14
Presented by: Arpit Jain 113050028 Near Field Communication(NFC) Guided by: Prof. D.B. Phatak

Near Field Communication(NFC)

Embed Size (px)

DESCRIPTION

Near Field Communication(NFC). Presented by: Arpit Jain 113050028. Guided by: Prof. D.B. Phatak. Outline. Introduction (NFC) NFC Applications Attacks in NFC NDEF Attacks in NDEF References. Near Field Communication(NFC). - PowerPoint PPT Presentation

Citation preview

Page 1: Near Field Communication(NFC)

Presented by:

Arpit Jain113050028

Near Field Communication(NFC)

Guided by:Prof. D.B. Phatak

Page 2: Near Field Communication(NFC)

Introduction (NFC)NFC ApplicationsAttacks in NFCNDEFAttacks in NDEFReferences

Outline

Page 3: Near Field Communication(NFC)

Short Range Radio Technology for communication between devices either through touch or devices held closely.

Operates at radio frequency of 13.56Mhz.Communication range upto 10cm.Maximum Data transfer rate 424Kbps.Uses ISO 14443 standard(standard for

contactless card).

Near Field Communication(NFC)

Page 4: Near Field Communication(NFC)

Due to short range, transactions are more secure.

It’s all in a touch.Faster connection setup.Low power.Ability to communicate with existing

contactless system

Why NFC??

Page 5: Near Field Communication(NFC)

NFC in use

Bluetooth and Wifi Connections

P2P

e-Poster

Door Lock System

Payment

Page 6: Near Field Communication(NFC)

Read/Write- NFC-enabled phone can read/write data to any of the supported tag types in a standard NFC data format.

Peer-to-Peer- Two NFC-enabled devices can exchange data.

Card Emulation- NFC phone can act as a tag or contactless card for existing readers.

NFC operating Modes

Page 7: Near Field Communication(NFC)

Eavesdropping- RF signal for the wireless data transfer can be picked up with antennas.

Data modification- It is relatively easy to destroy data by using an RFID jammer. There is no way currently to prevent such an attack. However, if NFC devices check the RF field while they are sending, it is possible to detect attacks.

Relay attack- Attack based on relay of messages between sender and receiver.

Attacks in NFC

Page 8: Near Field Communication(NFC)

Binary Message encapsulation format to exchange information between NFC device and NFC device/NFC tag.

Can encapsulate payload of 1 or more application of arbitrary type and size into a single message.

Payload contents can be of type URL, MIME media, or an NFC-specific data type.

NFC data exchange format(NDEF)

Page 9: Near Field Communication(NFC)

NDEF message

Page 10: Near Field Communication(NFC)

NDEF Record

Page 11: Near Field Communication(NFC)

Phishing Attack- As phone displays title followed by URI, so attacker can modify title and redirect user to fake website.

Spoofing of NFC tags.

Attacks

Page 12: Near Field Communication(NFC)

First the hash of data packet is calculated.

Second that hash is encrypted with signer’s secret key.

Provides authentication and integrity.

Prevention using Digital signature

Page 13: Near Field Communication(NFC)

One NDEF message might be shared by more than one issuing party. Hence, signing the whole NDEF message with a single signature may not always be a desirable solution.

As tag memory is usually a very limited resource, so signing each record is also problematic.

Best approach would be to group the records and sign each group individually

Problems

Page 14: Near Field Communication(NFC)

[1] Roland, M.; Langer, J.; , "Digital Signature Records for the NFC Data Exchange Format," Near Field Communication (NFC), 2010 Second International Workshop on , vol., no., pp.71-76, 20-20 April 2010doi: 10.1109/NFC.2010.10

[2] http://www.nfc-forum.org/aboutnfc/nfc_and_contactless/.

References