Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

Public Key Cryptography Nick Feamster CS 6262 Spring 2009.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
NFC Devices: Security and Privacy
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
5Ws on NFC Andrea Vitaletti. Overview What Where Why When Who 5Ws.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Secure Group Communications in Wireless Sensor Networks December 8, 2003 CS 526 Advance Internet and Web Systems Patrick D. Cook.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Authentication in Ubiquitous Computing Laurent BUSSARD and Yves ROUDIER Institut Eurecom Workshop on Security in Ubiquitous Computing UBICOMP 2002, Goteborg.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Public Key Model 8. Cryptography part 2.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Programming Satan’s Computer
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
NFC - Near Field Communication Technology
NEAR FIELD COMMUNICATION. WHAT IS NFC??? NFC or Near Field Communication is a short range high frequency wireless communication technology. A radio communication.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
Computer Architecture Lecture 30 Fasih ur Rehman.
COEN 351 E-Commerce Security Essentials of Cryptography.
ECE Lecture 1 Security Services.
Ignite Presentation: Near Field Communication Harry Yang.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Public Key Encryption.
Csci5233 computer security & integrity 1 Cryptography: an overview.
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
NEAR FIELD COMMUNICATIONS: IS IT WORTH IT? David Wynne.
REDACTION BASED ATM MONITORING SYSTEM USING MSP 430
Security in Near Field Communication Strengths and Weaknesses
Near Field Communications
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
COEN 351 E-Commerce Security
Security in Wireless Sensor Networks by Toni Farley.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Building a contactless university examination system using NFC Speaker : Chih-Ching Chen Advisor : Dr. Ho-Ting Wu 2013/12/2 1.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Network Security and Cryptography
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Apple Pay Research on NFC and the security threat
NFC AND WIRELESS COMMUNICATION STANDARDS
Mobile Payment Protocol 3D by Using Cloud Messaging
Columbia University, New York City, USA
N-Guard: a Solution to Secure Access to NFC tags
Protect Your Hardware from Hacking and Theft
Near field communication (NFC)
Presentation transcript:

Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan

Outline How NFC works ◦ Device Examples Threats Security ◦ Cryptography ◦ NFC Specific Key Agreement Hardware implementation Conclusion References

How NFC Works NFC devices use conductors to generate magnetic fields These fields can then be used to transport data NFC differs from many radio based technologies by having a very short range NFC devices can be either active or passive Active Devices have their own power sources Passive devices have no power source and rely on “leaching” power from active devices interacting with them

Active and Passive Device Examples An example of a common active device would be a NFC enabled cell phone Examples of passive devices would smart posters, and Samsung TecTiles

Threats Eavesdropping ◦ Short range of NFC typically prevents this attack Data Corruption ◦ Devices detect can detect and prevent data corruption Man-in-the-middle Attack ◦ This attack is difficult as the attacker has to block the originators RF field and create a new RF field for the recipient Theft ◦ Biometric sensors in new smart phones, and password protection

Security - Cryptography Authentication ◦ Verifying the correct user of the device Cryptography ◦ Symmetric ◦ Asymmetric Secure Channel ◦ Best approach for securing NFC technology

Security - NFC Specific Key Agreement Does not use asymmetric cryptography Based on Amplitude Shift Keying (ASK) Synchronizes both devices based on timing of random bits and also on the amplitude of the RF signal While sending data, device listens to RF field When devices send different bits, attacker can’t differentiate between sender and receiver Clusters the transfer of data with random bits and erroneous data

Hardware Implementation Majority of businesses would have to implement NFC reading hardware Credit Card companies would have to be on board with the hardware implementation Hardware would be costly ◦ With hardware being costly, why would you implement this new technology over one that currently works and is paid for

Conclusion There are multiple threats facing NFC in its current form There are some proposed solutions to eliminate these threats ◦ Secure Channel ◦ NFC Specific Key Agreement Widespread adoption could be costly and hinder NFC growth

References Ok, K., Coskun, V., Aydin, M., & Ozdenizci, B. (2010, November). Current benefits and Future Directions of NFC Services International Conference on Education and Management Technology, Cairo, Egypt, 1-5. Rieback, M., Crispo, B. & Tanenbaum, A. (2006, January). The Evolution of RFID Security. Pervasive Computing, Ok, K., Coskun, V., & Ozdenizci, B. (2012). Near Field Communication From Theory to Practice. (pp ). West Sussex, United Kingdom: John Wiley and Sons. W. Diffie, “The First Ten Years of Public-Key Cryptography,” Proc. IEEE, vol. 76, no. 5, 1988, pp

Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan