SlideShare a Scribd company logo
1 of 34
Download to read offline
NFC Operating Modes and
Security

By Rajeev Verma and Alessandro Sarra
Overview
●
●
●
●
●
●
●
●

Brief Introduction
Induction coupling
Modes
Essentials of each mode
Security
Future Development
Conclusions
References
Introduction to NFC
● Communication technology which works on physical
touch (4-10cm) of the devices.
● Benefits:
Intuitive
Versatile
Open and standard based
Inherently secure
Interoperable
Security-ready
Induction Coupling
Induction coupling is the technology behind the data
transfer in NFC communication.
Power received by receiver:
C is coupling coefficient which decides the effectiveness
in communication.
NFC Operating Modes
NFC Modes : Card Emulation Mode
●
●
●
●

Emulate contact-less smart card
Communicate with RFID readers
Mobile payment and ticketing
Compatible to existing infrastructure
Card Emulation Mode Communication
Architecture
NFC Operating Modes
NFC Modes :Reader/Writer Mode
● Communicate with:
○ Smart Cards
○ NFC tags
● Embedded in readable object
● Sends Information Passively
Communication Architecture of Reader/Writer Mode
NDEF: NFC Data Exchange Format
● Standardized format
○ Store data on tags
○ Transport data
● Lightweight Binary
○ Encapsulation
■ Single message
construct
■ One or more payload
NDEF Message
NDEF : Record
●
●
●
●

●

●
●

MB - msg begin
ME - msg end
CF - Chunk Flag
○ CF = 0 No chunk.
SR - Short Record
○ SR=0 : Single octet msg.
○ Max 255 octets
IL - Identification length
○ IL = 0 : ID Length omitted from
Record.
Type Length : Define length of Type
field octet
Payload Length
NDEF : TNF
● → structure of type
field
● → 3 bits field
● Type field finally have
the type for message.
NFC Operating Modes
NFC Modes : Peer-to-Peer
● 2 Devices
● Direct Communication
● Share Bluetooth or WiFi
setup
● Send photos or small text
NFC Modes: Peer-to-Peer
● Communication Architecture
Peer-to-Peer mode essentials
● Protocol Stack

● LLCP Protocol Services
○ Connectionless transport
○ Connection oriented transport
○ Link related Services
○ Asynchronous Balanced communication
○ Protocol Multiplexing

OSI vs LLCP
Security Aspects in NFC
●
●
●
●
●
●
●
●

Eavesdropping
Data Corruption
Data Modification
Relay Attack
Lost Property
Walk-off
NDEF and Signature Recognition
Weaknesses of Digital Signing
Eavesdropping
● Even though Range is small in NFC, still signals are
retrievable from 1mt to 10mt.
● Using a secure channel can be a solution for NFC data
transfer.
Data Corruption
● Attacker can attempt to disrupt communications by
forcefully sending seemingly valid data.
● Channel can be blocked for ongoing data transmission
between devices.
Solution:
● Device can report the higher power used for
communication which is possibly the corrupted Data.
Data Modification
● Data can be maliciously altered in the communication
path keeping the data format same.
Solution:
● 100% modulation and Miller encoding can prevent Data
Modification.
● Data transfer at 106 baud rate is least susceptible for
modification but eavesdropping probability can be
increased.
Man in the middle
● Communication between two parties can is interrupted
by third.
● Potentially possible when two mobile devices are
actively communicating in peer-to-peer mode.
● Communication in other modes are immune to this
attack.
Walk-off
● Attacks are possible during access to a secure NFC
function or data is given prior to it timing out after a
period of inactivity.
Solution:
● Wireless authentication factor known as an electronic
"leash"
● Devices are leashed till the device goes out of the
range.
Relay Attack
● Similar to Man in Middle attack, adversary has to
forward the request of the reader to the victim.
● Attacker potentially has access any service directly
related to the data being sent.
Lost Property
● If the NFC device is lost, it will open access to anyone
who finds it and can pass authenticity checks.
● Extended security concepts do exist at the application
level that provide theft protection and tracking.
NDEF and Signature Recognition
● Digital Signature Records can provide encryption
through use of public-key cryptography.
● Digital Signature Records, when coupled with the NFC
Data Exchange Format, can serve as a feasible means
of security.
Benefits:
Authentic
→ There is a unique signer.
Unforgettable → Only the signature owner may
create a key.
Non-reusable: → The signature is bound the signed
Weakness
● Digital Signing is still a weakness for NFC
communication.
● Digital signing can resolve the problem of device
authentication and reliable event triggering.
Future Applications
● Interactive data
● NFC Tag Everything!!!
○ Tag doubles as bar-code
● Mobile Device Transactions
● Organization and Awareness
Future Development
● Wireless charging
○ reception
○ transmission
○ both
● Dock for
home/office/car
● 13.56MHz
● 1 Watt Max
● Energy Saving
Future Development

● SD Card Integration
○
○
○
○

Isolated Antenna
Memory Controller
Card Controller
Memory

● OTA, MiFare, JCOP,
Perso
Conclusion
● Emerging Technology
● Pros
○ Power-saving
○ Low Profile
● Cons
○ Inefficient
○ Hard to ‘Sell’
Questions??
Thank You!
[1] V. Coskun, K. Ok, et al., “NFC Operating Modes,” Near Field Communication: From Theory to Practice, Chichester, United Kingdom: John
Wiley and Sons Ltd., 2012, ch. 4.
[2] S. A. Ahson and I. Mohammad, “Security in NFC,” in Near Field Communications Handbook, Boca Raton: CRC Press, 2012, ch. 2, sec. 2,
pp. 26-45
[3] NFC Record Type Definition, NFC Forum Technical Specification, Rev. 1.0, Jul. 2006.
[4] E. Strommer, M. Jurvansuu, T. Tuikka, A. Yisaukko-oja, H. Rapakko, and J. Vesterinen, “NFC-enabled wireless charging,” in Near Field
Communication (NFC), 2012 4th International Workshop on, march 2012, pp. 36-41.
[5] M. Roland and J. Langer, “Digital Signature Records for the NFC Data Exchange Format,” in Proceedings of the Second International
Workshop on Near Field Communication (NFC 2010), Monaco, Apr. 2010, pp. 71-76.
[6] G. Madlmayr, J. Langer, C. Kanter, and J. Scharinger, “NFC Devices: Security and Privacy,” in Third International Conference on Availability,
Reliability and Security, March 2008, pp.642-647.
[7] Yen-Sheng Chen, “Analysis of antenna coupling in near-field RFID systems,” in IEEE AP-S Int. Symp. Dig., Jun. 2009, pp. 1-4.
[8] P. Dobrigkeit, T. Flach, P. Faymonville, J. Muller. Exchange of contact data between mobile phones using NFCIP” in Proceedings of 4th
European Workshop on RFID Systems and Technologies (RFID SysTech), 2008, pp. 1-9.
[9] S. Wu, “Promoting Collaborative Mobile Payment by Using NFC-Micro SD Technology,” in Tenth International Conference on Services
Computing, Jun. 2013, pp. 454-461.

More Related Content

What's hot

Near field communication
Near field communicationNear field communication
Near field communication
Nagesh Mishra
 
Near field communication
Near field communicationNear field communication
Near field communication
Nithin Krishna
 
Designing low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of ThingsDesigning low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of Things
Andreas Schaller
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013
Shane Turner
 

What's hot (20)

NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
 
Ultrabook Development Using Sensors - Intel AppLab Berlin
Ultrabook Development Using Sensors - Intel AppLab BerlinUltrabook Development Using Sensors - Intel AppLab Berlin
Ultrabook Development Using Sensors - Intel AppLab Berlin
 
Telecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodzTelecommunications in the logistic sector lodz
Telecommunications in the logistic sector lodz
 
Nfc Overview
Nfc OverviewNfc Overview
Nfc Overview
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
RFID/NFC for the Masses
RFID/NFC for the MassesRFID/NFC for the Masses
RFID/NFC for the Masses
 
NFC for the Internet of Things
NFC for the Internet of ThingsNFC for the Internet of Things
NFC for the Internet of Things
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 
NFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer ExperienceNFC: Shaping the Future of the Connected Customer Experience
NFC: Shaping the Future of the Connected Customer Experience
 
Designing low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of ThingsDesigning low costs sensor system for the Internet of Things
Designing low costs sensor system for the Internet of Things
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013
 
ReiterNokia
ReiterNokiaReiterNokia
ReiterNokia
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
Ask Contactless Terminals
Ask Contactless TerminalsAsk Contactless Terminals
Ask Contactless Terminals
 

Viewers also liked

Near field communication
Near field communicationNear field communication
Near field communication
Jwal Dakwala
 
Near field communication
Near field communication Near field communication
Near field communication
Paurnima Pawar
 
