8 DISCUSSION
The problem of limiting data access in a physical de-
vice is extremely difficult. Attacks that try to infer
information from a device can be categorized as pas-
sive or intrusive attacks. In passive attacks the system
interface is probed for either timing or electrical dif-
ferences. In intrusive attacks the adversary is able to
breach the physical boundary of the package and can
scan, probe or alter the hardware itself.
In FORCE, on the one hand, intrusive attacks
are not feasible as they alter the functionality of the
scratch card. On the other hand, passive attacks have
been analyzed by subdividing them into powered and
un-powered attacks. In powered attacks the device
is monitored while running whilst in un-powered at-
tacks, information is extracted from the device while
the hardware is not powered on. In FORCE no value
used by the protocol is permanently stored in the CD.
As such, un-powered attacks are mitigated. On the
contrary, a run-time attack using extremely complex
monitoring tools could have access to the values be-
ing computed during each step of the protocol. How-
ever, stealing information on the fly at run-time would
require extremely expensive instrumentation whose
cost is well beyond the relatively small amount of
money that can be stored in a scratch card. Further, a
successful extraction of data from a scratch card will
not reveal any useful information about other scratch
cards, even if they are shipped by the same card is-
suer. As such, as already discussed in Section 6 we
can safely assume that this kind of attack is not worth
the effort and, as such, it is considered overkill.
9 CONCLUSION AND FUTURE
WORK
In this paper we have presented the first fully off-line
approach for micro-mobile payments. We have de-
scribed how our solution provides a higher security
level without any trustworthiness assumption over the
devices involved in the payment protocol. This has
mainly been achieved by leveraging PUF properties
and a special read-once memory where our digital
credits have been stored using a highly unpredictable
layout. Our proposal has been thoroughly discussed
with reference to state of the art solutions. Features
such as feasibility and convenience have been shown.
Finally, some open issues that will require fur-
ther investigation have been identified. In particular,
present FORCE only allows each off-line credit to be
spent once. We are working on an enhanced version
of FORCE that will allow digital credit to be spent
in multiple off-line transactions while maintaining the
same level of security and usability.
REFERENCES
Aigner, M., Dominikus, S., and Feldhofer, M. (2007). A
System of Secure Virtual Coupons Using NFC Tech-
nology. In IEEE PerComW’07, pages 362–366. IEEE.
Chaurasia, B. K. and Verma, S. (2014). Secure pay while
on move toll collection using {VANET}. Computer
Standards & Interfaces, 36(2):403–411.
Chen, W., Hancke, G., Mayes, K., Lien, Y., and Chiu, J.-H.
(2010). Using 3G network components to enable NFC
mobile transactions and authentication. In IEEE PIC
’10, volume 1, pages 441 –448.
Choi, P. and Kim, D. K. (2012). Design of security en-
hanced TPM chip against invasive physical attacks. In
IEEE ISCAS ’12, pages 1787–1790.
Coskun, V., Ok, K., and Ozdenizci, B. (2012). Near Field
Communication: From Theory to Practice. Wiley
Publishing, 1st edition.
Dai, X., Ayoade, O., and Grundy, J. (2006). Off-line micro-
payment protocol for multiple vendors in mobile com-
merce. PDCAT ’06, pages 197–202, Washington, DC,
USA. IEEE Computer Society.
Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A. (2008).
Fuzzy extractors: How to generate strong keys from
biometrics and other noisy data. SIAM J. Comput.,
38(1):97–139.
Dominikus, S. and Aigner, M. (2007). mcoupons: An ap-
plication for near field communication (nfc). AINAW
’07, pages 421–428, Washington, DC, USA. IEEE
Computer Society.
Golovashych, S. (2005). The technology of identifica-
tion and authentication of financial transactions. from
smart cards to NFC-terminals. In IEEE IDAACS ’05,
pages 407–412.
Griffin, W. P., Raghunathan, A., and Roy, K. (2012). Clip:
Circuit level ic protection through direct injection of
process variations. IEEE Trans. Very Large Scale In-
tegr. Syst., 20(5):791–803.
Juang, W.-S. (2013). An efficient and practical fair buyer-
anonymity exchange scheme using bilinear pairings.
In Asia JCIS, pages 19–26.
Kadambi, K. S., Li, J., and Karp, A. H. (2009). Near-field
communication-based secure mobile payment service.
In ICEC ’09. ACM.
Lewandowska, J. (2013).
http://www.frost.com/prod/servlet/press-
release.pag?docid=274238535.
Lim, D., Lee, J. W., Gassend, B., Suh, G. E., van Dijk,
M., and Devadas, S. (2005). Extracting secret keys
from integrated circuits. IEEE Trans. Very Large Scale
Integr. Syst., 13(10):1200–1205.
Maes, R., Tuyls, P., and Verbauwhede, I. (2009). Low-
overhead implementation of a soft decision helper
data algorithm for SRAM PUFs. CHES ’09, pages
332–347, Berlin, Heidelberg. Springer-Verlag.
FORCE-FullyOff-linesecuReCrEditsforMobileMicroPayments
135