Attacks on NFC enabled phones and their countermeasures

Size: px
Start display at page:

Download "Attacks on NFC enabled phones and their countermeasures"

Transcription

1 Attacks on NFC enabled phones and their countermeasures Arpit Jain: September 3, 2012 Philosophy This survey explains NFC, its utility in real world, various attacks possible in NFC enabled phones and the countermeasures available to circumvent such attacks. Summary NFC is standard wireless communication technology for smart phones, which are in close proximity not more than few centimetres. NFC operates at a frequency of 13.56MHz and offers data transmission rate of upto 424Kbps. NFC uses NDEF format for data exchange and works in 3 modes namely a).card emulation, b).reader/writer c).peer-to-peer NFC has found applications in contactless payment system, e-posters, Door-locking system and bluetooth and WiFi connection which makes it vulnerable to many attacks. Prominent among them are Relay attack, skimming and cloning attacks which may badly affects transactions and can make NFC enabled devices as a platform for attackers. As the cost, time, hardware and technical skills needed to perform these attacks on NFC enabled devices are less as compared to other custom built devices, and also API s needed are publicily available, so NFC devices becomes more vulnerable to these attacks. Nevertheless, countermeasures for these attacks are available which helps in ammending the utility of NFC devices in various applications. Commonly available solutions for mitigating these attacks includes Distance bounding protocol, location based security metrics, timing based protocols, securing NFC secure element activity, cryptographically linking the application to a unique identifier etc. 1 Related Work 1.1 NFC and NDEF NFC NFC(near field communication) is a short range radio technology that enables communication between devices either through touch or devices held closely. NFC uses ISO standard(standard for contactless card)[7] and is compatible with existing contactless card infrastructure and enables a consumer to utilize one device across different systems. NFC operates in a frequency range centered on MHz and offers a data transmission rate of up to 424 kbit/s within a distance of approximately 10 centimeters. In contrast to the conventional contactless technology[1] in this frequency range (only active-passive communications), communications between NFC-capable devices can be active-active (peer-to-peer) as well as active-passive NFC Operating modes NFC devices can operate in 3 modes: 1. Read/Write- In this mode, the NFC-enabled phone can read or write data to any of the supported tag types in a standard NFC data format. 1

2 2. Peer-to-Peer- In this mode, two NFC-enabled devices can exchange data. For example, you can share Bluetooth or Wi-Fi link setup parameters to initiate a Bluetooth or Wi-Fi link. You can also exchange data such as virtual business cards or digital photos. Peer-to-peer mode is standardised on the ISO/IEC standard. Note: The Symbian implementation for NFC currently supports initiation of a Bluetooth link, while Wi-Fi is not supported yet. Also, the Java implementation for NFC does not support this mode of operation. 3. Card Emulation- An NFC-enabled phone acts as a reader when in contact with tags. In this mode, the phone can act as a tag or contactless card for existing readers. Note: The Symbian and Java implementations for NFC do not currently support this mode of operation Uses of NFC Many possible NFC applications are being considered. The special advantage of NFC is its straightforward mode of use, simply touch or place a device close to something to initiate the desired service. Some typical uses are: 1. Authentication, access control - store electronic keys, legitimations on NFC phones (a) Secure building access (b) Secure PC log-in (c) Unlock car doors (d) Setup your home office with a touch by your NFC phone 2. Data transfer between different NFC-units (peer-to-peer data exchange) like NFC- smart phones, digital cameras, notebooks, etc. (a) Exchange electronic business cards (b) Print out photos by holding the camera close to printer 3. Unlock another service (such as opening another communication link for data transfer) (a) Setting up Bluetooth, WLAN links 4. Access to digital information (a) Read schedules from smart poster to NFC phone (b) Download maps from smart poster to NFC phone (c) Record location such as a parking in NFC phone 5. Mobile payment (a) Pay with NFC phones for tickets or taxi rides (b) Pay with NFC phones at contactless POS (point of sales) (c) Store vouchers on NFC phones 6. Ticketing (a) Store theater / attraction / event tickets on NFC phone 2

