FRoDO: Fraud Resilient Device for Off-Line
Micro-Payments
Mr.Usman K1 ,Ms.Shravani J M2, Ms.Pushpavathi K M3, Ms.Almas Tabassum4,Mr.Nisar Ahmed Siddiqui5
Assistant Professor1 , UG Scholor2,3,4,5
Dept of Computer Science and Engineering
Ballari Institute of Technology and Management
Ballari, Karnataka, India.
ABSTRACT: Credit and debit card data theft is one of the earliest forms of cybercrime. Still, it is one of the most common nowadays. Attackers often aim at stealing such customer data by targeting the Point of Sale (for short, PoS) system, i.e. the point at which a retailer first acquires customer data. Modern PoS systems are powerful computers equipped with a card reader and running specialized software. Increasingly often, user devices are leveraged as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has flourished. As such, in cases where customer and vendor are persistently or intermittently disconnected from the network, no secure on-line payment is possible. This paper describes FRoDO, a secure off-line micro-payment solution that is resilient to PoS data breaches. Our solution improves over up to date approaches in terms of flexibility and security. To the best of our knowledge, FRoDO is the first solution that can provide secure fully off-line payments while being resilient to all currently known PoS breaches. In particular, we detail FRoDO architecture, components, and protocols. Further, a thorough analysis of FRoDO functional and security properties is provided, showing its effectiveness and viability.
KEYWORDS: Micropayment Scheme, Point of Sale(PoS), resilient attackers, FRoDO protocol, and secure micro-payment.
I. INTRODUCTION
PoS systems act as gateways and require some sort of network connection in order to contact external credit card processors. This is mandatory to validate transactions. To reduce cost and simplify administration and maintenance, PoS devices may be remotely managed over these internal networks. Mobile payment solutions proposed so far can be classified as fully on-line, semi off-line, weak off-line or fully off-line. The previous work called FORCE that, similarly to FRoDO, was built using a PUF based architecture. FORCE provided a weak prevention strategy based on data obfuscation and did not address the most relevant attacks aimed at threatening customer sensitive data, thus being vulnerable to many advanced attack techniques Market analysts have predicted that mobile payments will overtake the traditional marketplace, thus providing greater convenience to consumers and new sources of revenue to many companies. This scenario produces a shift in purchase methods from classic credit cards to new approaches such as mobile-based payments, giving new market entrants novel business chances. Widely supported by recent hardware, mobile payment technology is still at its early stages of evolution but it is expected to rise in the near future as demonstrated by the growing interest in crypto currencies. The first pioneering micro-payment scheme was proposed by Rivets and Shamir back in 1996. Nowadays, crypto-currencies and decentralized payment systems are increasingly popular, fostering a shift from physical to digital currencies.
However, such payment techniques are not yet commonplace, due to several unresolved issues, including a lack of widely accepted standards, limited interoperability among systems and, most importantly, security. Off-line scenarios are harder to protect, customer data is kept within the PoS for much longer time, thus being more exposed to attackers. Skimmers: in this attack, the customer input device that belongs to the PoS system is replaced with a fake one in order to capture customer’s card data. The main issue with a fully off-line approach is the difficulty of checking the trustworthiness of a transaction without a trusted third party. In fact, keeping track of past transactions withno available connection to external parties or shared databases can be quite difficult, as it is difficult for a vendor to check if some digital coins have already been spent. This is the main reason why during last few years, many different approaches have been proposed to provide a reliable off-line payment scheme. Although many works have been published, they all focused on transaction anonymity and coin enforceability. However, previous solutions lack a thorough security analysis. While they focus on theoretical attacks, discussion on real world attacks such as skimmers, scrapers and data vulnerabilities is missing.
II. LITERATURESURVEY
1. Pay word and micro mint: two simple micropayment schemes
R. L. Rivets: The Basic Paper coin method can be implemented in a variety of ways, to maximize ease of use for the customer in a given situation. While the basic pepper coin method requires that each consumer have digital signature capability, one can easily eliminate this requirement by having a party trusted by the consumer sign payments for him as a proxy; this might be a natural approach in a web services environment. The pepper coin method can also be implemented so that it feels to the consumer as a natural extension of his existing credit-card processing procedure, further increasing consumer acceptance and ease of use.
