A Practical NFC Relay Attack on Mobile Devices Using Card Emulation Mode

被引:0
|
作者
Cavdar, D. [1 ]
Tomur, E. [2 ]
机构
[1] Middle East Tech Univ, Ankara, Turkey
[2] Izmir Inst Technol, Izmir, Turkey
关键词
NFC; Relay Attack; Mobile; Card Emulation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising communication technology which is also used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payments, access control etc. Because of the nature of these transactions, security is a critical issue that should be considered in system design and development phases. Although inherited from Radio Frequency Identification (RFID) technology, NFC security needs, requirements and solutions differ in terms of its usage areas and solutions. Based on these parameters, security precautions in communication layer of RFID technology do not prevent relay attacks occurred in the application layer NFC solutions. This study is conducted to prove relay attack practicability with using only mobile phones for relaying credentials instead of RFID based smart cards in an access control application. The Host Card Emulation (HCE) mode also eases relay attacks in NFC communication. The study explains the conceptual description of proposed relay attack, development and operating logic of mobile applications working based on card emulation mode and server software and also data communication basics between modules and web services descriptions.
引用
收藏
页码:1308 / 1312
页数:5
相关论文
共 23 条
  • [1] Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones
    Francis, Lishoy
    Hancke, Gerhard
    Mayes, Keith
    Markantonakis, Konstantinos
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 35 - 49
  • [2] The Secure transaction protocol in NFC card emulation mode
    Chi, Yi-Lun
    Lin, Iuon-Chang
    Chen, Cheng-Hao
    Hwang, Min-Shiang
    International Journal of Network Security, 2015, 17 (04) : 431 - 438
  • [3] Implementation and Analysis of a Practical NFC Relay Attack Example
    Wang, Zhao
    Xu, Zhigang
    Xin, Wei
    Chen, Zhong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 143 - 146
  • [4] A User-friendly Authentication Solution using NFC Card Emulation on Android
    Lee, Haw
    Hong, Wei-Chih
    Kao, Chia-Hung
    Cheng, Chen-Mou
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2014, : 271 - 278
  • [5] Implementation of Host Card Emulation Mode Over Android Smartphone as Alternative ISO 14443A for Arduino NFC Shield
    Basyari, Rochman Saefulloh
    Nasution, Surya Michrandi
    Dirgantara, Burhanuddin
    2015 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), 2015, : 160 - 165
  • [6] Class Attendance Management System Using NFC Mobile Devices
    Mohandes, Mohamed A.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2017, 23 (02): : 251 - 259
  • [7] Proposal of micropayment and credit card model using NFC technology in mobile environments
    Cha, B. R. (brcha@nm.gist.ac.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (08):
  • [8] Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study
    Markantonakis, Konstantinos
    Meister, Julia A.
    Gurulian, Iakovos
    Shepherd, Carlton
    Naeem Akram, Raja
    Abu Ghazalah, Sarah Hani
    Kasi, Mumraiz
    Sauveron, Damien
    Hancke, Gerhard
    IEEE ACCESS, 2024, 12 : 150372 - 150386
  • [9] Fraud on Host Card Emulation Architecture Is it possible to fraud a payment transaction realized by a mobile phone using an "Host Card Emulation" system of security ? Invited Paper
    Pasquet, Marc
    Gerbaix, Sylvie
    PROCEEDINGS OF THE 2016 SECOND CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2016,
  • [10] A Practical Attack on Mobile Data Network Using IP Spoofing
    Kang, Dong W.
    Oh, Joo H.
    Im, Chae T.
    Yi, Wan S.
    Won, Yoo J.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (06): : 2345 - 2353