3 Figure 1: NDEF message and records NFC Forum standards 1. NDEF: NDEF specification defines a message encapsulation format to exchange information between NFC device and NFC device/nfc tag. Its a light weight binary message that can be used to encapsulate payload of 1 or more application of arbitrary type and size into a single message. An NDEF message consist of 1 or many NDEF records. The payload contents can be of type URL, MIME media, or an NFC-specific data type. For NFC-specific data types, the payload contents must be defined in an NFC Record Type Definition (RTD) file. When we communicate with our NFC reader devices (mobile phones) to read or write data to NFC tag we read basically the hexa code. 2. RTD(Record Type Definition)- NFC forum specified several record formats which can be carried out in NDEF records. Each NFC Forum record type is specified in a Record Type Definition (RTD) document. NFC defines the following RTDs: (a) NFC Text RTD (b) NFC URI RTD (c) NFC Smart Poster RTD (d) NFC Generic Control RTD (e) NFC Signature RTD The simplest is a Text record type, which can carry a Unicode string. A text record can be included in an NDEF message as a descriptive text for another record. The URI record type can be used to store a URI such as a web address, an , or a phone number in an optimised binary form. The Smart Poster RTD defines how to put URLs, SMSs, or phone numbers on an NFC Forum tag. 3. LLCP- To enhance the peer-to-peer mode of operation, the NFC Forum has specified the link-level protocol known as the Logical Link Control Protocol (LLCP). In the NFC peer-to-peer protocol stack, LLCP provides additional communication capabilities on top of the NFCIP-1/ ISO LLCP introduces a two-way, link-level connection, allowing both peers to send and receive data using the following methods of data exchange: Connection-oriented transfer, where data exchanges are acknowledged; Connectionless transfer, where data exchanges are unacknowledged. 1.2 Relay Attacks on NFC NFC technology now a days has proven its utility in m-payment, ticketing and access control. But the ability of NFC-enabled phones to act as a token and a reader makes it an ideal platform for implementing software relay attack. In relay attack[4], attacker only needs to relay the challenge and reponse to the legitimate token and reader respectively, without minimal knowledge of the data to be relayed and security protocols used. For this the attacker and his/her accomplice uses proxy-devices that communicate over 3

4 Figure 2: Practical relay setup using only NFC mobile phones a proxy channel, and thus requires a high-speed and reliable communication link between the two NFC mobile phones implementing the proxy-reader and proxy-token. Figure3 shows pratical implemention of relay attack where, a person who does not know the rules of chess could play against two grand masters by challenging both of them to a postal game. The player would then simply forward the move received from one grand master to the other, effectively making them play against one another. Each grand master would think that they are playing said person, but in reality they are playing against each other. Relay attack[6] is able to bypass application layer security protocol even if it is based on strong cryptographic principles by simply relaying a challenge to a legitimate token, which will provide him with the correct response, which can then be relayed back to the verifier. 1.3 Skimming and cloning attack on NFC NFC enabled phone with a secure element embedded can be used as a platform for skimming and cloning attacks[5]. For developing clone, some midlet needs to be executed for unlocking of SE and once it gets unlocked, an applet will be loaded and installed on SE using loader, GP shell. Our applet should be designed in a way to recieve the standard communication messages exchanged in the system and respond with the messages which convinced the reader that it is communicating with the legitimate reader. In a same way MIDLET(for skimming) can be developed using nokia SDK and designed to establish an ISO based connection with external smart cards and exchange APDUs(Application protocol data units) with them. The midlet sends the command APDUs required to extract detailed information of the card, which arrived in the form of response APDUs. The API used JSR257 doesnt require any code signing certificate, so any hacker having knowledge of command protocols of a legitimate application could create his own application software to extract details of legitimate contactless card. Figure2 shows illustrates the static messages used to authenticate contactless card. Orientation and problems identified 1. NFC enabled phones has an legitimate acceptable factor which makes them less suspicious in public, unlike custom built hardware used for skimming and cloning attacks. 2. No dedicated hardware is needed for the relay attack to perform, it is possible using unmodified NFC-enabled mobile phones, and requires an attacker to write suitable mobile platform applications using publicly available APIs. 3. Some security vulnerability[8] are also available in NDEF, standard which NFC is using for communication. An attacker may replace tag content or even replace whole tag with the modified tag, this may result in attacks like phishing. 4

