Frequency band of different wireless technologies 

Frequency band of different wireless technologies 

Similar publications

Article
Full-text available
The chitosan-coated neem flower powder was prepared and employed as an adsorbent for the removal of cationic methylene blue from an aqueous medium. The interaction of chitosan with neem flower was concluded by FTIR. The BET surface area was evaluated for the prepared NFC adsorbent. The adsorption of methylene blue dye onto chitosan-coated neem flow...

Citations

... Diverse techniques are used by different authors for authentication and registration of customer, which are biometric [9]- [16], Deterministic Random Bit Generator (DRBG) algorithm and Pseudo-Random Number Generator (PRNG) algorithm [21], Convolutional Neural Network [20],Choice-Based Authentication Approach (CBAA) [7], NFC [6], [26], [30], [31], OTP [4], [6], [8], [13], [16], [19], [28], UUID [5], Secure Element and many more. These techniques are increasing burden on the bank as well as on customers, in terms of implementation and system requirement. ...
Article
Full-text available
A significant aspect of our daily living is banking. Our lives are now easier thanks to online banking, mobile banking, money transfers, and ATM cash withdrawals. Banks must follow a step-by-step process to identify, verify, and then authenticate a customer before granting access to online banking services. The procedure of withdrawing cash carries a lot of danger. A mechanism of bank customer registration, verification, and authentication for cash withdrawal from an ATM via a secured, Smart Mobile Banking Application (SMBA) is suggested to protect customer credentials during cash withdrawal. Cardless ATM cash withdrawal is the mechanism suggested by us. Withdrawing cash from ATM with this mechanism starts by installing SMBA on registered customers device. On the bank portal, only authorized customers can register to install SMBA. The bank sends a link for installation, and bank customers download the smartphone app using that link. Answering the security questions serves as the authentication process. Once the customer has been authenticated, Quick Response code can be used to withdraw cash from the closest ATM. A Survey report backs up the approach we proposed.
... NFC technology is therefore beneficial to both users and banks as it allows fast contactless transactions at any ATM or PoS [5]. Unfortunately, an attacker is able to remotely steal the banking data stored in an NFC bank card or an NFC smartphone, without the knowledge of the client [6]. ...
Conference Paper
Full-text available
In order to authenticate a user on an Automated Teller Machine (ATM) using Near Field Communication (NFC) technology embedded on smartphones, we recently proposed a new approach called Dynamic Array PIN Protocol (DAP) that allows a user to enter his PIN code in a secure manner. We proved that the DAP protocol is resistant to 13 different attacks. Furthermore, by comparing it to several existing solutions, we demonstrated that DAP is much better and more cost effective. However, after a thorough analysis, we discovered that the DAP protocol is vulnerable to multiple eavesdropping video or camera records attack. Consequently, in this paper, we aim to address this vulnerability by proposing a new security solution that improves the DAP protocol.
... NFC technology is therefore beneficial to both users and banks as it allows fast contactless transactions at any ATM or PoS [5]. Unfortunately, an attacker is able to remotely steal the banking data stored in an NFC bank card or an NFC smartphone, without the knowledge of the client [6]. ...
Article
Full-text available
In order to authenticate a user on an Automated Teller Machine (ATM) using Near Field Communication (NFC) technology embedded on smartphones, we recently proposed a new approach called Dynamic Array PIN Protocol (DAP) that allows a user to enter his PIN code in a secure manner. We proved that the DAP protocol is resistant to 13 different attacks. Furthermore, by comparing it to several existing solutions, we demonstrated that DAP is much better and more cost effective. However, after a thorough analysis, we discovered that the DAP protocol is vulnerable to multiple eavesdropping video or camera records attack. Consequently, in this paper, we aim to address this vulnerability by proposing a new security solution that improves the DAP protocol.
... Recently, more customers are using their NFC Smartphone for electronic NFC payments [6]. In recent years, the banking system has replaced bank cards with mobile payment via NFC to secure payment [7]. Unfortunately, an attacker can steal banking information stored in a NFC bank card [8]. ...
Article
Near Field Communication (NFC) technology has been used recently for electronic payment between an Automated Teller Machine (ATM) and a Smartphone. It is threatened by several attacks that can steal the user personal data like the password or the Personal Identification Number (PIN). In this paper, we present Dynamic Array PIN (DAP), a novel approach for user authentication on a Smartphone that uses NFC electronic payment with an ATM. Our analysis and experimentation prove that this technique protects against thirteen different attacks and is cost-effective in terms of required hardware, authentication time, computing power and storage space.
... Mobile payment is the driving force behind NFC technology over the past years, it is mostly used in contactless mobile payment. VISA estimates that mobile payment via NFC will replace the bank card in the coming years and most manufacturers of smartphones like Samsung, Apple have equipped their devices with this technology [11]. To enable mobile contactless payments, the NFC-enabled mobile device operates in card emulation mode and appears to an external reader to be a traditional contactless smart card [12]. ...
... 4. A token been generated in a banking transaction. Image Source;Wadii, Boutahar and Ghazi (2017) ...