NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
NFC Devices: Security and Privacy
NEAR-FIELD COMMUNICATION MAKING LIFE EASY Presenter: Grace Chen NFC Technology.
5Ws on NFC Andrea Vitaletti. Overview What Where Why When Who 5Ws.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Yossef Oren, Dvir Schirman, and Avishai Wool: Tel Aviv University ESORICS 2013.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
NFC Test in Manufacturing Pi Huang
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Networks Evolving? Justin Champion C208 Ext:3723
One Phone to Rule Them All A Case Study Sarah-Jane Saravani Learning Hub Manager Waikato Institute of Technology, New Zealand
IWD2243 Wireless & Mobile Security
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Cosc 4/5730 Android and Blackberry Near Field Communications (NFC)
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Presented By: Arpit Jain Guided By: Prof. D.B. Phatak.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
NFC - Near Field Communication Technology
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
Computer Architecture Lecture 30 Fasih ur Rehman.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Near Field Communication Systems Patras, July 2006.
Week #6: Discussion results NFC technology and its components Group #33 Group member: Tianhao Han Ximeng Sun(Susie) Xing Cao(Star) Zhuoran Yang.
Ignite Presentation: Near Field Communication Harry Yang.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Security in Near Field Communication Strengths and Weaknesses
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
Ingredients of Security
Building a contactless university examination system using NFC Speaker : Chih-Ching Chen Advisor : Dr. Ho-Ting Wu 2013/12/2 1.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Network Security Introduction
Computer threats, Attacks and Assets upasana pandit T.E comp.
Payment systems. Debit or Credit cards  Let the customers pay by taking money directly form their account  Allow the money to borrow the money and the.
 Access Control: It is the term associated with physical security and information security. It is the selective restriction of access to a place or other.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
NETWORK AND COMMUNICATIONS
Koji Nakao, Dai Arisue NICT, Japan
Intro to MIS – MGS351 Network Basics
Operating Mode 1 – Peer-Peer
SHORT DISTANCE WIRELESS COMMUNICATION
Salman Asif Intern at Working on 16 June 2013.
Wireless Fidelity 1 1.
Apple Pay Research on NFC and the security threat
N-Guard: a Solution to Secure Access to NFC tags
Near field communication (NFC)
Security and Privacy in Pervasive/Ubiquitous Computing Systems
Instructor: Mort Anvari
Presentation transcript:

NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.

What is NFC NFC (Near Field Communication). Short range contactless communication between devices (at least one transmission device, e.g. public transport card readers). NFC communication configuration  Active - Active: RF field are alternatively generated.  Active-Passive: RF field generated by first device.  Passive-Active: RF field generated by second device

What is NFC NFC operational mode :  Read/write mode: active device links up with another device to read information (smart mobile - NFC tag)  Peer-to-peer mode: both devices switch between active (sending data), and passive (receiving data).  Card emulation: using NFC device as credit card.

NFC Possible Security Attacks Smart Poster URL Spoofing. RF signal eavesdropping attack. Data Corruption and data insertion. Data stealing.

Smart poster URL spoofing Possible countermeasure: mark the URL in special way

Smart poster URL spoofing Consequences Run man in the middle attack by loading a malicious website => and steal credential or inject malicious contents. Attacking The Mobile Telephony Service.

Smart poster URL spoofing Consequences NFC Worm injection Denial-of-Service Attacks: touch NFC-Tag => mobile crash

RF signal eavesdropping RF Signal eavesdropping: How close an attacker need to be, based on many things: RF characteristics of sender device, attacker antenna, attack receiver, attacker signal RF decoder, power send by NFC device, attacker location.  In general, sending device in active mode => 10m, when it in passive mode => 1 m.  Possible countermeasure: establish a secure channel.

Data corruption and insertion In data corruption transmit valid frequency of data spectrum at correct time. corruption power is bigger than sender power => detectable. In data insertion: only, inserted data transmitted before the original device starts with the answer data streams overlap => data corruption

Data insertion possible countermeasures Answering device answers with no delay. Answering device listen (monitor) channel during communication time. Secure channel between devices (Diffie-Hellmann).

Data Stealing Data of card integrated with passive NFC chip could be stolen using related application. E.g. credit card data. Attack need to be within card communication range. Countermeasures: using of special card case, cover it with aluminum and installation Antivirus on the mobile phone.

Conclusions NFC is not full secure. Recommendation: smart credit card should be replaced with old fashion one. Antivirus should be installed on NFC enabled devices. Smart poster distribution should be controlled. NFC security countermeasures have to be considered parallel to enabling NFC.

References E. Haselsteiner and K. Breitfuß. Security in near field communication. Workshop on RFID Security, C. Mulliner, "Vulnerability Analysis and Attacks on NFC- enabled Mobile Phones," in Proceedings of the International Conference on Availability, Reliability and Security (ARES '09), pp , 2009

Thank you for your attention