Business Transaction Privacy and Security Issues in Near Field Communication

Business Transaction Privacy and Security Issues in Near Field Communication

Jayapandian N.
ISBN13: 9781799877059|ISBN10: 1799877051|EISBN13: 9781799877486
DOI: 10.4018/978-1-7998-7705-9.ch038
Cite Chapter Cite Chapter

MLA

Jayapandian N. "Business Transaction Privacy and Security Issues in Near Field Communication." Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, IGI Global, 2021, pp. 829-847. https://doi.org/10.4018/978-1-7998-7705-9.ch038

APA

Jayapandian N. (2021). Business Transaction Privacy and Security Issues in Near Field Communication. In I. Management Association (Ed.), Research Anthology on Artificial Intelligence Applications in Security (pp. 829-847). IGI Global. https://doi.org/10.4018/978-1-7998-7705-9.ch038

Chicago

Jayapandian N. "Business Transaction Privacy and Security Issues in Near Field Communication." In Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, 829-847. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7705-9.ch038

Export Reference

Mendeley
Favorite

Abstract

The main objective of this chapter is to discuss various security threats and solution in business transactions. The basic working principle and theoretical background of near field communication (NFC) technology is discussed. A component of NFC communication section is to be discussed on various NFC operation modes and RFID tags. NFC technology is used in various fields such as electronic toll collection and e-payment collection for shopping. This device-to-device payment system is facing major security issues. This NFC communication data is transferred from one terminal to another terminal by using short-range radio frequency. Data hackers try to access this radio frequency and attack the business transaction. This hybrid encryption algorithm is used to solve business transaction data security issues. This chapter deals with both key encryption and data encryption processes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.