436 Hits in 6.2 sec

A Survey on Near Field Communication (NFC) Technology

Vedat Coskun, Busra Ozdenizci, Kerem Ok
2012 Wireless personal communications  
An encouraging property of NFC technology is the assurance of secure storage of the personal and private information on the secure element of the mobile phones those are traditionally saved in other items  ...  Moreover NFC technology gives NFC reader capability to mobile phones; hence RFID (Radio Frequency Identification) tags can be read.  ...  Security on Readers As mentioned earlier, NFC reader is an important NFC device, which mainly enables card emulation mode applications consisting of an NFC enabled mobile phone on one side and a reader  ... 
doi:10.1007/s11277-012-0935-5 fatcat:vqrzstrvwngxvd2kgbn4stqtwu

The Survey on Near Field Communication

Vedat Coskun, Busra Ozdenizci, Kerem Ok
2015 Sensors  
NFC technology enables the integration of services from a wide range of applications into one single smartphone.  ...  , secure elements, privacy and security, usability analysis, and ecosystem and business issues.  ...  between a smartphone on one side, and an NFC tag, another smartphone, or an NFC reader on the other side, respectively [8, 18] .  ... 
doi:10.3390/s150613348 pmid:26057043 pmcid:PMC4507650 fatcat:ddxjqx2cebaopdxpg6jyctjsei

NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit [article]

Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick
2020 arXiv   pre-print
Near-Field Communication (NFC) is being used in a variety of security-critical applications, from access control to payment systems.  ...  However, NFC protocol analysis typically requires expensive or conspicuous dedicated hardware, or is severely limited on smartphones.  ...  , and by the German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and the Arts within their joint support of the National Research Center for Applied  ... 
arXiv:2008.03913v1 fatcat:pw5iurxuirci7fqho2tt74rw24

A Lightweight Security Protocol for NFC-based Mobile Payments

Mohamad Badra, Rouba Borghol Badra
2016 Procedia Computer Science  
In this work, we describe a security solution that can be used to securely establish mobile payment transactions over the Near-Field Communication (NFC) radio interface.  ...  We show that our approach maintains the security of NFC communications and we further demonstrate that our solution is simple, scalable, cost-effective, and incurs minimal computational processing overheads  ...  Relay attack could be installed to establish a bi-directional communication channel between two legitimate NFC-enabled devices in order to create a relay between two NFC-enabled devices or between a reader  ... 
doi:10.1016/j.procs.2016.04.156 fatcat:cddsl543sbduzizxvcjymqusem

A Role-Based Service Level NFC Ecosystem Model

Kerem OK, Vedat Coskun, Busra Ozdenizci, Mehmet N. Aydin
2011 Wireless personal communications  
NFC reader is used as an initiator during an NFC communication; NFC tag is used as a target, but NFC mobile can be used either as an initiator or a target based on the application requirements.  ...  NFC-enabled mobile phone creates magnetic field and powers the NFC tag within 4 cm Tag broadcasts the answer which is then read by mobile phone 1 2  ...  Some examples of side channel attacks are listed as timing analysis, simple side channel analysis, and fault induction attack as defined in [15] .  ... 
doi:10.1007/s11277-011-0484-3 fatcat:7wrgxrthbrcblms737iqjwdw4e

Security of Wireless Embedded Devices in the Real World [chapter]

Timo Kasper, David Oswald, Christof Paar
2012 ISSE 2011 Securing Electronic Business Processes  
., electronic passports, the remote keyless entry system KeeLoq, a Mifare Classic based contactless payment system, and a public transport system relying on Mifare DESfire cards we demonstrate that it  ...  The survey presented in this paper focuses on those devices that employ cryptographic mechanisms as a protection against ill-intended usage or unauthorizedly accessing secured data.  ...  Related Work Oren and Shamir [OS07] presented a successful side-channel attack against Class 1 EPC tags operating in the UHF frequency range which can be disabled remotely by sending a secret "kill password  ... 
doi:10.1007/978-3-8348-8652-1_16 fatcat:btgggkxq6jexph7c6zpwlglf3e

RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions

Ismail Turk, Pelin Angin, Ahmet Cosar
2019 IEEE Access  
they own, thus can remotely control, on the devices.  ...  Today, there are millions of the NFC-enabled mobile handsets in the market, with mobile handset manufacturers and mobile network operators enabling m-wallet solutions using the secure elements (SEs) that  ...  This ensures transaction data generation security against side channel power analysis attacks. • A random CryptoKey is generated for each transaction in order to perform transaction data encryption with  ... 
doi:10.1109/access.2019.2929011 fatcat:veqclqshgzb4rmqawf7lmrgfcq

Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario [chapter]

