Formal security analysis of near field communication using model checking

被引:15
作者
Alexiou, Nikolaos [1 ]
Basagiannis, Stylianos [2 ]
Petridou, Sophia [3 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, Stockholm, Sweden
[2] United Technol Res Ctr, Cork, Ireland
[3] Univ Macedonia, Dept Appl Informat, Thessaloniki, Greece
关键词
Near field communication; Probabilistic model checking; Relay attack; Security analysis; Wireless communication;
D O I
10.1016/j.cose.2016.03.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Near field communication (NFC) is a short-range wireless communication technology envisioned to support a large gamut of smart-device applications, such as payment and ticketing. Although two NFC devices need to be in close proximity to communicate (up to 10 cm), adversaries can use a fast and transparent communication channel to relay data and, thus, force an NFC link between two distant victims. Since relay attacks can bypass the NFC requirement for short-range communication cheaply and easily, it is important to evaluate the security of NFC applications. In this work, we present a general framework that exploits formal analysis and especially model checking as a means of verifying the resiliency of NFC protocol against relay attacks. Toward this goal, we built a continuous-time Markov chain (CTMC) model using the PRISM model checker. Firstly, we took into account NFC protocol parameters and, then, we enhanced our model with networking parameters, which include both mobile environment and security-aware characteristics. Combining NFC specifications with an adversary's characteristics, we produced the relay attack model, which is used for extracting our security analysis results. Through these results, we can explain how a relay attack could be prevented and discuss potential counter measures. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 42 条
  • [1] Alexiou N, 2014, P 10 INT WIR COMM MO
  • [2] Alliance SC, 2011, MOB PAYM NFC LANDSC
  • [3] Anonymous proximity mobile payment (APMP)
    Almuairfi, Sadiq
    Veeraraghavan, Prakash
    Chilamkurti, Naveen
    Park, Doo-Soon
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 620 - 627
  • [4] [Anonymous], U CAMBRIDGE COMPUTER
  • [5] [Anonymous], 2007, IF14443
  • [6] [Anonymous], 2013, ECMA340
  • [7] [Anonymous], 2013, TELECOMMUNICATIONS I
  • [8] Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach
    Basagiannis, S.
    Petridou, S.
    Alexiou, N.
    Papadimitriou, G.
    Katsaros, P.
    [J]. COMPUTERS & SECURITY, 2011, 30 (04) : 257 - 272
  • [9] Basagiannis S., 2008, 32 ANN IEEE INT COMP, P12
  • [10] Synthesis of attack actions using model checking for the verification of security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 147 - 161