Business Transaction Privacy and Security Issues in Near Field Communication

Business Transaction Privacy and Security Issues in Near Field Communication

Jayapandian N. (Christ University, India)
Copyright: © 2019 |Pages: 19
DOI: 10.4018/978-1-5225-8455-1.ch005

Abstract

The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes.
Chapter Preview
Top

Introduction

Near Field Communication is a wireless technology to establish a connection between device to device and device to tag. This is technically named as active communication and passive communication. This wireless communication is to create set of networking protocol between smart devices. The communication distance of NFC device is 4cm for each device, it’s in and around 10cm to 20cm is a maximum distance of communication. The working principle of NFC is store the payment information in element chip that is named as SEID. This is short name of Secure Element Identifier. This SEID chip is inserted in smart device and NFC active device (Khan, 2016). The advantage of NFC device is contact less business payment transaction. The modern world all the business transaction is deal with digital currency. This digital currency is more secure and easy to handle with transaction. The currency is transformed in many structures, business transaction many customers using credit card or debit card payment. On the time introducing this credit or debit card banking will provide only common password for all transaction, but now banking service is more modernize, they provide one time password for every single transaction. This is the evaluation of any technology; the modern computer world is now transforms in smart device. The day to day life without this smart device can’t do any work. The smart device is many devices, like smart phone, smart home and others. This major technology of this smart device is Internet of Things. The device is working the concept of Internet, without internet no use of this smart device. The major drawback of this NFC technology is only short distance communication, but alternate thinking security perspective this short distance communication is provide higher security compare to other communication protocol. The major part of working principle is Radio Frequency Indemnification (RFID). The NFC technology is developed by NXP semiconductors and Sony; previously it is named as Philips semiconductors. The technology is very old but modern applications are used in this technology. On the time of introducing android operating system it is not popular, but now more than 90% of smart phones used in this android OS. The reason of this usage is open source; it’s used to reduce the overall selling cost. The business point of view the end user getting lesser cost compare to other operating system mobile. This short distance communication is developed in the form of NFC; this is a joint organization of Sony, Nokia and Philips. This technology is under research department in more than three year, in the year 2004 NFC forum is introduce public usage and feast this technology in common peoples.

Figure 1.

NFC technology application

978-1-5225-8455-1.ch005.f01

Key Terms in this Chapter

E-payment: Electronic payment is online payment system without using physical money transaction.

Data Security: Data security provides storage and transmits security by using encryption algorithm.

Hybrid Encryption: Combination of any two encryption algorithms is called as hybrid encryption.

RFID: RFID is radio frequency identification; it’s used to transfer the data by using radio frequency signals.

Complete Chapter List

Search this Book:
Reset