Enforcing spatial constraints for mobile RBAC systems
Proceedings of the 15th ACM symposium on Access control models and technologies
An architecture based on internet of things to support mobility and security in medical environments
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Mobile electronic identity: securing payment on mobile phones
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
A modular test platform for evaluation of security protocols in NFC applications
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Location-based access control systems for mobile users: concepts and research directions
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Secured mobile transaction using NFC technology: top-up printing system
CIMMACS'11/ISP'11 Proceedings of the 10th WSEAS international conference on Computational Intelligence, Man-Machine Systems and Cybernetics, and proceedings of the 10th WSEAS international conference on Information Security and Privacy
A Survey on Near Field Communication (NFC) Technology
Wireless Personal Communications: An International Journal
NFC provided user friendliness for technologically advanced services
HCI International'13 Proceedings of the 15th international conference on Human Interface and the Management of Information: information and interaction for health, safety, mobility and complex environments - Volume Part II
Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Journal of Network and Computer Applications
Secure interaction with piggybacked key-exchange
Pervasive and Mobile Computing
A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms
Mobile Networks and Applications
Hi-index | 0.01 |
The aim of this paper is to show security measures for NFC (Near Field Communication) use cases and devices. We give a brief overview over NFC technology and evaluate the implementation of NFC in devices. Out of this technology review we derive different use cases and applications based on NFC technology. Based on the use cases we show assets and interfaces of an NFC device that could be a possible target of an attacker. In the following we apply different attacks against the operation modes to show how applications and devices could be protected against such attacks. The information collected is consolidated in a set of threats giving guidelines on how to improve security and overcome privacy issues. This allows integrating NFC technology in a secure way for the end consumer.