CFP last date
20 May 2024
Reseach Article

Optimized Conditional Privacy Preservation Protocol for NFC Applications using Genetic Algorithm

by Baldeep Singh, Arvind Rajput, Sabhyata
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 9
Year of Publication: 2014
Authors: Baldeep Singh, Arvind Rajput, Sabhyata
10.5120/17841-8733

Baldeep Singh, Arvind Rajput, Sabhyata . Optimized Conditional Privacy Preservation Protocol for NFC Applications using Genetic Algorithm. International Journal of Computer Applications. 102, 9 ( September 2014), 7-11. DOI=10.5120/17841-8733

@article{ 10.5120/17841-8733,
author = { Baldeep Singh, Arvind Rajput, Sabhyata },
title = { Optimized Conditional Privacy Preservation Protocol for NFC Applications using Genetic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 9 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number9/17841-8733/ },
doi = { 10.5120/17841-8733 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:38.808628+05:30
%A Baldeep Singh
%A Arvind Rajput
%A Sabhyata
%T Optimized Conditional Privacy Preservation Protocol for NFC Applications using Genetic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 9
%P 7-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the recent years the NFC with the combination of smart devices has widened the utilization range of NFC. It is said it will replace the credit card in electronic payment so security is one of the area that is to be checked. Currently the NFC security requires user's public key with the fixed value which contain the message. The attacker can create a new profile of the user by using their public key and thus the privacy of the user is compromised. In this work, network environment can be generated using 50 nodes. User can select source and destination node and then simulation can be done on the basis of proposed algorithm. The conditional privacy protection based on multiple pseudonyms is used to solve the issues generated in NFC environment. This work is to optimize the above environment by using optimization algorithm. Genetic algorithm which is artificial intelligence based algorithm is used in this to reduce the storage requirement, average delay, packet drop ratio and improve the network's throughput.

References
  1. Wikipedia, "Near field communication", http://en. wikipedia. org/wiki/Near_field_ communication, Last accessed on 29 January, 2014.
  2. J. Yu, W. Lee, and D. -Z. Du, "Reducing Reader Collision for Mobile RFID," IEEE Transactions on Consumer Electronics, Vol. 57, No. 2, pp. 574-582, May 2011.
  3. ISO/IEC 18092, "Information technology: Telecommunications and information exchange between systems", Near field Communication Interface and Protocol (NFCIP-1), ISO/IEC, April 2004.
  4. Ernst Haselsteiner, "Security in Near Field Communication", Proceedings of the ACM Networking Conference, pp. 14-18, December 2010
  5. Hasoo Eun, "Conditional Privacy Preserving Security Protocol for NFC Applications", IEEE Transactions on Consumer Electronics, Vol. 59, No. 1,pp. 128-134, February 2013.
  6. Roy Want, "Near Field Communication", Published by the IEEE, Vol. 16, No. 9, pp. 28-29, September 2011.
  7. Jeffrey Fischer, "NFC in Cell Phones: The New Paradigm for an Interactive World", Foundations and Trends in IEEE Communications Magazine, No. 1–2, June, 2009.
  8. Florian Michahelles, "Pervasive RFID and Near Field Communication Technology", Published by the IEEE Computer Society, Vol. 33, No. 1, pp. 34-39, Jan 2017.
  9. Eric Krevice Prebys," The Genetic Algorithm in Computer Science", MIT Undergraduate Journal of Mathematics,2002.
  10. Ali Alzahrani, Abdullah Alqhtani, Haytham Elmiligi, Fayez Gebali, Mohamed S. Yasein. "NFC security analysis and vulnerabilities in healthcare applications," IEEE Pacific Rim Conference on Computers and Signal Processing (PACRIM), 2013.
  11. Sheikh Gouse, Rhitul Kumbhar, "Network Simulation with TCL Script Generator for NS-2", International Journal of Emerging Trends in Science & Technology, Volume 01, Issue 06, pp. -827-829, 2014.
  12. M. Isaivani, and T. Sivasankari, "An Enhancement of Security Standards based on Pseudonyms in Near Field Communication", International Journal of Innovative Research in Science, Engineering and Technology, Volume 3, Issue 3, pp. -2353-2357, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

NFC Security TSM Pseudonyms Throughput Storage Requirement Packet Drop Ratio (PDR) Average Delay