Security problems and countermeasures against attacks in NFC

DOI: 10.31673/2409-7292.2023.010005

Authors

  • Р. В. Хворостяний, (Khvorostyanyy R. V.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2023.010005

Abstract

Near Field Communication (NFC) technology is widely used due to its ease of use. However, NFC is vulnerable to security attacks such as man-in-the-middle; denial of service (DOS), etc. These attacks lead to the leakage of important user data, which can affect any organization that uses NFC applications and technologies. This article discusses NFC vulnerabilities and different types of NFC attacks. The article also discusses possible solutions that could protect NFC from these security threats.

Keywords: NFC, near-field communication, attack, security.

References
1. Mohamad Badra, Rouba Borghol Badra, A Lightweight Security Protocol for NFC-based Mobile Payments, Procedia Computer Science, Volume 83, 2016, Pages 705-711.
2. Mahinderjit Singh, Manmeet (Mandy) & Adzman, Ku & Hassan, Rohail. (2018). Near Field Communication (NFC) Technology Security Vulnerabilities and Countermeasures. International Journal of Engineering and Technology. 7. 298-305. 10.14419/ijetv7i4.31.23384.
3. Shreya Parikh, 2017, Security of NFC, International Journal of Engineering Research & Technology (IJERT) ICIATE – 2017 (Volume 5 – Issue 01),
4. Coskun V, Ozdenizci B, Ok K. The Survey on Near Field Communication. Sensors (Basel). 2015 Jun 5;15(6):13348-405. doi: 10.3390/s150613348. PMID: 26057043; PMCID: PMC4507650.
5. M A Masyuk 2019 Information security of RFID and NFC technologies. Journal of Physics: Conference Series, Volume 1399, Issue 3. 033093
6. Arwa Alrawais. Security Issues in Near Field Communications (NFC). (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 11, 2020. 621-628.
7. S. H. Omkar Ghag, “A comprehensive study of google wallet as an NFC application,” International Journal of Computer Applications, 2012.
8. V. Damme, Gauthier, K. Wouters, and B. Preneel, “Practical experiences with nfc security on mobile phones,” in Workshop on RFID Security, 2009.
9. E. Haselsteiner and K. Breitfuß, “Security in near field communication (nfc),” 2006.
10. “Openpcd http://www.openpcd.org/,” 2007.
11. Pierluigi Paganini. Near field communication (NFC) technology, vulnerabilities and principal attack schema. https://resources.infosecinstitute.com/topic/near-field-communication-nfc-technology-vulnerabilities-and-principal-attack-schema/
12. R. Vermaas, “The security risks of mobile payment applications using near-field communication,” 2013.
13. C. Mulliner, “Vulnerability analysis and attacks on nfc-enabled mobile phones,” in Availability, Reliability and Security, 2009.
14. M. Riyazuddin, “Nfc: A review of the technology, applications and security.” [Online]. Available: http://123seminarsonly.com/Seminar-Reports/023/46910687-Near-Field-Communications-Review.pdf.

Published

2023-01-30

Issue

Section

Articles