming attacks on high-frequency RFID tokens. In Proceedings of the 2010 Workshop on RFID Security, Istanbul, Turkey, 7–9 June 2010; pp. 259–288. [Google Scholar]
  11. Heydt-Benjamin, T.S.; Bailey, D.V.; Fu, K.; Juels, A.; O’Hare, T. Vulnerabilities in first-generation RFID-enabled credit cards. In Proceedings of the 11th International Conference on Financial Cryptography and Data Security, Lowlands, Scarborough, Trinidad and Tobago, 12–15 February 2007; pp. 2–14. [Google Scholar]
  12. Ruiter, J.D.; Poll, E. Formal Analysis of the EMV Protocol Suite. In Proceedings of the 2011 Theory of Security and Applications Conference, Saarbrücken, Germany, 31 March–1 April 2011; pp. 113–129. [Google Scholar]
  13. Bond, M.; Choudary, O.; Murdoch, S.J.; Skorobogatov, S.; Anderson, R. Be prepared: The EMV preplay attack. IEEE Secur. Priv. 2015, 13, 56–64. [Google Scholar] [CrossRef] [Green Version]
  14. Bond, M.; Choudary, O.; Murdoch, S.J.; Skorobogatov, S.; Anderson, R. Chip and Skim: Cloning EMV Cards with the Pre-play Attack. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 18–21 May 2014; pp. 49–64. [Google Scholar]
  15. Roland, M.; Langer, J. Cloning credit cards: A combined pre-play and downgrade attack on EMV Contactless. In Proceedings of the 7th USENIX Workshop on Offensive Technologies (WOOT’13), Washington, DC, USA, 13 August 2013; pp. 1–12. [Google Scholar]
  16. Yang, M.H. Security enhanced EMV-based mobile payment protocol. Sci. World J. 2014, 2014, 1–19. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Tso, R.L. Untraceable and anonymous mobile payment scheme based on near field communication. Symmetry 2018, 10, 685. [Google Scholar] [CrossRef] [Green Version]
  18. Cremers, C.; Rasmussen, K.B.; Schmidt, B.; Capkun, S. Distance hijacking attacks on distance bounding protocols. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 20–23 May 2012; pp. 113–127. [Google Scholar]
  19. Brands, S.; Chaum, D. Distance-Bounding Protocols. In Advances in Cryptology—EUROCRYPT’93; Helleseth, T., Ed.; Springer: Berlin/Heidelberg, 1994; pp. 344–359. ISBN 978-3-540-57600-6. [Google Scholar] [CrossRef] [Green Version]
  20. Hu, Y.C.; Perrig, A.; Johnson, D.B. Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 2006, 24, 370–380. [Google Scholar]
  21. Desmedt, Y. Major security problems with the ‘unforgeable’(feige)-fiat-shamir proofs of identity and how to overcome them. In SecuriCom’88; SEDEP: Paris, France, 1988; pp. 15–17. [Google Scholar]
  22. Desmedt, Y.; Goutier, C.; Bengio, S. Special uses and abuses of the fiat-shamir passport protocol. In Proceedings of the Advances in Cryptology—CRYPTO’87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, USA, 16–20 August 1987; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, 1987; Volume 239, pp. 21–39. [Google Scholar]
  23. Hancke, G.P.; Mayes, K.E.; Markantonakis, K. Confidence in smart token proximity: Relay attacks revisited. Comput. Secur. 2009, 28, 615–627. [Google Scholar] [CrossRef] [Green Version]
  24. Hancke, G.P. Practical attacks on proximity identification systems. In Proceedings of the IEEE Symposium on Security and Privacy (SP’06), Berkeley, CA, USA, 21–24 May 2006; pp. 328–333. [Google Scholar]
  25. Kfir, Z.; Wool, A. Picking virtual pockets using relay attacks on contactless smartcard. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), Athens, Greece, 5–9 September 2005; pp. 47–58. [Google Scholar]
  26. Madlmayr, G. NFC devices: Security & privacy. In Proceedings of the Third International Conference on Availability, Reliability and Security, Barcelona, Spain, 4–7 March 2008. [Google Scholar]
  27. Breekel, J.V.D. Relaying EMV contactless transactions using off-the-shelf android devices. BlackHat Asia 2015, 2015. [Google Scholar]