5 Figure 3: Message flow obtained from the Data Capture Analysis in our test system NFC Architecture This chapter includes the main components[5] that an NFC-enabled phone platform comprised of, and also API s available for communication between these components. 3 main components are as follows: 1. Application Execution Environment(AEE): The general application area of the mobile phone providing data storage and processing capabilities. 2. Trusted Execution Environment(TEE): It contains the core of NFC system, Secure Element(SE), which is used to control the NFC based transaction by providing a secure platform for containing sensitive applications and key material. Based on where SE is interfaced in NFC devices, we have 3 architectures. The first involves a SE that is an independent embedded hardware module, i.e. an extra smart token IC (Integrated Chip) built into the phone. A second option, preferred by mobile network operators, is to have the existing Subscriber Identity Application module also act as the SE, i.e. to integrate the SE functionality into the Subscriber Identity Module (SIM). The third option is the use a removable memory component such as Secure MultiMediaCard (Secure Figure 4: illustrates the functional diagram of the NFC architecture in mobile phones and how it interacts with internal and external components 5

6 MMC) or Secure Digital card (Secure SD) as a SE. 3. NFC Controller: NFC controller handles the physical transmitting and receiving of data over the RF interface. The SE communicates with the NFC controller, the external reader device and the applications installed on the mobile phone through well defined, and standardised, interfaces. References [1] a nd c ontactless/. [2] N F C D ata E xchange F ormat [3] [4] L. Francis, G. Hancke, K. Mayes, and K. Markantonakis. Practical nfc peer-to-peer relay attack using mobile phones. In Proc. The 6th Workshop on RFID Security (RFIDSec 2010), Istanbul, Turkey. [5] L. Francis, G. Hancke, K. Mayes, and K. Markantonakis. Potential misuse of nfc enabled mobile phones with embedded security elements as contactless attack platforms. In Proc. Internet Technology and Secured Transactions, ICITST International Conference for, pages 1 8, nov [6] Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. Practical relay attack on contactless transactions by using nfc mobile phones. In Proc. Cryptology eprint Archive, Report 2011/618, [7] rohde schwarz. White paper on near field communication (nfc) technology and measurements. Cryptology eprint Archive, Report 2011/618, /1MA182 2.pdf. [8] Wei Tang, Guang Jin, Jiaming He, and Xianliang Jiang. Extending android security enforcement with a security distance model. In Proc. Internet Technology and Applications (itap), 2011 International Conference on, pages 1 4, aug

NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee

NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee September 2009 Agenda Review of Use Cases Architecture Overview Relationship to Other Standards Status of NFC Forum

More information

NFC is the double click in the internet of the things

NFC is the double click in the internet of the things NFC is the double click in the internet of the things Name Frank Graeber, Product Manager NFC Subject 3rd Workshop on RFID Systems and Technologies Date 12.06.2007 Content NFC Introduction NFC Technology

More information

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria WIMA 2012 NFC Research Track 11 April 2012, Monaco

More information

Practical Attack Scenarios on Secure Element-enabled Mobile Devices

Practical Attack Scenarios on Secure Element-enabled Mobile Devices Practical Attack Scenarios on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria 4 th International Workshop on Near Field Communication 13 March

