{"id":"https://openalex.org/W2792102278","doi":"https://doi.org/10.1145/3018896.3025144","title":"A countermeasure against relay attack in NFC payment","display_name":"A countermeasure against relay attack in NFC payment","publication_year":2017,"publication_date":"2017-03-22","ids":{"openalex":"https://openalex.org/W2792102278","doi":"https://doi.org/10.1145/3018896.3025144","mag":"2792102278"},"language":"en","primary_location":{"id":"doi:10.1145/3018896.3025144","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018896.3025144","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100432613","display_name":"Peng Li","orcid":"https://orcid.org/0000-0001-5026-5347"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Peng Li","raw_affiliation_strings":["Dept. of Computer and Information Technology"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Technology","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007498261","display_name":"Huayi Fang","orcid":"https://orcid.org/0000-0002-8008-0383"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huayi Fang","raw_affiliation_strings":["Dept. of Computer and Information Technology"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Technology","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087397931","display_name":"Xiang Liu","orcid":"https://orcid.org/0000-0001-7413-7817"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiang Liu","raw_affiliation_strings":["Dept. of Computer and Information Technology"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Technology","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089355143","display_name":"Baijian Yang","orcid":"https://orcid.org/0000-0003-4440-3701"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baijian Yang","raw_affiliation_strings":["Dept. of Computer and Information Technology"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and Information Technology","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100432613"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.29001121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.8038302659988403},{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near field communication","score":0.7487364411354065},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7398356795310974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7165795564651489},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.6603982448577881},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.659049928188324},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.6537681221961975},{"id":"https://openalex.org/keywords/mobile-payment","display_name":"Mobile payment","score":0.5398769378662109},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5317294597625732},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5035516619682312},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.451416015625},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3614312410354614},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.32067710161209106},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16463077068328857},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16374242305755615},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12578248977661133},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.12150970101356506},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08421826362609863}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.8038302659988403},{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.7487364411354065},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7398356795310974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7165795564651489},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.6603982448577881},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.659049928188324},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.6537681221961975},{"id":"https://openalex.org/C160949748","wikidata":"https://www.wikidata.org/wiki/Q1365703","display_name":"Mobile payment","level":3,"score":0.5398769378662109},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5317294597625732},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5035516619682312},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.451416015625},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3614312410354614},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.32067710161209106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16463077068328857},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16374242305755615},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12578248977661133},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.12150970101356506},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08421826362609863},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C96122199","wikidata":"https://www.wikidata.org/wiki/Q628096","display_name":"Ultra high frequency","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3018896.3025144","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018896.3025144","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1503660176","https://openalex.org/W1516822507","https://openalex.org/W1632109869","https://openalex.org/W1989391244","https://openalex.org/W1997655704","https://openalex.org/W2001713664","https://openalex.org/W2075645815","https://openalex.org/W2289041268","https://openalex.org/W3028895824"],"related_works":["https://openalex.org/W2120719751","https://openalex.org/W4238025070","https://openalex.org/W2511249548","https://openalex.org/W2952760203","https://openalex.org/W2187450023","https://openalex.org/W2511353779","https://openalex.org/W2017865814","https://openalex.org/W2100107174","https://openalex.org/W4239141680","https://openalex.org/W2489709241"],"abstract_inverted_index":{"Near":[0],"Field":[1],"Communication":[2],"(NFC)":[3],"is":[4,13,65,126],"a":[5,73,88,100,111,133,146],"convenient":[6],"short":[7],"range":[8],"contactless":[9],"communication":[10],"method":[11],"that":[12,99],"receiving":[14],"more":[15,17],"and":[16,33,49,128,144],"attentions":[18],"for":[19,56],"its":[20,66],"simplicity":[21],"to":[22,75,86,91,108,162],"support":[23],"mobile":[24,41,57],"payment.":[25],"Influential":[26],"industry":[27],"players,":[28],"such":[29],"as":[30,132],"Apple,":[31],"Google":[32],"Samsung":[34,50],"have":[35],"integrated":[36],"NFC":[37,55,113],"technology":[38],"in":[39,141],"their":[40],"payment":[42],"applications,":[43],"i.e.":[44],"Apple":[45],"Pay,":[46,51],"Android":[47,157],"Pay":[48],"respectively.":[52],"To":[53],"deploy":[54],"payment,":[58],"one":[59],"of":[60,149,166],"the":[61,97,121,138,164,167],"most":[62],"significant":[63],"concern":[64],"security.":[67],"In":[68],"this":[69,142],"article,":[70],"we":[71],"proposed":[72,85,168],"countermeasure":[74],"fight":[76],"against":[77],"Replay":[78],"attacks.":[79],"While":[80],"some":[81],"existing":[82],"work":[83,143],"has":[84],"set":[87],"time":[89,107],"bound":[90],"prevent":[92],"relay":[93,101,134],"attack":[94,102],"based":[95],"on":[96],"assumption":[98],"will":[103],"take":[104],"much":[105],"longer":[106],"complete":[109],"than":[110],"normal":[112,150],"transaction.":[114],"Existing":[115],"approaches":[116],"however":[117],"did":[118],"not":[119],"address":[120],"situation":[122],"when":[123],"cloud-based":[124],"authentication":[125],"involved":[127],"may":[129],"confuse":[130],"it":[131],"attack.":[135],"We":[136],"extended":[137],"time-bound":[139],"approach":[140],"presents":[145],"comprehensive":[147],"estimate":[148],"transactions":[151],"versus":[152],"relayed":[153],"transactions.":[154],"A":[155],"prototype":[156],"application":[158],"was":[159],"also":[160],"built":[161],"prove":[163],"correctness":[165],"approach.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