  28. Francis, L.; Hancke, G.P.; Mayes, K.E.; Markantonakis, K. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. Cryptology ePrint Archive: Report 2011/618. Available online: http://eprint.iacr.org/2011/618 (accessed on 28 September 2020).
  29. Francis, L.; Hancke, G.P.; Mayes, K.E.; Markantonakis, K. Practical NFC Peer-to-Peer relay attack using mobile phones. In Radio Frequency Identification: Security and Privacy Issues; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6370/2010, pp. 35–49. [Google Scholar]
  30. Verdult, R.; Kooman, F. Practical attacks on NFC enabled cell phones. In Proceedings of the Third International Workshop on Near Field Communication (NFC 2011), Hagenberg, Austria, 22 February 2011; pp. 77–82. [Google Scholar]
  31. Radu, A.-I.; Chothia, T.; Newton, C.J.; Boureanu, I.; Chen, L. Practical EMV Relay. In Proceedings of the Protection 43rd IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 22–26 May 2022. [Google Scholar]
  32. Chothia, T.; Garcia, F.D.; Ruiter, J.D.; Breekel, J.V.D.; Thompson, M. Relay cost bounding for contactless EMV payments. In Proceedings of the Financial Cryptography and Data Security—19th International Conference FC 2015, San Juan, Puerto Rico, 26–30 January 2015; pp. 189–206. [Google Scholar]
  33. EMVCo. Book C-2: Kernel 2 Specification; Version 2.7 ed.; EMVCo, LLC: Foster City, CA, USA, May 2018. [Google Scholar]
  34. EMVCo. Contact Specification Books; Version 4.3 ed.; EMVCo, LLC: Foster City, CA, USA, November 2011. [Google Scholar]
  35. Halevi, T.; Ma, D.; Saxena, N.; Xiang, T. Secure proximity detection for NFC devices based on ambient sensor data. In Proceedings of the 17th European Symposium on Research in Computer Security, Pisa, Italy, 10–12 September 2012; pp. 379–396. [Google Scholar]
  36. Varshavsky, A.; Scannell, A.; LaMarca, A.; Lara, E.D. Amigo: Proximity-based authentication of mobile devices. In Proceedings of the 10th International Conference on Ubiquitous Computing (UbiComp 2008), Seoul, Korea, 21–24 September 2008; pp. 253–270. [Google Scholar]
  37. Ma, D.; Saxena, N.; Xiang, T.; Zhu, Y. Location-aware and safer cards: Enhancing RFID security and privacy via location sensing. IEEE Trans. Dependable Secur. Comput. 2013, 10, 57–69. [Google Scholar]
  38. Truong, H.T.T.; Gao, X.; Shrestha, B.; Saxena, N.; Asokan, N.; Nurmi, P. Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), Pisa, Italy, 24–28 March 2014; pp. 163–171. [Google Scholar]
  39. Mehrnezhad, M.; Hao, F.; Shahandashti, S.F. Tap-tap and pay (TTP): Preventing the Mafia attack in NFC payment. In International Conference on Research in Security Standardisation; Springer: Cham, Switzerland, 2015; pp. 21–39. [Google Scholar]
  40. Luo, J.N.; Tsai, M.H.; Lo, N.W.; Kao, C.Y.; Yang, M.H. Ambient audio authentication. Math. Biosci. Eng. 2019, 16, 6562–6586. [Google Scholar] [CrossRef] [PubMed]
  41. Gong, R.; Needham, M.; Yahalom, R. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 7–9 May 1990; pp. 234–248. [Google Scholar]
Figure 1. Distance fraud attack.
Figure 1. Distance fraud attack.
Sensors 22 01989 g001
Figure 2. Terrorist fraud attack.
Figure 2. Terrorist fraud attack.
Sensors 22 01989 g002
Figure 3. Mafia fraud attack.
Figure 3. Mafia fraud attack.
Sensors 22 01989 g003
Figure 4. EMPAS transaction process.
Figure 4. EMPAS transaction process.
Sensors 22 01989 g004
Figure 5. Mutual authentication phase.
Figure 5. Mutual authentication phase.
Sensors 22 01989 g005
Figure 6. Ambient authentication phase.
Figure 6. Ambient authentication phase.
Sensors 22 01989 g006
Figure 7. Ambient authentication phase.
Figure 7. Ambient authentication phase.
