Presented by: Arpit Jain 113050028 Guided by: Prof. D.B. Phatak.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Rue du Rhône 114- CH-1204 Geneva - T: F: Near field communication (NFC) Ecma/TC32-TG19/2005/013.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.
NFC Devices: Security and Privacy
NEAR-FIELD COMMUNICATION MAKING LIFE EASY Presenter: Grace Chen NFC Technology.
NFC Technology and Applications Assaf Sella CTO Texas Instruments Israel Feb
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
5Ws on NFC Andrea Vitaletti. Overview What Where Why When Who 5Ws.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Cosc 4/5730 Android and Blackberry Near Field Communications (NFC)
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
Near Field Communication
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Near Field Communication Romeo Fayloga Van Logan David Ramirez.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Networks Evolving? Justin Champion C208 Ext:3723
Networks Olga Agnew Bryant Likes Daewon Seo.
One Phone to Rule Them All A Case Study Sarah-Jane Saravani Learning Hub Manager Waikato Institute of Technology, New Zealand
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
NFC.  Near Filed Communication  Is a short range high frequency wireless communication technology  Low speed (106 to 424 kbps)  Low friction setup.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Cosc 4/5730 Android and Blackberry Near Field Communications (NFC)
Presented By: Arpit Jain Guided By: Prof. D.B. Phatak.
NFC - Near Field Communication Technology
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Near Field Communication: Experiments with Android Michael Humphries.
Proximity-Based Authentication of Mobile Devices Eyal de Lara Department of Computer Science University of Toronto Alex Varshavsky, Adin Scannel, Anthony.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
RFID Payment Terminal Presented by: Rohit Kale. Introduction RFID: an automatic identification method, relying on storing and remotely retrieving data.
Cryptography, Authentication and Digital Signatures
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
Near Field Communication Systems Patras, July 2006.
Week #6: Discussion results NFC technology and its components Group #33 Group member: Tianhao Han Ximeng Sun(Susie) Xing Cao(Star) Zhuoran Yang.
Ignite Presentation: Near Field Communication Harry Yang.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Network Security David Lazăr.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Team 13 Prathibha and Shrimi 11/12/13 Mobile Credit Card Processing.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Security in Near Field Communication Strengths and Weaknesses
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
A Design of Electronic Payment Authentication Method based on NFC Smartphone Seolhwa Han, Okkyung Choi*, Kangseok Kim, Hongjin Yeh, Taesik Shon Dept. of.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
English for Advance Learners I
Operating Mode 1 – Peer-Peer
SHORT DISTANCE WIRELESS COMMUNICATION
Salman Asif Intern at Working on 16 June 2013.
Apple Pay Research on NFC and the security threat
Columbia University, New York City, USA
Near Field Communication -סמינר בתקשורת ומערכות מבוזרות-
N-Guard: a Solution to Secure Access to NFC tags
Near field communication (NFC)
Presentation transcript:

Presented by: Arpit Jain Guided by: Prof. D.B. Phatak

Introduction (NFC) NFC Applications Attacks in NFC NDEF Attacks in NDEF References

Short Range Radio Technology for communication between devices either through touch or devices held closely. Operates at radio frequency of 13.56Mhz. Communication range upto 10cm. Maximum Data transfer rate 424Kbps. Uses ISO standard(standard for contactless card).

Due to short range, transactions are more secure. It’s all in a touch. Faster connection setup. Low power. Ability to communicate with existing contactless system

Bluetooth and Wifi Connections P2P e-Poster Door Lock System Payment

Read/Write- NFC-enabled phone can read/write data to any of the supported tag types in a standard NFC data format. Peer-to-Peer- Two NFC-enabled devices can exchange data. Card Emulation- NFC phone can act as a tag or contactless card for existing readers.

Eavesdropping- RF signal for the wireless data transfer can be picked up with antennas. Data modification- It is relatively easy to destroy data by using an RFID jammer. There is no way currently to prevent such an attack. However, if NFC devices check the RF field while they are sending, it is possible to detect attacks. Relay attack- Attack based on relay of messages between sender and receiver.

Binary Message encapsulation format to exchange information between NFC device and NFC device/NFC tag. Can encapsulate payload of 1 or more application of arbitrary type and size into a single message. Payload contents can be of type URL, MIME media, or an NFC-specific data type.

Phishing Attack- As phone displays title followed by URI, so attacker can modify title and redirect user to fake website. Spoofing of NFC tags.

First the hash of data packet is calculated. Second that hash is encrypted with signer’s secret key. Provides authentication and integrity.

One NDEF message might be shared by more than one issuing party. Hence, signing the whole NDEF message with a single signature may not always be a desirable solution. As tag memory is usually a very limited resource, so signing each record is also problematic. Best approach would be to group the records and sign each group individually

[1] Roland, M.; Langer, J.;, "Digital Signature Records for the NFC Data Exchange Format," Near Field Communication (NFC), 2010 Second International Workshop on, vol., no., pp.71-76, April 2010 doi: /NFC [2] forum.org/aboutnfc/nfc_and_contactless/.