Evaluating Near-Field Communication tag security for identity theft prevention

被引:8
作者
Saeed, Dawer [1 ]
Iqbal, Razi [2 ]
Sherazi, Hafiz Husnain Raza [3 ]
Khan, Usman Ghani [1 ]
机构
[1] Univ Engn & Technol, Al Khawarizmi Inst Comp Sci, Lahore, Pakistan
[2] Amer Univ Emirates, Coll Comp Informat Technol, Dubai Int Acad City, U Arab Emirates
[3] Politecn Bari, Dept Elect & Informat Engn, I-70125 Bari, Italy
关键词
Near-Field Communication; radio frequency identification; tag security; NFC data exchange format; identity theft prevention;
D O I
10.1002/itl2.123
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Near-Field Communication (NFC) applications are growing at a rapid pace due to their user-friendly nature and cost effectiveness. The growth of NFC applications has caught the attention of attackers who can target NFC entities (eg, tags and readers) to gain access to any stored information. NFC is a nascent technology that offers ease of use and secure communication. However, this technology can act as a doorway for major hacks, such as skimming and other identity theft problems. This article presents a technique that can still read the erased data from an NFC tag even if the tag has been erased employing conventional techniques. Furthermore, a set of recommendations is provided for the proper erasure of NFC tags to avoid leaving any traces of the erased data.
引用
收藏
页数:6
相关论文
共 14 条
[1]  
[Anonymous], T EMERGING TELECOMMU
[2]  
[Anonymous], 2014, FRONTIERS ARCHITECTU FRONTIERS ARCHITECTU, V3, P1
[3]  
[Anonymous], 2019, MIFARE
[4]  
[Anonymous], 2019, NFC TAGWRITER NXP
[5]  
Asaduzzaman A, 2017, PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), P33, DOI 10.1109/NSysS.2017.7885798
[6]   Swing-Pay: One Card Meets All User Payment and Identity Needs A digital card module that uses NFC and biometric authentication for peer-to-peer payment and identity [J].
Ghosh, Shirsha ;
Goswami, Joyeeta ;
Majumder, Alak ;
Kumar, Abhishek ;
Mohanty, Saraju P. ;
Bhattacharyya, Bidyut K. .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (01) :82-93
[7]  
Hameed S, 2016, IEEE IFIP NETW OPER, P577, DOI 10.1109/NOMS.2016.7502861
[8]  
Hongthai T, 2017, 2017 14TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), P889, DOI 10.1109/ECTICon.2017.8096381
[9]   An Encryption Approach to Secure Modification and Deletion for Flash-based Storage [J].
Jin, Rize ;
Cho, Hyung-Ju ;
Chung, Tae-Sun .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (04) :662-667
[10]   Pay-Cloak: A Biometric Back Cover for Smartphones [J].
Majumder, Alak ;
Goswami, Joyeeta ;
Ghosh, Shirsha ;
Shrivastawa, Rishu ;
Mohanty, Saraju P. ;
Bhattacharyya, Bidyut K. .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2017, 6 (02) :78-88