Documente Academic
Documente Profesional
Documente Cultură
c c
Submitted by:-
a
This paper gives a case study of security in NFC. It uses a systematic approach to analyze the
various aspects of security whenever an NFC interface is used. It lists the threats, which are
applicable to NFC, and describes solutions to protect against these threats.
Although the communication range of NFC is limited to a few centimeters, NFC alone does not
ensure secure communications. Thereare different possible types of attacks on NFC.Applications
may use higher-layer cryptographic protocols (e.g., SSL) to establish a secure channel.
A man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint
to the satisfaction of the other²it is an attack on mutual authentication.
î
NFC has no built in mechanism to guard against eavesdropping.The data transmitted in passive
modeis significantly harder to be eavesdropped on, but usingonly the passive mode is not
sufficient formost applications which transmit sensitive data.The only real solution to
eavesdropping is toestablish a secure channel.
D
Protection against data modification can be achievedin various ways.
å NFC devices can check the RF field while sending.
å y using 106k aud in active mode it getsimpossible for an attacker to modify all the
datatransmitted via the RF link
å Secure channel construction.
D
NFC devices check the RF field, when they are transmittingdata. If NFC devices do this, it will
be able todetect the attack. The power which is needed to corruptthe data is significantly bigger,
than the power whichcan be detected by the NFC device. Thus, every suchattackcan be detected
very easily.