Sensors 22 01989 g007
Figure 8. Rejection of transaction phase.
Figure 8. Rejection of transaction phase.
Sensors 22 01989 g008
Figure 9. Transaction phase.
Figure 9. Transaction phase.
Sensors 22 01989 g009
Figure 10. RoC curve.
Figure 10. RoC curve.
Sensors 22 01989 g010
Table 1. Notations.
Table 1. Notations.
C e r t t a r g e t p u b l i s h e r A certificate issued by a publisher to a target. For example,   C e r t i s s f c a is issued by a financial certificate authority (FCA) to an issuing bank (issuer). The certificate contains the public key corresponding to the target’s private key
P K t a r g e t A target’s public key, for example, P K i s s is an issuing bank’s public key
S K t a r g e t A target’s private key, for example, S K i s s is an issuing bank’s private key
K e n c e m v Symmetric keys shared between a credit card and issuing bank and are used for encryption
K m a c e m v Symmetric keys shared between a credit card and issuing bank and used to calculate a message authentication code
R m , R p Random numbers
S p A secret value randomly generated by the phone
S m a s A secret value used to generate the session key TK
T K A session key used by a phone to communicate with a store
E k e y M Encryption of message M with a symmetric or asymmetric key, where key is the key used; for example, E K e n c e m v M is the encryption of message M with K e n c e m v
D k e y M Decryption of message M with a symmetric or asymmetric key, where key is the key used; for example, D K e n c e m v M is the decryption of message M with K e n c e m v
M A C K m a c e m v M A function in the EMV protocol using the symmetric encryption function and key K m a c e m v to calculate transaction message M’s message authentication code
H M A C k e y M A function using key to hash message 𝑀 into a message authentication code
H M Hash of message M as a message authentication code
A u d i o S a m p l e t a r g e t A target’s audio-sampled ambient data; for example,   A u d i o S a m p l e p is the sampled ambient data of a phone
E x p i r e T i m e t a r g e t A target’s valid time, for example, E x p i r e T i m e a u d i o is the audio’s valid time
A m b i e n t D a t a t a r g e t A target’s sampled ambient data, which contains the sample data and sample data’s valid time; for example,   A m b i e n t D a t a p is the ambient data sampled from a phone
CompareResultSampled ambient data comparison results
AmbAuthTimeSystem time to complete ambient authentication
AmbAuthResultResults of ambient authentication. This information contains ambient data comparison results and the system time to complete ambient authentication
Table 2. EMV data lengths.
Table 2. EMV data lengths.
EMV’s Existing DataLength (Bytes)
D a t a e m v Lr + 67
A T C 2
Card and merchant certificate ( C e r t e m v i s s ,   C e r t m a c q )Lr + 42
Bank’s certificate ( C e r t i s s f c a , C e r t a c q f c a )Lr + 36
Type20
R p ,   R m 4
Req, TC, ARQC, AAC, OCRC1
S D A D Lr
ACK1
AIP+AFL38
ARC2
D a t a c d o l 1 45
D a t a c d o l 2 8
A C 1 ,   A C 2 8
New DataLength (bytes)
C e r t e m v _ o f f i s s Lr + 42
a u t h p ,   a u t h m Lr
S p ,   S m a s 48
PDOL34
A m b i e n t D a t a p 89 K
AmbAuthResult1
Table 3. Online message length (bytes).
Table 3. Online message length (bytes).
RSA
1024 bits
RSA
1536 bits
RSA
2048 bits
RSA
2560 bits
RSA
3072 bits
EMPAS-AES 12890,82291,46292,13492,74293,388
EMPAS-AES 19290,87091,52692,13492,79093,452
EMPAS-AES 25690,93491,57492,21492,85493,500
EMPAS-Cert-AES 12890,94991,65392,35793,06193,771
EMPAS-Cert-AES 19290,97391,69392,36593,08593,811
EMPAS-Cert-AES 25691,01391,71792,42193,12593,835
Table 4. Comparison of message transmission time (ms).
