Presentation is loading. Please wait.

Presentation is loading. Please wait.

Columbia University, New York City, USA

Similar presentations


Presentation on theme: "Columbia University, New York City, USA"— Presentation transcript:

1 Columbia University, New York City, USA
IEEE UEMCON 2016 Columbia University, New York City, USA “An Auspicious Secure Processing Technique for Near Field Communication Systems” 20 – 22 October 2016

2 IEEE UEMCON 2016 “An Auspicious Secure Processing Technique for
Columbia University, New York City, USA “An Auspicious Secure Processing Technique for Near Field Communication Systems” Author, Presenter: Dr. Abu Asaduzzaman, Associate Professor Director of CAPPLab and Advisor of the IEEE Student Branch at Wichita State Department of Electrical Engineering and Computer Science (EECS) Wichita State University (WSU), USA 20 – 22 October 2016

3 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Outline Introduction to NFC Technology Short-range wireless communication, many applications Suffers due to different types of network attacks Background and Motivation Easy/efficient to use, convenient, growing; Secure Element (SE) is unable to provide security for all NFC applications Proposed Secure Processing Technique Novel secure protocol along with the NFC chip Modified NFC Data Exchange Format (NDEF) and alert mechanism Experimental Results, Conclusions Q/A, Discussion Contact Information QUESTIONS? Any time, please!

4 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Authors Abu Asaduzzaman, Associate Professor EECS Department, Wichita State University, USA Shanta Mazumder, MS Student Sergio Selinas, Assistant Professor

5 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Introduction About 20 to 30 billion devices on internet of things (IoT) by 2020 [1, 2]. About 1.9 billion NFC-enabled phones by 2018 [3]. Users do not need any knowledge about the underlying technology of NFC as the communication starts automatically by simply bringing two devices closer (within 5-10 cm) [4, 5]. Important components in NFC include SIM Card/SE, NFC chip, and device memory.

6 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Introduction (+) Two devices involved in the wireless- based NFC communication are called initiator and target. Initiator: starts the communication Target: responses to the initiator’s req. In NFC, there are two communication modes: active and passive [6]. Active: both - own power supply, amplitude shift keying Passive: initiator generates RF field; target uses the electromagnetic field, load modulation technique

7 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Introduction (+) NFC communication is processed in three different operation modes: peer-to-peer, card emulation, and read/write [7, 8] Peer-to-peer: supports a bidirectional connection between two different NFC- enabled Smartphones to transmit data. Card emulation: NFC reader is the active device and Smartphone behaves as a smart card. Read/write: A Smartphone can read information from a NFC tag and write information into the tag.

8 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Introduction (+) Data is transferred between two NFC- enabled devices using the NDEF message format. An NDEF message contains one or more NDEF (Data) Records and one Signature Record. Each record of NDEF message consists of Header and Payload. The Header consists of following fields: Identifier, Length, and Type. The Payload contains data.

9 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Problem Description Typical NDEF message is not adequate for checking security and cannot discard erroneous message. Scope of the typical alert mechanism used in NFC systems is very limited. Contributions Improved NDEF message with Certificate record; Secure Protocol along with the NFC chip; and customized alert mechanism to … Discard erroneous messages and protect the device and/or related data/information

10 Proposed Secure Protocol
“An Auspicious Secure Processing Technique for Near Field Communication Systems” Proposed Secure Protocol We propose a secure data/information processing unit and an algorithm to enhance the security of the NFC systems. The processing stack of the secure protocol is based on handshaking scheme, certificate verification, signature verification, and alert mechanism.

11 New Certificate Record to the NDEF Message
“An Auspicious Secure Processing Technique for Near Field Communication Systems” New Certificate Record to the NDEF Message We modify a typical NDEF message by introducing a certificate to only the first record of the NDEF message to enhance security. A signature record is generated using a private key via signing the message with digital signature algorithm. The certificate of a tag is appended to the NDEF message. (RSA for private and public key)

12 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Working Principle The handshaking scheme initiates the process by asking for a certificate. Then the certificate and signature are verified. If the certificate and the signature match, data is stored for further processing. If there is any error at any point in the processing stack, data is discarded from the system and alert messages are generated/sent.

