Security Analysis of NFC Relay Attacks using Probabilistic Model Checking

被引:0
作者
Alexiou, Nikolaos [1 ]
Basagiannis, Stylianos [2 ]
Petridou, Sophia [3 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, Stockholm, Sweden
[2] United Technol Res Ctr, Cork, Ireland
[3] Univ Macedonia, Dept Appl Informat, Thessaloniki, Greece
来源
2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2014年
关键词
Near Field Communication; probabilistic model checking; relay attack; security analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Near Field Communication (NFC) is a short-ranged wireless communication technology envisioned to support a large gamut of smart-device applications, such as payment and ticketing applications. Two NFC-enabled devices need to be in close proximity, typically less than 10 cm apart, in order to communicate. However, adversaries can use a secret and fast communication channel to relay data between two distant victim NFC-enabled devices and thus, force NFC link between them. Relay attacks may have tremendous consequences for security as they can bypass the NFC requirement for short range communications and even worse, they are cheap and easy to launch. Therefore, it is important to evaluate security of NFC applications and countermeasures to support the emergence of this new technology. In this work we present a probabilistic model checking approach to verify resiliency of NFC protocol against relay attacks based on protocol, channel and application specific parameters that affect the successfulness of the attack. We perform our formal analysis within the probabilistic model checking environment PRISM to support automated security analysis of NFC applications. Finally, we demonstrate how the attack can be thwarted and we discuss the successfulness of potential countermeasures.
引用
收藏
页码:524 / 529
页数:6
相关论文
共 17 条
  • [1] [Anonymous], 2007, 14443 ISOIEC FCD
  • [2] [Anonymous], 2013, ISIS MOBILE WALL OCT
  • [3] [Anonymous], 2013, 180922013 ISOIEC
  • [4] Synthesis of attack actions using model checking for the verification of security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 147 - 161
  • [5] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [6] Drimer S., 2007, P 16 USENIX SEC S US, P7
  • [7] ECMA, 2013, ECMA340
  • [8] Google Wallet, 2013, GOOGLE WALLET OCT
  • [9] Hancke GP, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P194
  • [10] An RFID distance bounding protocol
    Hancke, GP
    Kuhn, MG
    [J]. FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 67 - 73