More information

Contents. Preface. Acknowledgments. xxiii. List of Acronyms i xxv

Contents. Preface. Acknowledgments. xxiii. List of Acronyms i xxv Preface xv Acknowledgments. xxiii List of Acronyms i xxv 1 Executive Summary 1 1.1 Towards NFC Era 2 1.1.1 Ubiquitous Computing 2 1.1.2 Mobile Phones 3 1.1.3 Technological Motivation of NFC 4 1.1.4 Wireless

More information

ISG Seminar 3 rd November Agenda for Lecture. Smart Cards with Contacts. Contact-less Smart Cards. From Smart Cards to NFC Smart Phone Security

ISG Seminar 3 rd November Agenda for Lecture. Smart Cards with Contacts. Contact-less Smart Cards. From Smart Cards to NFC Smart Phone Security ISG Seminar 3 rd November 2011 From Smart Cards to NFC Smart Phone Security Keith Mayes ISG Smart Card Centre (SCC) www.scc.rhul.ac.uk www.isg.rhul.ac.uk keith.mayes@rhul.ac.uk Agenda for Lecture Evolution

More information

Mobile Security Fall 2014

Mobile Security Fall 2014 Mobile Security Fall 2014 Patrick Tague Class #8 NFC & Mobile Payment 1 Announcements Reminder: first group of SoW presentations will be today, starting ~1/2 way through class Written SoW is a separate

More information

Relay Attacks on Secure Elementenabled

Relay Attacks on Secure Elementenabled Relay Attacks on Secure Elementenabled Mobile Devices Virtual Pickpocketing Revisited Michael Roland University of Applied Sciences Upper Austria,, Austria SEC2012 IFIP International Information Security

More information

Smart Tokens: Tags, smart phones and everything in between. Dr Gerhard Hancke Information Security Group

Smart Tokens: Tags, smart phones and everything in between. Dr Gerhard Hancke Information Security Group Smart Tokens: Tags, smart phones and everything in between Dr Gerhard Hancke Information Security Group 29.02.2012 Royal Holloway (RHUL) Royal Holloway founded in 1879 by Victorian entrepreneur Thomas

More information

Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors

Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors Automotive Identification Wireless Infrastructure Lighting Industrial Mobile Consumer Computing Global player with local

More information

Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen

Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Agenda NFC Technology Use Cases Implications for the

More information

NEAR FIELD COMMUNICATION

NEAR FIELD COMMUNICATION NEAR FIELD COMMUNICATION (GUIDED BY:MISS ANUJA V NAIR) BY: REJOY MENDEZ ROLL NO:24 S7 ECE OVERVIEW INTRODUCTION FEATURES OF NFC TECHNOLOGICAL OVERVIEW COMPARISON WITH OTHER TECHNOLOGY SECURITY ASPECTS

More information

NFC Forum Specifications to Build Solutions and Ensure the Global Interoperability of NFC. John Hillan Qualcomm (UK) Ltd. Chair, Technical Committee

NFC Forum Specifications to Build Solutions and Ensure the Global Interoperability of NFC. John Hillan Qualcomm (UK) Ltd. Chair, Technical Committee NFC Forum Specifications to Build Solutions and Ensure the Global Interoperability of NFC John Hillan Qualcomm (UK) Ltd. Chair, Technical Committee 28th September, 2012 NFC Forum Mission and Goals The

More information

Specifications and Application Documents. Laurent Sourgen NFC Forum Board Member STMicroelectronics

Specifications and Application Documents. Laurent Sourgen NFC Forum Board Member STMicroelectronics Specifications and Application Documents Laurent Sourgen NFC Forum Board Member STMicroelectronics April 13, 2012 NFC Forum Architecture Reader/Writer Mode 2 NFC Forum Architecture Reference Applications