2. Secure pos &kiosk
Bomgar: Limited interfaces and location within local networks, supporting kiosks and point of sale (POS) terminals can be challenging. Often they are located on networks that are not connected to the internet, making direct access impossible for most remote support tools. And even when an employee is present at the terminal, access restrictions and/or lack of technical knowledge Makes communicating the solution to a problem difficult. To add complications, hackers are ramping up their efforts to steal payment card data by gaining access to POS systems and kiosks.
3. Reliable ospm schema for secure transaction using mobile agent in micropayment system
NC kiran: This project introduces a novel offline payment system in mobile commerce using the case study of micro- payments. The present project is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction in mobile commerce. However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce (OSPM). The empirical operation are carried out on three types of transaction process considering maximum scenario of real time offline cases. Therefore, the current idea introduces two new parameters i.e. mobile agent and mobile token that can ensure better security and comparatively less network overhead.
4. Lightweight and secure put key storage using limits of machine learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightweight error correction code (ECC) encoder / decoder is used. With a register count of 69, this codec core does not use any traditional error correction techniques and is 75% smaller than a previous provably secure implementation, and yet achieves robust environmental performance in 65nm FPGA and 0.13μ ASIC implementations. The security of the syndrome bits uses a new security argument that relies on what cannot be learned from a machine learning perspective. The number of Leaked Bits is determined for each Syndrome Word, reducible using Syndrome Distribution Shaping. The design is secure from a min-entropy standpoint against a machine-learning-equipped adversary that, given a ceiling of leaked bits, has a classification error bounded by ε. Numerical examples are given using latest machine learning results.
5. Building robust m-commerce payment system on offline wireless network
Mobile commerce is one of the upcoming research areas with focus on mobile payment systems. Unfortunately, the current payment systems is directly dependent on fixed infrastructure of network (cellular network), which fails to facilitate optimal level of security for the payment system. The proposed system highlights a novel approach for building secure, scalable, and flexible e-payment systems in the distributed scenario of wireless adhoc network in offline mode of communication for enhanced security on transaction and payment process. The proposed system uses Simple Public Key Infrastructure for providing the security in payment processes. The performance analysis of the proposed model shows that the system is highly robust and secure ensuring anonymity, privacy, non-repudiation offline payment system over wireless adhoc network.
III. SYSTEM ARCHITECTURE
Fig.1: System Architecture
IV. IMPLEMENTATION
MODULES:
• System Construction Module
• Identity Element
• Coin Elements
• Attack Mitigation
MODULES DESCSRIPTION:
System Construction Module:
In the first module, we develop the System Construction module with the various entities: Vendor, User, FRoDO, PUF, Attacker. This process is developed completely on Offline Transaction process.
We develop the system with user entity initially. The options are available for a new user to register first and then login for authentication process. Then we develop the option of making the Vendor Registration, such that, the new vendor should register first and then login the system for authentication process.
FRoDO is the first solution that neither requires trusted third parties, nor bank accounts, nor trusted devices to provide resiliency against frauds based on data breaches in a fully off-line electronic payment systems. Furthermore, by allowing FRoDO customers to be free from having a bank account, makes it also particularly interesting as regards to privacy. In fact, digital coins used in FRoDO are just a digital version of real cash and, as such, they are not linked to anybody else than the holder of both the identity and the coin element.
Differently from other payment solutions based on tamper-proof hardware, FRoDO assumes that only the chips built upon PUFs can take advantage from the tamper evidence feature. As a consequence, our assumptions are much less restrictive than other approaches.
Identity Element:
In this module, we develop the Identity Element module functionalities. FRoDO does not require any special hardware component apart from the identity and the coin element that can be either plugged into the customer device or directly embedded into the device.
Similarly to secure elements, both the identity and the coin element can be considered tamperproof devices with a secure storage and execution environment for sensitive data. Thus, as defined in the ISO7816-4 standard, both of them can be accessed via some APIs while maintaining the desired security and privacy level. Such software components (i.e., APIs) are not central to the security of our solution and can be easily and constantly updated. This renders infrastructure maintenance easier.
