Strengths and Weaknesses of Near Field Communication (NFC) Technology
Keywords:
Near Field Communication, threats, key agreement
Abstract
This paper gives a comprehensive analysis of security with respect to NFC. We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. The paper introduced an NFC specific key agreement mechanism, which provides cheap and fast secure key agreement. Key agreement techniques without authentication can be used to provide a standard secure channel. This resistance against Man-in-the-Middle attacks makes NFC an ideal method for secure pairing of devices. The paper lists some of threats, which are applicable to NFC, and describes solutions to protect against these threats.
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2011-01-15
Issue
Section
License
Copyright (c) 2011 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.