More information

Linux NFC Subsystem. Lauro Ramos Venancio Samuel Ortiz 2011, September 9th

Linux NFC Subsystem. Lauro Ramos Venancio Samuel Ortiz 2011, September 9th Lauro Ramos Venancio Samuel Ortiz 2011, September 9th What is NFC? NFC means Near Field Communication It is a short-range wireless communication It operates at 13.56 MHz Data rates from 106 kbits/s to

More information

Digital Signature Records for the NFC Data Exchange Format

Digital Signature Records for the NFC Data Exchange Format Digital Signature Records for the NFC Data Exchange Format Michael Roland Upper Austria University of Applied Sciences,, Austria 2 nd International Workshop on Near Field Communication 20 April 2010, Monaco

More information

A Tool for the Tag Management for the Building of Smart Environments

A Tool for the Tag Management for the Building of Smart Environments A Tool for the Tag Management for the Building of Smart Environments Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz and Miguel Ángel Gómez-Nieto University of Córdoba. Department of Computing

More information

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on

More information

HAKI-NFC BASED ANDROID APPLICATION

HAKI-NFC BASED ANDROID APPLICATION HAKI-NFC BASED ANDROID APPLICATION JAIKISHAN KHATWANI 1, ABHISHEK SINGH 2, HRISHIKESH RANGDALE 3, KAMLESH JUWARE 4 & ISHAN ALONE 5 1,2,3,4&5 Department of Information Technology, Mumbai University, FR.

More information

The NFC Forum NFC Technology for Developers

The NFC Forum NFC Technology for Developers The NFC Forum NFC Technology for Developers 7 October 2008 Audio Tips All audio comes through your computer Use your computer mixer to adjust master volume Use Webcast reader audio slide top center of

More information

Security Vulnerabilities of the NDEF Signature Record Type

Security Vulnerabilities of the NDEF Signature Record Type Security Vulnerabilities of the NDEF Signature Record Type Michael Roland Upper Austria University it of Applied Sciences,, Austria 3 rd International Workshop on Near Field Communication 22 February 2011,,

More information

A Secure and Practical Key Management Mechanism for NFC Read-Write Mode

A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Journal of Computational Information Systems 7: 11 (2011) 3819-3828 Available at http://www.jofcis.com A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen CHENG, Wen-Wei LIAO,

More information

Preface. Structure of the Book

Preface. Structure of the Book When the first edition of this book was published back in 2008, the scope was anything to do with smart cards and security tokens in the widest sense. The aim was in fact to provide a complete story, looking

More information

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD Int. J. Engg. Res. & Sci. & Tech. 2013 Jignesh Patel and Badal Kothari, 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved NEAR FIELD COMMUNICATION

More information

A Secure and Practical Key Management Mechanism for NFC Read-Write Mode

A Secure and Practical Key Management Mechanism for NFC Read-Write Mode A Secure and Practical Key Management Mechanism for NFC Read-Write Mode Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei Department of Information and Management, Chinese Culture University, Taipei,

More information

Chapter 2 Basics. 2.1 Smartcards. This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards.

Chapter 2 Basics. 2.1 Smartcards. This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards. Chapter 2 Basics This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards. 2.1 Smartcards Smartcards are identification cards equipped with a microchip (integrated

More information

Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail

Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 4 (April 2014), PP.20-24 Design of an Automatic Fare Collection System

More information

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated

More information

Near Field Comunications

Near Field Comunications Near Field Comunications Bridging the Physical and Virtual Worlds This is going to get interesting! Ash@YLabz.com Siamak Ashrafi NFC Definition Near field communication, or NFC, is a set of short-range

More information

Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards. contactless IC cards that is being adopted

Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards. contactless IC cards that is being adopted Type A/B GP TSM Advances with Osaifu-Keitai Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards The Osaifu-Keitai service currently being provided in Japan is based on the FeliCa *1 mobile

More information

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland NFC Research Lab Hagenberg University of Applied Sciences Upper Austria Softwarepark 11, 4232

