IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 6, June 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Vulnerability Analysis And Security System For NFC-Enabled Mobile Phones

[Full Text]

 

AUTHOR(S)

S.Kavya, K.Pavithra, Sujitha Rajaram, M.Vahini, N Harini

 

KEYWORDS

Index Terms: Authentication, Decryption, Encryption, NFC tag, Security, NFC technology

 

ABSTRACT

Abstract: An encryption system for NFC enabled applications using a combination of AES cryptography algorithm and Diffie-Hellman key negotiation scheme which when implemented prevents data modification, man in the middle attack and eavesdropping has been proposed in the paper. A timestamp based Protocol where the size of the file and time at which it is sent is retrieved to calculate the estimated time of reception which will be compared with actual reception time is also proposed to prevent relay attacks. A complete study of authentication methodologies in NFC technology and a critical analysis of our proposed system with the existing systems showing how it can resist all the possible attacks on the data exchanged between mobile phones through NFC technology.

 

REFERENCES

[1]. CollinMulliner ,Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones , Fraunhofer Institute for Secure Information Technology

[2]. http://www.nfc-forum.org/aboutnfc/nfc

[3]. http://www.maintag.fr/chiers/pdf-fr/nfcforum-ts-ndef-1-0.pdf, June 25, 2012

[4]. David M. Monteiro1, Joel J. P. C. Rodrigues, and Jaime Lloret ,A Secure NFC Application for Credit Transfer Among Mobile Phones Instituto de Telecomunicações, University of Beira Interior, Portugal

[5]. Muhammad Qasim Saeed, Colin D.Walter, Offline NFC Tag Authentication

[6]. http://www.thegeekstuff.com/2013/01/diffie-hellman-key-exchange-algorithm/