14
Presented by: Arpit Jain 113050028 Near Field Communication(NFC) Guided by: Prof. D.B. Phatak

Presented by: Arpit Jain 113050028 Guided by: Prof. D.B. Phatak

Embed Size (px)

Citation preview

Presented by:

Arpit Jain113050028

Near Field Communication(NFC)

Guided by:Prof. D.B. Phatak

Introduction (NFC)NFC ApplicationsAttacks in NFCNDEFAttacks in NDEFReferences

Outline

Short Range Radio Technology for communication between devices either through touch or devices held closely.

Operates at radio frequency of 13.56Mhz.Communication range upto 10cm.Maximum Data transfer rate 424Kbps.Uses ISO 14443 standard(standard for

contactless card).

Near Field Communication(NFC)

Due to short range, transactions are more secure.

It’s all in a touch.Faster connection setup.Low power.Ability to communicate with existing

contactless system

Why NFC??

NFC in use

Bluetooth and Wifi Connections

P2P

e-Poster

Door Lock System

Payment

Read/Write- NFC-enabled phone can read/write data to any of the supported tag types in a standard NFC data format.

Peer-to-Peer- Two NFC-enabled devices can exchange data.

Card Emulation- NFC phone can act as a tag or contactless card for existing readers.

NFC operating Modes

Eavesdropping- RF signal for the wireless data transfer can be picked up with antennas.

Data modification- It is relatively easy to destroy data by using an RFID jammer. There is no way currently to prevent such an attack. However, if NFC devices check the RF field while they are sending, it is possible to detect attacks.

Relay attack- Attack based on relay of messages between sender and receiver.

Attacks in NFC

Binary Message encapsulation format to exchange information between NFC device and NFC device/NFC tag.

Can encapsulate payload of 1 or more application of arbitrary type and size into a single message.

Payload contents can be of type URL, MIME media, or an NFC-specific data type.

NFC data exchange format(NDEF)

NDEF message

NDEF Record

Phishing Attack- As phone displays title followed by URI, so attacker can modify title and redirect user to fake website.

Spoofing of NFC tags.

Attacks

First the hash of data packet is calculated.

Second that hash is encrypted with signer’s secret key.

Provides authentication and integrity.

Prevention using Digital signature

One NDEF message might be shared by more than one issuing party. Hence, signing the whole NDEF message with a single signature may not always be a desirable solution.

As tag memory is usually a very limited resource, so signing each record is also problematic.

Best approach would be to group the records and sign each group individually

Problems

[1] Roland, M.; Langer, J.; , "Digital Signature Records for the NFC Data Exchange Format," Near Field Communication (NFC), 2010 Second International Workshop on , vol., no., pp.71-76, 20-20 April 2010doi: 10.1109/NFC.2010.10

[2] http://www.nfc-forum.org/aboutnfc/nfc_and_contactless/.

References