More information

NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC

NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC Learn all about NFC Session I, 15th March NFC applications and use cases https://attendee.gotowebinar.com/rt/1059402932312036099 Session II,

More information

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011

Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Mobile Security Application Current Status Overview in Taiwan Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Content Problems and Current Status Approach for the Mobile Security Application Mobile

More information

Current Benefits and Future Directions of NFC Services

Current Benefits and Future Directions of NFC Services Current Benefits and Future Directions of NFC Services Kerem Ok, Vedat Coskun, Mehmet N. Aydin, Busra Ozdenizci www.nfclab.com ISIK University, Istanbul ICEMT 2010 International Conference on Education

More information

Beyond Payment: Secure NFC applications and their relation to RFID

Beyond Payment: Secure NFC applications and their relation to RFID Powering the trusted identities of the world s people, places & things Beyond Payment: Secure NFC applications and their relation to RFID Richard Aufreiter, Director Product Management - IDT June 27, 2017

More information

Current Benefits and Future Directions of NFC Services

Current Benefits and Future Directions of NFC Services Current Benefits and Future Directions of NFC Services Kerem OK, Vedat COSKUN, Mehmet N. AYDIN, and Busra OZDENIZCI Department of Information Technologies, ISIK University Istanbul, Turkey { keremok vedatcoskun

More information

Mobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010

Mobile NFC Services Opportunities & Challenges. NGUYEN Anh Ton VNTelecom Conference 31/10/2010 Mobile NFC Services Opportunities & Challenges NGUYEN Anh Ton VNTelecom Conference 31/10/2010 Agenda 1. Introduction 2. Mobile NFC Overview 3. NFC Ecosystem Key Findings 4. Main NFC challenges 5. What

More information

NFC Forum News Conference. June 5, 2006

NFC Forum News Conference. June 5, 2006 NFC Forum News Conference June 5, 2006 The NFC Forum: Who We Are and Where We Are Going Christophe Duverne, NFC Forum Chairman Philips Semiconductors Today s Agenda Introduction to the NFC Forum Christophe

More information

An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications An Attack on NFC Records and Some Necessary Revisions of NFC Specifications Muhammad Qasim Saeed ISG, Department of Mathematics Royal Holloway University of London Egham, UK Colin D. Walter ISG, Department

More information

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar, Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses

More information

HOW TO INTEGRATE NFC CONTROLLERS IN LINUX

HOW TO INTEGRATE NFC CONTROLLERS IN LINUX HOW TO INTEGRATE NFC CONTROLLERS IN LINUX JORDI JOFRE NFC READERS NFC EVERYWHERE 28/09/2017 WEBINAR SERIES: NFC SOFTWARE INTEGRATION PUBLIC Agenda NFC software integration webinar series Session I, 14th

More information

Security of NFC payments

Security of NFC payments Security of NFC payments Olga Korobova Department of Computer Science University of Massachusetts Amherst Abstract Our research objective was to examine the security features implemented by the bank cards

More information

Smart Campus an Android and Web based Application using. IoT and NFC Technology

Smart Campus an Android and Web based Application using. IoT and NFC Technology Smart Campus an Android and Web based Application using IoT and NFC Technology Shyam Ambilkar 1, Shivkumar Hegonde 1, Rutuja Therade 1, Surbhi Lingamwar 1 ------------------------------------------------------------------------------***------------------------------------------------------------------------------

More information

A Role-Based Service Level NFC Ecosystem Model

A Role-Based Service Level NFC Ecosystem Model A Role-Based Service Level NFC Ecosystem Model Kerem Ok, Vedat Coskun, Busra Ozdenizci, Mehmet N. Aydin This is the author copy of the paper " A Role-Based Service Level NFC Ecosystem Model". For the latest

More information

Corey Benninger Max Sobell

Corey Benninger Max Sobell Corey Benninger Max Sobell NFC Overview What is NFC? Hardware basics behind NFC Antennas and waveforms Tags and access control NFC Data Exchange Format (NDEF) NFC Application Attacks Privacy Mobile Wallets

