OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks

Mahshid Mehr Nezhad, F. Hao
{"title":"OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks","authors":"Mahshid Mehr Nezhad, F. Hao","doi":"10.1145/3485832.3485887","DOIUrl":null,"url":null,"abstract":"The usage of contactless payment has surged in recent years, especially during the Covid19 pandemic. A Passive relay (PR) attack against a contactless card is a well-known threat, which has been extensively studied in the past with many solutions available. However, with the mass deployment of mobile point-of-sale (mPoS) devices, there emerges a new threat, which we call mPoS-based passive (MP) attacks. In an MP attack, the various components required in a PR attack, including an NFC reader, a wireless link, a remote card emulator, and a remote payment terminal, are conveniently combined into one compact device, hence the attack becomes much easier. Since the attacker and the victim are in the same location, the previous distance bounding or ambient sensor-based solutions are no longer effective. In this paper, we propose a new orientation-based payment solution called OPay. OPay builds on the observation that when a user makes a legitimate contactless payment, the card and the terminal surface are naturally aligned, but in an attack scenario, this situation is less likely to occur. This allows us to distinguish the legitimate payments from passive attacks based on measuring the alignment of orientations. We build a concrete prototype using two Arduino boards embedded with NFC and motion sensors to act as a card and a payment terminal respectively. To evaluate the feasibility, we recruited twenty volunteers in a user study. Participants generally find OPay easy to use, fast and reliable. Experiments show that OPay can substantially reduce the attack success rate by 85-99% with little inconvenience to real users. To our best knowledge, OPay is the first solution that can prevent both the PR and MP attacks, while preserving the existing usage model in contactless payment.","PeriodicalId":175869,"journal":{"name":"Annual Computer Security Applications Conference","volume":"206 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3485832.3485887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The usage of contactless payment has surged in recent years, especially during the Covid19 pandemic. A Passive relay (PR) attack against a contactless card is a well-known threat, which has been extensively studied in the past with many solutions available. However, with the mass deployment of mobile point-of-sale (mPoS) devices, there emerges a new threat, which we call mPoS-based passive (MP) attacks. In an MP attack, the various components required in a PR attack, including an NFC reader, a wireless link, a remote card emulator, and a remote payment terminal, are conveniently combined into one compact device, hence the attack becomes much easier. Since the attacker and the victim are in the same location, the previous distance bounding or ambient sensor-based solutions are no longer effective. In this paper, we propose a new orientation-based payment solution called OPay. OPay builds on the observation that when a user makes a legitimate contactless payment, the card and the terminal surface are naturally aligned, but in an attack scenario, this situation is less likely to occur. This allows us to distinguish the legitimate payments from passive attacks based on measuring the alignment of orientations. We build a concrete prototype using two Arduino boards embedded with NFC and motion sensors to act as a card and a payment terminal respectively. To evaluate the feasibility, we recruited twenty volunteers in a user study. Participants generally find OPay easy to use, fast and reliable. Experiments show that OPay can substantially reduce the attack success rate by 85-99% with little inconvenience to real users. To our best knowledge, OPay is the first solution that can prevent both the PR and MP attacks, while preserving the existing usage model in contactless payment.
OPay:针对被动攻击的定向非接触式支付解决方案
近年来,非接触式支付的使用激增,特别是在2019冠状病毒病疫情期间。针对非接触式卡的无源继电器(PR)攻击是一种众所周知的威胁,过去已经进行了广泛的研究,并提供了许多解决方案。然而,随着移动销售点(mPoS)设备的大规模部署,出现了一种新的威胁,我们称之为基于mPoS的被动攻击(MP)。在MP攻击中,PR攻击所需的各种组件,包括NFC读取器、无线链路、远程卡模拟器和远程支付终端,方便地组合在一个紧凑的设备中,因此攻击变得更加容易。由于攻击者和受害者处于同一位置,先前的距离边界或基于环境传感器的解决方案不再有效。在本文中,我们提出了一种新的基于定向的支付解决方案,称为OPay。OPay基于这样的观察:当用户进行合法的非接触式支付时,卡和终端表面自然对齐,但在攻击场景中,这种情况不太可能发生。这使我们能够根据测量方向的一致性来区分合法支付和被动攻击。我们使用嵌入NFC和运动传感器的两块Arduino板分别作为卡片和支付终端,构建了一个具体的原型。为了评估可行性,我们在用户研究中招募了20名志愿者。参与者普遍认为OPay使用方便、快捷、可靠。实验表明,OPay可以大幅降低85-99%的攻击成功率,并且对真实用户几乎没有带来不便。据我们所知,OPay是第一个可以同时防止PR和MP攻击的解决方案,同时保留了非接触式支付的现有使用模式。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信