Table 4. Comparison of message transmission time (ms).
RSA
1024 bits
RSA
1536 bits
RSA
2048 bits
RSA
2560 bits
RSA
3072 bits
EMPAS-AES 128107.16107.92108.71109.43110.19
EMPAS-AES 192107.22108.00108.71109.49110.27
EMPAS-AES 256107.30108.05108.81109.56110.32
EMPAS-Cert-AES 128107.31108.15108.98109.81110.64
EMPAS-Cert -AES 192107.34108.19108.99109.83110.69
EMPAS-Cert -AES 256107.39108.22109.05109.88110.72
Table 5. Online consumer-end phone computational time (ms).
Table 5. Online consumer-end phone computational time (ms).
RSA
1024 bits
RSA
1536 bits
RSA
2048 bits
RSA
2560 bits
RSA
3072 bits
EMPAS-AES 12811.5829.1261.38110.9182.22
EMPAS-AES 19212.1829.7261.98111.5182.82
EMPAS-AES 25612.329.8462.1111.62182.94
EMPAS-Cert-AES 12811.7329.5462.14112.13183.95
EMPAS-Cert -AES 19212.1829.9962.59112.58184.4
EMPAS-Cert -AES 25612.2730.0862.68112.67184.49
Table 6. Online merchant–end reader computational time (ms).
Table 6. Online merchant–end reader computational time (ms).
RSA
1024 bits
RSA
1536 bits
RSA
2048 bits
RSA
2560 bits
RSA
3072 bits
EMPAS-AES 128107.24125.76159.58206.8281.63
EMPAS-AES 192107.84126.36160.18207.4282.23
EMPAS-AES 256107.96126.48160.3207.52282.35
EMPAS-Cert-AES 128106.92125.44159.26206.48281.31
EMPAS-Cert -AES 192107.37125.89159.71206.93281.76
EMPAS-Cert -AES 256107.46125.98159.8207.02281.85
Table 7. Protocol execution time (ms).
Table 7. Protocol execution time (ms).
RSA
1024 bits
RSA
1536 bits
RSA
2048 bits
RSA
2560 bits
RSA
3072 bits
EMPAS-AES 128225.98262.8329.67427.13574.04
EMPAS-AES 192227.24264.08330.87428.39575.32
EMPAS-AES 256227.56264.37331.21428.7575.61
EMPAS-Cert-AES 128225.96263.13330.38428.42575.9
EMPAS-Cert -AES 192226.89264.07331.29429.34576.85
EMPAS-Cert -AES 256227.12264.28331.53429.57577.06
Table 8. Protocol security analysis.
Table 8. Protocol security analysis.
EMPASEPMAR [17]Original EMV
(with CDA)
Original EMV
(with DDA)
Original EMV
(with SDA)
Mutual authentication111
Confidentiality
Prevention of replay attack
Data privacy
Integrity
Nonrepudiation22
Prevention of MITM attack
Prevention of preplay attacks
Prevention of relay attacks3444
◯: Indicates that the attack can be prevented. ✕: Indicates that the attack cannot be prevented. △ 1: EMV authenticates only the card and not the POS. △ 2: DDA and SDA can achieve only a merchant’s nonrepudiation and not a consumer’s nonrepudiation. △ 3: EPMAR relies only on the payment amount displayed on the phone screen for consumers to verify whether the purchase amount matches, but if a consumer’s phone screen can be controlled by an attacker, such prevention methods are ineffective. △ 4: EMV proposes distance-bounding for prevention, but this method requires a precise counter and is therefore unsuitable for commercial phones.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yang, M.-H.; Luo, J.-N.; Vijayalakshmi, M.; Shalinie, S.M. Contactless Credit Cards Payment Fraud Protection by Ambient Authentication. Sensors 2022, 22, 1989. https://doi.org/10.3390/s22051989

AMA Style

Yang M-H, Luo J-N, Vijayalakshmi M, Shalinie SM. Contactless Credit Cards Payment Fraud Protection by Ambient Authentication. Sensors. 2022; 22(5):1989. https://doi.org/10.3390/s22051989

Chicago/Turabian Style

Yang, Ming-Hour, Jia-Ning Luo, Murugesan Vijayalakshmi, and Selvaraj Mercy Shalinie. 2022. "Contactless Credit Cards Payment Fraud Protection by Ambient Authentication" Sensors 22, no. 5: 1989. https://doi.org/10.3390/s22051989

APA Style

Yang, M. -H., Luo, J. -N., Vijayalakshmi, M., & Shalinie, S. M. (2022). Contactless Credit Cards Payment Fraud Protection by Ambient Authentication. Sensors, 22(5), 1989. https://doi.org/10.3390/s22051989

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop