| Literature DB >> 26057043 |
Vedat Coskun1, Busra Ozdenizci2, Kerem Ok3.
Abstract
Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Entities:
Keywords: Internet of Things; NFC applications; NFC ecosystem; NFC security; NFC survey; NFC usability; Near Field Communication; Wireless Body Sensors; secure element; ubiquitous computing
Year: 2015 PMID: 26057043 PMCID: PMC4507650 DOI: 10.3390/s150613348
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1NFC interaction styles and operating modes.
Figure 2General architecture of a NFC smartphone.
Figure 3Protocol stack of reader/writer operating mode.
Figure 4Protocol stack of peer-to-peer operating mode.
Figure 5Protocol stack of card emulation operating mode.
Figure 6SE and HCE architecture comparison.
Vulnerabilities, attacks and countermeasures.
| Vulnerabilities and Attacks | Countermeasures | |
|---|---|---|
| Tag Manipulation ( | Digitally Signing Tags Using Tag Authentication | |
| Tag Cloning and Tag Impersonation | Digitally Signing Tags | |
| Tag Replacement and Tag Hiding | Protecting Tags with a Physical Shield | |
| Eavesdropping | Using Secure Communication Channel | |
| MIM Attack | Attack is nearly impossible Using active-passive communication mode (RF field is continuously generated by one of the valid parties) Listening RF field when sending data | |
| Relay Attack | Using nonce Using physical proximity based information (e.g., temperature) | |
| Data Corruption | Checking the power of RF Field | |
| Data Modification | Changing Baud rate Monitoring RF Field Using Secure Communication Channel | |
| Data Insertion | Response with no delay from answering device Listening the channel by answering device Using Secure Communication Channel | |
| DoS Attack | Solutions needed | |
| Relay attack | Disabling internal mode communication | |
| By passing the applet PINs those controlled by Smartphone applications | Two-factor authentications New solutions needed | |
| Vulnerabilities in applets caused by erroneous codes | Genetic algorithms to search for vulnerabilities in applets Formal security analyses | |
| Cloning an asset (e.g., ticket, coupon) | Online verification before usage |