Japertas et al., 2020 - Google Patents
NFC Vulnerabilities InvestigationJapertas et al., 2020
View PDF- Document ID
- 15999330181081400801
- Author
- Japertas S
- Jankūnienė R
- Publication year
- Publication venue
- Distributed Computer and Communication Networks: Control, Computation, Communications: 23rd International Conference, DCCN 2020, Moscow, Russia, September 14-18, 2020, Revised Selected Papers 23
External Links
Snippet
Abstract The evolving Internet of Things is based on such short-range technologies as Bluetooth, RFID, etc. However, one of the biggest drawbacks of these technologies is their vulnerabilities. This paper addresses the vulnerabilities of NFC technology which belong to …
- 238000009114 investigational therapy 0 title description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ranasinghe et al. | Low-cost RFID systems: Confronting security and privacy | |
Chattha | NFC—Vulnerabilities and defense | |
Tu et al. | On addressing RFID/NFC-based relay attacks: An overview | |
Timalsina et al. | NFC and its application to mobile payment: Overview and comparison | |
Alizadeh et al. | A survey on attacks in RFID networks | |
Conti et al. | Context-based co-presence detection techniques: A survey | |
ALBATTAH et al. | NFC technology: assessment effective of security towards protecting NFC devices & services | |
Nie et al. | Security in the internet of things based on RFID: issues and current countermeasures | |
Alrawais | Security issues in near field communications (NFC) | |
US20150257006A1 (en) | Security mechanism for short range radio frequency communication | |
Thevenon et al. | Attacks on the HF physical layer of contactless and RFID systems | |
Japertas et al. | NFC Vulnerabilities Investigation | |
Guizani | Security applications challenges of RFID technology and possible countermeasures | |
Oh et al. | Countermeasure of NFC relay attack with jamming | |
Gavoni | RFID exploitation and countermeasures | |
RAHMAN et al. | Classification and analysis of security attacks in near field communication | |
Conti et al. | A survey on context-based co-presence detection techniques | |
Sethi et al. | Challenges of radio frequency identification technique | |
Al Islam et al. | Towards defending eavesdropping on NFC | |
Churaev et al. | NFC payment security | |
Singh et al. | Various Attacks and their Countermeasure on all Layers of RFID System | |
Ji et al. | Chord: Thwarting Relay Attacks Among Near Field Communications | |
Öhrlund | How Effective is RFID Shielding? | |
Khalil et al. | Security in Resource-Constrained IoT Devices | |
Tran | The Implications of RFID Security Flaws |