13 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Experimental Results Table summarizes transfer times and power consumption when different sized JPEG (still picture) and MP4 (audio-video) files are transferred from the Google Tablet to the Samsung Smartphone using NFC and Bluetooth technologies. Experimental results suggest that NFC technology helps save transfer time (especially for small files) and save significant amount of power for both small and large files.

14 Experimental Results (+)
“An Auspicious Secure Processing Technique for Near Field Communication Systems” Experimental Results (+) Figure shows the processing time due to various certificate sizes ( bytes) for record size 136 bytes. Here, signature size 64, 128, and 256 bytes are considered. Time saving due to {78-Byte certificate and 64-Byte signature} instead of {1038-Byte certificate and 256-Byte signature} is up to 25%.

15 Experimental Results (+)
“An Auspicious Secure Processing Technique for Near Field Communication Systems” Experimental Results (+) As illustrated in the figure, the processing time remains almost the same for various record size. This is because, only the first SR (short record) is converted into 160-byte hash value. For 64-Byte signature size, a 4608-Byte record needs only 51 msec more than that due to a 36-Byte record.

16 Experimental Results (+)
“An Auspicious Secure Processing Technique for Near Field Communication Systems” Experimental Results (+) We study the security aspect of the typical secure element and the proposed secure protocol for NFC. Modified Certificate: Typical NDEF message does not have a Certificate record; the improved NDEF message does. Modified Data: In a typical NFC system, data directly come to the device memory, then the signature of the data is verified. Jamming Attack: If there are two tags in a poster (one tag is malicious), a typical NFC device cannot detect the malicious tag.

17 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Conclusions In this work, a data processing unit for NFC systems is proposed to provide extra security. Before storing data in the device memory, the proposed secure protocol checks the signature of the sender and newly introduced certificate of the NDEF message. If both (signature and certificate) are not verified, an alert message is generated and data is discarded. According to the experimental results, the NFC technology helps save transfer time up to 24% and power up to 62% when compared those with Bluetooth technology.

18 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
Conclusions (+) MATLAB simulation results show that the processing time increases linearly with the increase of the certificate size making the system scalable. Simulation results also show that the processing time remains almost the same for various record sizes. Although the proposed system may require little extra time due to the addition of the secure protocol, it offers better security on various networking attacks. The proposed secure processing technique for NFC systems can be extended to heighten the security of IoT applications and NFC devices.

19 “An Auspicious Secure Processing Technique for Near Field Communication Systems”
References [1] K. Ok, V. Coskun, M.N. Aydin, and B. Ozdenizci, “Current benefits and future directions of NFC services,” IEEE Int’l Conf. on Education and Management Tech. (ICEMT), pp , Nov [2] K. Ok, M.N. Aydin, V. Coskun, and B. Ozdenizci, “Exploring underlying values of NFC applications,” International Conference on Information and Financial Engineering IPEDR, Vol. 12, 2011. [3] R. Boden, “IDATE forecasts NFC phones and payments volumes,” NFC World, [4] B. Ozdenizci, M. Alsadi, K. Ok, and V. Coskun, “Classification of NFC Applications in Diverse Service Domains,” Int’l J. of Computer and Communication Engineering, Vol. 2, No. 5, pp , 2013. [5] N.A. Chattha, “NFC—Vulnerabilities and defense,” IEEE Conference on Information Assurance and Cyber Security (CIACS), pp , June 2014. [6] M. Riyazuddin, “NFC: A review of the technology, applications and security,” ABI Research, 2011. [7] P.S. Halgaonkar, S. Jain, and V.M. Wadhai, “NFC: A review of technology, tags, applications and security,” IJRCCT, Vol. 2, No. 10, pp , 2013. [8] S. Burkard, “MS Thesis – Near field communication in smartphones,” Computer Engineering Dept. of Telecommunication Systems, Berlin Institute of Technology, Germany, 2012.

20 Thank You! IEEE UEMCON 2016 at Columbia University, New York
“An Auspicious Secure Processing Technique for Near Field Communication Systems” QUESTIONS? Contact: Abu Asaduzzaman Phone: CAPPLab: Thank You!


Download ppt "Columbia University, New York City, USA"

Similar presentations


Ads by Google