dc.contributor.author |
Tsague, HD
|
|
dc.contributor.author |
Van der Merwe, Johannes J
|
|
dc.contributor.author |
Moabalobelo, Terrence
|
|
dc.date.accessioned |
2016-04-22T07:29:28Z |
|
dc.date.available |
2016-04-22T07:29:28Z |
|
dc.date.issued |
2015-03 |
|
dc.identifier.citation |
Tsague, H.D, Van der Merwe, J and Moabalobelo, T. 2015. Secure firmware updates for point of sale terminals. In: The 10th International Conference on Cyber Warfare and Security, 24-25 March 2015, Mpumalanga, South Africa |
en_US |
dc.identifier.uri |
http://academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/8516
|
|
dc.description |
The 10th International Conference on Cyber Warfare and Security, 24-25 March 2015, Mpumalanga, South Africa. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website |
en_US |
dc.description.abstract |
A large number of electronic transactions are performed with credit or debit cards at point of sale terminals located at merchant stores. The success of this form of payment however, has an associated cost due to the management and maintenance of the equipment. In particular, there is an important cost related to the deployment of new software upgrades for the point of sale terminals, since in most cases human intervention is required. In this paper, we present a lightweight protocol for secure firmware updates for smart card based point of sale terminals. The protocol has especially been designed with respect to the limited hardware resources in such devices. Also, the low bandwidth and the risk of packet loss in the wireless link have been taken into consideration. The protocol provides data integrity and authenticity protection, and thus prevents an attacker from modifying a firmware in transit and installing malicious firmware in the terminals. In addition, terminals can verify that, the received firmware originated from a trusted source. The protocol includes confidentiality protection, and thus the proprietary firmware is kept secret from attackers. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Academic Conferences International |
en_US |
dc.relation.ispartofseries |
Workflow;16375 |
|
dc.subject |
Point of sale |
en_US |
dc.subject |
Firmware updates |
en_US |
dc.subject |
Upgrades |
en_US |
dc.subject |
Authenticity |
en_US |
dc.subject |
Confidentiality |
en_US |
dc.subject |
Information security |
en_US |
dc.subject |
Electronic transactions |
en_US |
dc.title |
Secure firmware updates for point of sale terminals |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Tsague, H., Van der Merwe, J. J., & Moabalobelo, T. (2015). Secure firmware updates for point of sale terminals. Academic Conferences International. http://hdl.handle.net/10204/8516 |
en_ZA |
dc.identifier.chicagocitation |
Tsague, HD, Johannes J Van der Merwe, and T Moabalobelo. "Secure firmware updates for point of sale terminals." (2015): http://hdl.handle.net/10204/8516 |
en_ZA |
dc.identifier.vancouvercitation |
Tsague H, Van der Merwe JJ, Moabalobelo T, Secure firmware updates for point of sale terminals; Academic Conferences International; 2015. http://hdl.handle.net/10204/8516 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Tsague, HD
AU - Van der Merwe, Johannes J
AU - Moabalobelo, T
AB - A large number of electronic transactions are performed with credit or debit cards at point of sale terminals located at merchant stores. The success of this form of payment however, has an associated cost due to the management and maintenance of the equipment. In particular, there is an important cost related to the deployment of new software upgrades for the point of sale terminals, since in most cases human intervention is required. In this paper, we present a lightweight protocol for secure firmware updates for smart card based point of sale terminals. The protocol has especially been designed with respect to the limited hardware resources in such devices. Also, the low bandwidth and the risk of packet loss in the wireless link have been taken into consideration. The protocol provides data integrity and authenticity protection, and thus prevents an attacker from modifying a firmware in transit and installing malicious firmware in the terminals. In addition, terminals can verify that, the received firmware originated from a trusted source. The protocol includes confidentiality protection, and thus the proprietary firmware is kept secret from attackers.
DA - 2015-03
DB - ResearchSpace
DP - CSIR
KW - Point of sale
KW - Firmware updates
KW - Upgrades
KW - Authenticity
KW - Confidentiality
KW - Information security
KW - Electronic transactions
LK - https://researchspace.csir.co.za
PY - 2015
T1 - Secure firmware updates for point of sale terminals
TI - Secure firmware updates for point of sale terminals
UR - http://hdl.handle.net/10204/8516
ER - |
en_ZA |