Near field communication(nfc)
Near field communication(nfc)Near field communication(nfc)
Near field communication(nfc)
Bhaumik Gagwani
 

Viewers also liked (19)

Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Near field communication
Near field communicationNear field communication
Near field communication
 
A Librarian's Field Guide to Near Field Communication
A Librarian's Field Guide to Near Field CommunicationA Librarian's Field Guide to Near Field Communication
A Librarian's Field Guide to Near Field Communication
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
Near field communication - Data transmission
Near field communication - Data transmissionNear field communication - Data transmission
Near field communication - Data transmission
 
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field CommunicationNext Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communication Near field communication
Near field communication
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
 
Project
ProjectProject
Project
 
Seminar Report on NFC
Seminar Report on NFCSeminar Report on NFC
Seminar Report on NFC
 
Near field communication(nfc)
Near field communication(nfc)Near field communication(nfc)
Near field communication(nfc)
 
LALIT NFC
LALIT NFCLALIT NFC
LALIT NFC
 

Similar to Nfc power point

Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
GHADA SALEH
 
Near field communication
Near field communicationNear field communication
Near field communication
Vaibhav Chandak
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Tejasvi Kurusetti
 
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
IJCI JOURNAL
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
Naveen Sampath
 
Nfc
NfcNfc

Similar to Nfc power point (20)

Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc technology
Nfc technologyNfc technology
Nfc technology
 
White Paper NFC Security
White Paper NFC SecurityWhite Paper NFC Security
White Paper NFC Security
 
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPENFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business CardsNFiD: An NFC based system for Digital Business Cards
NFiD: An NFC based system for Digital Business Cards
 
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
Near field communication
Near field communicationNear field communication
Near field communication
 
RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
NFC
NFCNFC
NFC
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
 
Nfc
NfcNfc
Nfc
 
Nfc
NfcNfc
Nfc
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Nfc power point

