Vulnerability Analysis And Security System For NFC-Enabled Mobile Phones
S.Kavya, K.Pavithra, Sujitha Rajaram, M.Vahini, N Harini
Index Terms: Authentication, Decryption, Encryption, NFC tag, Security, NFC technology
Abstract: An encryption system for NFC enabled applications using a combination of AES cryptography algorithm and Diffie-Hellman key negotiation scheme which when implemented prevents data modification, man in the middle attack and eavesdropping has been proposed in the paper. A timestamp based Protocol where the size of the file and time at which it is sent is retrieved to calculate the estimated time of reception which will be compared with actual reception time is also proposed to prevent relay attacks. A complete study of authentication methodologies in NFC technology and a critical analysis of our proposed system with the existing systems showing how it can resist all the possible attacks on the data exchanged between mobile phones through NFC technology.
. CollinMulliner ,Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones , Fraunhofer Institute for Secure Information Technology
. http://www.maintag.fr/chiers/pdf-fr/nfcforum-ts-ndef-1-0.pdf, June 25, 2012
. David M. Monteiro1, Joel J. P. C. Rodrigues, and Jaime Lloret ,A Secure NFC Application for Credit Transfer Among Mobile Phones Instituto de Telecomunicações, University of Beira Interior, Portugal
. Muhammad Qasim Saeed, Colin D.Walter, Offline NFC Tag Authentication