E-COMMERCE PAYMENT AUTHENTICATION SYSTEM WITH SIM CARD

Rico Andropurnomo Tanaya

Abstract


Smart card is a device, which used for multi purpose needs to secure content and information. This device has many forms, for example like cards, which used to secure banking transaction, SIM card, which used to store operator subscriber’s information as well as embedded smart card which used for many IOT (Internet Of Things) devices. The purpose of this research is to test whether SIM card can be used to secure credit card data that besides to store data, SIM card can also used to do verification and encryption. This research uses multiple standardizations as a base to build the prototype simulation that is PA-DSS and ISO 7816. PA-DSS standard used as a base to build client side and server side application and ISO 7816 is a protocol interface for smart card. With this research, I hope that we can see clear that it is possible to build a alternate payment system by using SIM card for storing purpose and credit card verification.

Keywords


PA-DSS, ISO 7816, Smart Card, SIM Card, Internet Of Things

References


Alliance, S. C. (2008). What Makes a Smart Card Secure ?, (October), 37.

Bhavya Daya. (2013). Network security: History, importance, and future. University of Florida Department of Electrical and …, 13.

Considerations, C. (2011). Secure Authentication for Mobile Internet Services Table of Contents, (December), 1–23.

Data, A. (2004). Shared key TLS usage within Ua interface, (May), 1–7.

Des, Z. U. R. E. R., & Bebber, K. Van. (2014). Dissertation.

Ferrari, J., & Mackinnon, R. (n.d.). Smart Cards : A Case Study.

Ge, H., Tate, S. R., Jacob, R. T., & Member, C. (2006). FLEXIBLE DIGITAL AUTHENTICATION TECHNIQUES.

Gemplus, Oberthur, & Schlumberger. (2003). Over-The-Air (OTA) technology, (October), 6.

Gsma. (2013). Mobile and Online Commerce Opportunities provided by the SIM, 44.

Guyot, V. (2010). Smart card, the invisible bullet. 9th European Conference on Information Warfare and Security 2010, ECIW 2010, 80–87.

International Organization for Standardization (ISO). (2005). ISO7816-4 Organization, security and commands for interchange, 2005.

Kak, A. (2015). Lecture 8 : AES : The Advanced Encryption Standard Lecture Notes on “ Computer and Network Security ” by Avi Kak ( kak@purdue.edu ) Goals : • To review the overall structure of AES and to focus particularly on the, (3).

Khalique, A., Singh, K., & Sood, S. (2010). A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards. International Journal of Computer Applications, 2(3), 26–30.

Liao, I. E., Lee, C. C., & Hwang, M. S. (2006). A password authentication scheme over insecure networks. Journal of Computer and System Sciences, 72(4), 727–740.

Merchant, F. M. (2016). Miva PA-DSS Implementation Guide, (May), 1–28.

Module, S. I., & Equipment, M. (1996). GSM Digital cellular telecommunications system Specification of the Subscriber Identity Module.

Paper, W. (n.d.). Dynamic SIM Allocation TM.

Penttinen, J. T. J. (n.d.). Wireless Communications Security Wireless Communications Security Solutions for the.

Pourali, A., & Yektaie, M. H. (2014). A Secure SMS Model in E-Commerce Payment using Combined AES and ECC Encryption Algorithms, 431–443.

Procedures, S. A. (2010). Payment Card Industry ( PCI ) Payment Application Data Security Standard Requirements and Security Assessment Procedures. October, (October), 73.

Requirements, Q. (2012). International Standard Iso / Iec, 25021.

Sommerville, I. (2010). Software Engineering. Software Engineering.

Specification, C. (2006). GlobalPlatform, (March).

Standard, I. (2008). INTERNATIONAL STANDARD ISO / IEC AMENDMENT 2 : Conservation of prefixes, 2008.

Thompson, G. S. (2015). PAYMENT SECURITY AND THE EMV CHIP TRANSITION by Gary Scott Thompson A Capstone Project Submitted to the Faculty of Utica College December 2015 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Cybersecurity i, (December).

Thorsen, L. T. (2016). Multi-factor Authentication using Secure Elements.

Vahidian, E. (2013). Evolution of the SIM to eSIM.

Votano, J., Parham, M., & Hall, L. (2004). Smart Card & Security Basics. Retrieved from http://onlinelibrary.wiley.com/doi/10.1002/cbdv.200490137/abstract

Wang, H. (n.d.). Secure Wireless Payment Protocol. Processing.

Wang, H. (n.d.). Secure Wireless Payment Protocol.

Wohlin, C., Šmite, D., & Moe, N. B. (2015). A general theory of software engineering: Balancing human, social and organizational capitals. Journal of Systems and Software, 109, 229–242.

Zanero, S. (2002). Smart Card Content Security. Dipartimento Di Elettronica E Informazione. Retrieved from

Zhu, Y. (2010). Architecture For Secure Two Party Mobile Payment Transaction.

Snowdon, Elizabeth. (2011). Prototyping And Usability Testing Your Design.

Alwahhab, Eman Abed. (2014). Prototyping.

Trend Micro. (2015). Next Generation Payment Processing Architecture.

Grabbe, J. Orlin. (2014). The DES Algorithm Illustrated.

Ab, E. (2016). Bootstrapping Security, (February).

HID. (2006). Understanding Card Data Formats, 1–5.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Jumlah Pengunjung :

Web
Analytics

View My Stats