Coin Element:
In this module, we develop Coin Element. In this coin Element we develop Key Generator and Cryptographic Element. The Key Generator is used to compute on-the-fly the private key of the coin element. The Cryptographic Element used for symmetric and asymmetric cryptographic algorithms applied to data received in input and send as output by the coin element;
The Coin Selector is responsible for the selection of the right registers used together with the output value computed by the coin element PUF in order to obtain the final coin value;
The Coin Registers used to store both PUF input and output values required to reconstruct original coin values. Coin registers contain coin seed and coin helper data. Coin seeds are used as input to the PUF whilst coin helpers are used in order to reconstruct stable coin values when the PUF is challenged.
Attack Mitigation:
In this module we develop the Attack Mitigation process. The read-once property of the erasable PUF used in this solution prevents an attacker from computing the same coin twice. Even if a malicious customer creates a fake vendor device and reads all the coins, it will not be able to spend any of these coins due to the inability to decrypt the request of other vendors.
The private keys of both the identity and coin elements are needed to decrypt the request of the vendor and can be computed only within the customer device. The fake vendor could then try to forge a new emulated identity/coin element with private/ public key pair. However, identity/coin element public keys are valid only if signed by the bank. As such, any message received by an unconfirmed identity/coin element will be immediately rejected;
Each coin is encrypted by either the bank or the coin element issuer and thus it is not possible for an attacker to forge new coins.
V. PROPOSED ALGORITHM
The algorithmic details & techniques used in system in experimentation are explained here. The different algorithmic strategies & technique are used.
Bit Exchanging Method:
Encryption taken on the secret message files using simple bit shifting and XOR operation. The bit exchange method is introduced for encrypting any file.
Algorithm
Step 1: Read the all Content and Find the all character to covert the ASCII value.
Step 2: That ASCII value converted in Binary value.
Step 3: Encryption taken on the secret message file using simple shifting and XOR operation. Like a 1001110.
Step 4: The bit exchange Method is introduced for encryption any file.
Step 5: Read one by one byte from the secret data and convert each byte to 8 bits. Then apply one bit right shift operation.
Like this 0100 1110.
Step 6: Divide the 8 bits into to block and then perform XOR operation with 4 bit on the left and 4 bits on the right side (1010).
Step 7: The same thing repeated for all bytes in the file.
Client Module: This module used by client which is going to online website. And View Product and select to product models and view product details. Select and purchase their product .and transaction from their account All details are encrypted by using Private Key and public key, Keys are generated during user to purchase the product.
Key Generator: This module is using cryptographic algorithm, this algorithm used for symmetric and asymmetric cryptographic algorithms applied to receive the data input and sent as output by the identity element. Key Generator is by PUFs, which have been used to implement strong challenge-response authentication. Also, multiple physical unclonable functions are used to authenticate both the identity element and the coin element.
Secure payment: This module is used to Users are view products, and select products and their details and to be wish to purchase product and give all sensitive data like account details, payment details. All user information is encrypted because hackers do not hacking user information. All Encrypted data are separated by symmetric and Asymmetric cryptographic algorithms this is used to separate private and public keys. Private Key is send to user mail. User is used this key to view their purchase product and transaction their account.
Transaction at Coin Element: This module is used to admin to work their website and add products like product name, description, warranty period etc., and admin view all users purchase products but cannot view user account details and to view which product is delivered or not.
VI. SECURITY ANALYSIS
Authenticity
It is guaranteed in FRODO by the on-the-fly computation of private keys. In fact, both the identity and the coin element use the key generator to compute their private key needed to encrypt and decrypt all the messages exchanged in the protocol. Furthermore, each public key used by both the vendor and the identity/coin element is signed by the bank. As such, its authenticity can always be verified by the vendor.
Availability
The availability of the proposed solution is guaranteed mainly by the fully off-line scenario that completely removes any type of external communication requirement and makes it possible to use off-line digital coins also in extreme situations with no network coverage. Furthermore, the lack of any registration or withdrawal phase, makes FRoDO able to be used by different devices.
Confidentiality
Both the communications between the customer and the vendor and those between the identity element and the coin element leverage asymmetric encryption primitives to achieve message confidentiality.
Non-Repudiation
The storage device that is kept physically safe by the vendor prevents the adversary from being able to delete past transactions, thus protecting against malicious repudiation requests. Furthermore, the content of the storage device can be backed up and exported to a secondary equipment, such as pen drives, in order to make it even harder for an adversary to tamper with the transaction history.