  • 1. NFC Operating Modes and Security By Rajeev Verma and Alessandro Sarra
  • 2. Overview ● ● ● ● ● ● ● ● Brief Introduction Induction coupling Modes Essentials of each mode Security Future Development Conclusions References
  • 3. Introduction to NFC ● Communication technology which works on physical touch (4-10cm) of the devices. ● Benefits: Intuitive Versatile Open and standard based Inherently secure Interoperable Security-ready
  • 4. Induction Coupling Induction coupling is the technology behind the data transfer in NFC communication. Power received by receiver: C is coupling coefficient which decides the effectiveness in communication.
  • 6. NFC Modes : Card Emulation Mode ● ● ● ● Emulate contact-less smart card Communicate with RFID readers Mobile payment and ticketing Compatible to existing infrastructure
  • 7. Card Emulation Mode Communication Architecture
  • 9. NFC Modes :Reader/Writer Mode ● Communicate with: ○ Smart Cards ○ NFC tags ● Embedded in readable object ● Sends Information Passively
  • 10. Communication Architecture of Reader/Writer Mode
  • 11. NDEF: NFC Data Exchange Format ● Standardized format ○ Store data on tags ○ Transport data ● Lightweight Binary ○ Encapsulation ■ Single message construct ■ One or more payload
  • 13. NDEF : Record ● ● ● ● ● ● ● MB - msg begin ME - msg end CF - Chunk Flag ○ CF = 0 No chunk. SR - Short Record ○ SR=0 : Single octet msg. ○ Max 255 octets IL - Identification length ○ IL = 0 : ID Length omitted from Record. Type Length : Define length of Type field octet Payload Length
  • 14. NDEF : TNF ● → structure of type field ● → 3 bits field ● Type field finally have the type for message.
  • 16. NFC Modes : Peer-to-Peer ● 2 Devices ● Direct Communication ● Share Bluetooth or WiFi setup ● Send photos or small text
  • 17. NFC Modes: Peer-to-Peer ● Communication Architecture
  • 18. Peer-to-Peer mode essentials ● Protocol Stack ● LLCP Protocol Services ○ Connectionless transport ○ Connection oriented transport ○ Link related Services ○ Asynchronous Balanced communication ○ Protocol Multiplexing OSI vs LLCP
  • 19. Security Aspects in NFC ● ● ● ● ● ● ● ● Eavesdropping Data Corruption Data Modification Relay Attack Lost Property Walk-off NDEF and Signature Recognition Weaknesses of Digital Signing
  • 20. Eavesdropping ● Even though Range is small in NFC, still signals are retrievable from 1mt to 10mt. ● Using a secure channel can be a solution for NFC data transfer.
  • 21. Data Corruption ● Attacker can attempt to disrupt communications by forcefully sending seemingly valid data. ● Channel can be blocked for ongoing data transmission between devices. Solution: ● Device can report the higher power used for communication which is possibly the corrupted Data.
  • 22. Data Modification ● Data can be maliciously altered in the communication path keeping the data format same. Solution: ● 100% modulation and Miller encoding can prevent Data Modification. ● Data transfer at 106 baud rate is least susceptible for modification but eavesdropping probability can be increased.
  • 23. Man in the middle ● Communication between two parties can is interrupted by third. ● Potentially possible when two mobile devices are actively communicating in peer-to-peer mode. ● Communication in other modes are immune to this attack.
  • 24. Walk-off ● Attacks are possible during access to a secure NFC function or data is given prior to it timing out after a period of inactivity. Solution: ● Wireless authentication factor known as an electronic "leash" ● Devices are leashed till the device goes out of the range.
  • 25. Relay Attack ● Similar to Man in Middle attack, adversary has to forward the request of the reader to the victim. ● Attacker potentially has access any service directly related to the data being sent.
  • 26. Lost Property ● If the NFC device is lost, it will open access to anyone who finds it and can pass authenticity checks. ● Extended security concepts do exist at the application level that provide theft protection and tracking.
  • 27. NDEF and Signature Recognition ● Digital Signature Records can provide encryption through use of public-key cryptography. ● Digital Signature Records, when coupled with the NFC Data Exchange Format, can serve as a feasible means of security. Benefits: Authentic → There is a unique signer. Unforgettable → Only the signature owner may create a key. Non-reusable: → The signature is bound the signed
  • 28. Weakness ● Digital Signing is still a weakness for NFC communication. ● Digital signing can resolve the problem of device authentication and reliable event triggering.
  • 29. Future Applications ● Interactive data ● NFC Tag Everything!!! ○ Tag doubles as bar-code ● Mobile Device Transactions ● Organization and Awareness
  • 30. Future Development ● Wireless charging ○ reception ○ transmission ○ both ● Dock for home/office/car ● 13.56MHz ● 1 Watt Max ● Energy Saving
  • 31. Future Development ● SD Card Integration ○ ○ ○ ○ Isolated Antenna Memory Controller Card Controller Memory ● OTA, MiFare, JCOP, Perso
  • 32. Conclusion ● Emerging Technology ● Pros ○ Power-saving ○ Low Profile ● Cons ○ Inefficient ○ Hard to ‘Sell’
  • 34. Thank You! [1] V. Coskun, K. Ok, et al., “NFC Operating Modes,” Near Field Communication: From Theory to Practice, Chichester, United Kingdom: John Wiley and Sons Ltd., 2012, ch. 4. [2] S. A. Ahson and I. Mohammad, “Security in NFC,” in Near Field Communications Handbook, Boca Raton: CRC Press, 2012, ch. 2, sec. 2, pp. 26-45 [3] NFC Record Type Definition, NFC Forum Technical Specification, Rev. 1.0, Jul. 2006. [4] E. Strommer, M. Jurvansuu, T. Tuikka, A. Yisaukko-oja, H. Rapakko, and J. Vesterinen, “NFC-enabled wireless charging,” in Near Field Communication (NFC), 2012 4th International Workshop on, march 2012, pp. 36-41. [5] M. Roland and J. Langer, “Digital Signature Records for the NFC Data Exchange Format,” in Proceedings of the Second International Workshop on Near Field Communication (NFC 2010), Monaco, Apr. 2010, pp. 71-76. [6] G. Madlmayr, J. Langer, C. Kanter, and J. Scharinger, “NFC Devices: Security and Privacy,” in Third International Conference on Availability, Reliability and Security, March 2008, pp.642-647. [7] Yen-Sheng Chen, “Analysis of antenna coupling in near-field RFID systems,” in IEEE AP-S Int. Symp. Dig., Jun. 2009, pp. 1-4. [8] P. Dobrigkeit, T. Flach, P. Faymonville, J. Muller. Exchange of contact data between mobile phones using NFCIP” in Proceedings of 4th European Workshop on RFID Systems and Technologies (RFID SysTech), 2008, pp. 1-9. [9] S. Wu, “Promoting Collaborative Mobile Payment by Using NFC-Micro SD Technology,” in Tenth International Conference on Services Computing, Jun. 2013, pp. 454-461.