Thomas Korak, Thomas Plos, Michael Hutter
2012 Lecture Notes in Computer Science  
In this work we present differential power analysis (DPA) and differential electromagnetic analysis (DEMA) attacks on a securityenabled RFID tag.  ...  The attacks are conducted on both an ASIC-chip version and on an FPGA-prototype version of the tag.  ...  Side-Channel Analysis Results In order to evaluate the security of the NFC tag we performed DPA and DEMA attacks on the AES implementation on the chip.  ... 
doi:10.1007/978-3-642-29912-4_2 fatcat:rok5f4xr7ra6ravbmzhjzqjwaq

Security Analysis of Near-Field Communication (NFC) Payments [article]

Dennis Giese, Kevin Liu, Michael Sun, Tahin Syed, Linda Zhang
2019 arXiv   pre-print
We evaluate our methods on our personal Apple and Google Pay accounts and demonstrate two successful attacks on these NFC payment systems.  ...  In this paper, we propose a method to attack mobile-based NFC payment methods and make payments at locations far away from where the attack occurs.  ...  EMV chip cards contain a cryptographic microprocessor that is specially designed to protect the secrets on the against unauthorized access and side channel attacks.  ... 
arXiv:1904.10623v1 fatcat:eylmujomvjfnrc5z5lbm32e3oy

Facilitating a Secured Status Data Acquisition from Industrial Equipment via NFC

Christian Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner
2014 Journal of Internet Technology and Secured Transaction  
Using a non-permanent NFC based connection, connectivity is only established adhoc on customer demand, and any data transmission is fully transparent to a customer.  ...  Finally, we apply the STRIDE threat modelling technique on our design to discover unmitigated threats.  ...  An NFC enabled mobile phone acts as the intermediary device to a remote central data acquisition server, where the data is displayed in a more presentable form.  ... 
doi:10.20533/jitst.2046.3723.2014.0037 fatcat:aw5c6morwnbunnowxelcmnjhke

Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack [article]

Michael Roland
2013 arXiv   pre-print
This report explains recent developments in relay attacks on contactless smartcards and secure elements. It further reveals how these relay attacks can be applied to the Google Wallet.  ...  Finally, it gives an overview of the components and results of a successful attempt to relay an EMV Mag-Stripe transaction between a Google Wallet device and an external card emulator over a wireless network  ...  Specifically, a secure channel based on the secure channel protocol SCP02 is established between the secure element and a remote server which performs the card management through this authenticated and  ... 
arXiv:1209.0875v2 fatcat:6da6kjd7cfb7fn65hg3i4xpwyy

Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things

Thomas Ulz, Thomas Pieber, Andrea Holler, Sarah Haas, Christian Steger
2017 IEEE Journal of Radio Frequency Identification  
The applicability of our approach is demonstrated by two prototypical implementations, as well as a detailed security analysis.  ...  Therefore, in this paper, we present an easy-to-use NFC-based configuration approach for IoT devices that is secured by appropriate security measures in software and hardware.  ...  In addition to these so-called side-channel attacks, also invasive physical attacks can be used to reveal confidential information [27] .  ... 
doi:10.1109/jrfid.2017.2745510 fatcat:i5dl33owejdnlcwykmsu7m7ujm

Trojan of Things: Embedding Malicious NFC Tags into Common Objects [article]

Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori
2017 arXiv   pre-print
We present a novel proof-of-concept attack named Trojan of Things (ToT), which aims to attack NFC- enabled mobile devices such as smartphones.  ...  These techniques enable an attacker to carry out various severe and sophisticated attacks unbeknownst to the device owner who unintentionally puts the device close to a ToT.  ...  Kazuyuki Ishimoto for sharing the valuable comments on the mechanism of Phantom touch generator. We also thank Mr.  ... 
arXiv:1702.07124v1 fatcat:nrnouzpsnbdsrbtyjcpfbsvm7a

Security in IoMT Communications: A Survey

Dimitris Koutras, George Stergiopoulos, Thomas Dasaklis, Panayiotis Kotzanikolaou, Dimitris Glynos, Christos Douligeris
2020 Sensors  
Based on realistic attacks we identify available mitigation controls that may be applied to secure IoMT communications, as well as existing research and implementation gaps.  ...  of security.  ...  Side channel attack. Authentication-hash based protocols, encryption functions.  ... 
doi:10.3390/s20174828 pmid:32859036 pmcid:PMC7506588 fatcat:l3krtht6gjbwvon3sbhsenjr24

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick
2018 IEEE Communications Surveys and Tutorials  
A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables  ...  Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices.  ...  ACKNOWLEDGMENT The authors would like to thank Jacqueline Brendel for her insightful discussion on the security of cryptographic protocols used in SDP.  ... 
doi:10.1109/comst.2017.2748278 fatcat:yivmyok3bzfilmkxkpfhdwnbmy
« Previous Showing results 1 — 15 out of 436 results