VII. RESULTS
Initially, the Client send the transmission request to the Server. Then the Server starts up. The Server contains all the data that the Client needs. In order to secure the transmission of data, the client generates the key during the transmission. It is used for Encryption and decryption purpose. After the key is generated between the Client and the Server, the data transmission occurs. Once the key is accepted, the data
A quality output is one, which meets the requirements of the end user and presents the information clearly. In any system results of processing are communicated to the users and to other system through outputs. In output design it is determined how the information is to be displaced for immediate need and also the hard copy output. It is the most important and direct source information to the user. Efficient and intelligent output design improves the system’s relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right output must be developed while ensuring that each output element is designed so that people will find the system can use easily and effectively. When analysis design computer output, they should Identify the specific output that is needed to meet the requirements.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by the system. The output form of an information system should accomplish one or more of the following objectives.
4. Convey information about past activities, current status or projections of the Future.
5. Signal important events, opportunities, problems, or warnings.
6. Trigger an action.
7. Confirm an action
VIII. PERFORMANCEANALYSIS
The Performance Analysis is generated to check whether the data is transmitted between the Client and Server in a error free manner. It can avoid the data loss during the transmission. So the client can make use of data in a efficient manner
IX. CONCLUSION
In this paper we have introduced FRoDO that is, to the best of our knowledge, the first data-breach-resilient fully offline micro-payment approach. The security analysis shows that FRoDO does not impose trustworthiness assumptions. Further, FRoDO is also the first solution in the literature where no customer device data attacks can be exploited to compromise the system. This has been achieved mainly by leveraging a novel erasable PUF architecture and a novel protocol design. Furthermore, our proposal has been thoroughly discussed and compared against the state of the art. Our analysis shows that FRoDO is the only proposal that enjoys all the properties required to a secure micro-payment solution, while also introducing flexibility when considering the payment medium (types of digital coins). Finally, some open issues have been identified that are left as future work. In particular, we are investigating the possibility to allow digital change to be spent over multiple off-line transactions while maintaining the same level of security and usability.
References
[1]. VanesaDaza, Roberto Di Pietro, Flavio Lombardi, And MatteoSignorini “Off-Line micro-Payments”, Dependable And Secure Computing, IEEE Transactions On (Volume:PP , Issue: 99 ), 12 June 2015
[2]. R. L. Rivest, “Payword and micromint: two simple micropayment schemes,” in CryptoBytes, 1996, pp. 69–87.
[3]. W. Chen,G. Hancke,K. Mayes,Y. Lien, and J.-H. Chiu,“Using 3G network components to enable NFC mobile transactions and authentication,” in IEEE PIC ’10, vol. 1, Dec 2010, pp. 441–448.
[4]. T. Nishide and K. Sakurai, “Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited,”ser. INCOS’11.Washington, DC, USA: IEEE Comp. Soc., 2011, pp.656–661.
[5]. M. A. Salama, N. El-Bendary, and A. E. Hassanien, “Towards secure mobile agent based e-cash system,” in Intl. Workshop on Security and Privacy Preserving in e-Societies. New York, NY, USA: ACM, 2011, pp. 1–6.
[6]. J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, “FPGA intrinsic PUFs and their use for IP protection,” ser. CHES ’07. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 63–80.
[7]. S. Gomzin, Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions, 1st ed. Wiley Publishing, 2014.
[8]. Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” SIAM J.Compute, vol. 38, no. 1, pp. 97–139, mar 2008.
[9]. B. Kori, P. Tuyls, and W. Ophey, “Robust key extraction from physical uncloneable functions,” in Applied Cryptography and Network Security,ser. LNCS, J. Ioannidis, A. Keromytis, and M. Yung, Eds. Springer Berlin Heidelberg, 2005, vol. 3531, pp. 407–422.
[10]. M.-D. Yu, D. MRaihi, R. Sowell, and S. Devadas, “Lightweight and Secure PUF Key Storage Using Limits of Machine Learning,” in CHES 2011, ser. LNCS, B. Preneel and T. Takagi, Eds. Springer Berlin Heidelberg, 2011, vol. 6917, pp. 358–373.