More information

NFC in the PC environment

NFC in the PC environment NFC in the PC environment Kurt Schmid March 2007 1 ITG within ASSA ABLOY A multi-national group Some 30,000 employees HQ: Stockholm, Sweden Global Technologies Group Entrance System Group Americas EMEA

More information

Mobile Payments Building the NFC Ecosystem

Mobile Payments Building the NFC Ecosystem Mobile Payments Smart Card Alliance / NFC Forum Joint Workshop Building the NFC Ecosystem 2010 Smart Card Alliance Annual Conference Peter Preuss Nokia Chairman, NFC Forum Marketing Committee Cooperation

More information

A Novel Scheme for On-demand Distribution of Secure Element Keys

A Novel Scheme for On-demand Distribution of Secure Element Keys A Novel Scheme for On-demand Distribution of Secure Element Keys Vincent Alimi Normandie Univ, France UNICAEN, ENSICAEN, GREYC CNRS, UMR 6072 F-14032 Caen, France fvincent.alimi@ensicaen.fr ABSTRACT: The

More information

Prepaid Energy System

Prepaid Energy System Prepaid Energy System Group 21 Youssef Ojeil (EE) Michael Cuervo (EE) MD.S. Rahaman (EE) Sahin Okur (EE) Sponsored by: Supervised by Dr. Chung-Yong Chan Goals and Objectives Alternative pre-paid solution

More information

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

Secure Elements 101. Sree Swaminathan Director Product Development, First Data Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of

More information

NFC Payments: The Art of Relay & Replay Attacks. Salvador Mendoza August 14, 2018

NFC Payments: The Art of Relay & Replay Attacks. Salvador Mendoza August 14, 2018 1 NFC Payments: The Art of Relay & Replay Attacks Salvador Mendoza August 14, 2018 2 Disclaimer This white paper is a shortened version of the actual research. Unfortunately, some techniques and exploitation

More information

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice.

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice. ACR1252U NFC Forum Certified Reader Technical Specifications V1.03 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0.

More information

Mobile and Ubiquitous Computing CS 525M: P2P Micro Interactions with NFC Enabled Mobile Phones

Mobile and Ubiquitous Computing CS 525M: P2P Micro Interactions with NFC Enabled Mobile Phones Mobile and Ubiquitous Computing CS 525M: P2P Micro Interactions with NFC Enabled Mobile Phones Hiromu Enoki Computer Science Dept. Worcester Polytechnic Institute (WPI) 1 Introduction Near Field Communication

More information

NFC Lab Michel Simatic

NFC Lab Michel Simatic Michel Simatic 15/01/2015 Table of contents RFID versus NFC High level interactions with tags Touchatag (Tikitag) / Mir:ror Smart posters Low level interactions with tags Card readers Tags Medium level

More information

Putting NFC Forum Specifications to Work

Putting NFC Forum Specifications to Work Putting NFC Forum Specifications to Work 16 March 2011 Moderator Ruth Cassidy PR Director NFC Forum ruth.cassidy@nfc-forum.org 2 Audio Tips Audio may come through your computer or you may call in Use your

More information

Extensive proximity connectivity capabilities for USB-enabled devices

Extensive proximity connectivity capabilities for USB-enabled devices NXP Near Field Communication (NFC) controller Extensive proximity connectivity capabilities for -enabled devices NXP Semiconductors is a highly integrated transmission module for contactless communication

More information

COMPRION NFC Forum Test Solutions. NFC Forum Approved Compliance Testing

COMPRION NFC Forum Test Solutions. NFC Forum Approved Compliance Testing COMPRION Test Solutions Approved Compliance Testing NFC Specifications According to a non-profit industry association wants to advance the use of Near Field Communication (NFC) in consumer electronics,

More information

NFC Payments: The Art of Relay & Replay Attacks

NFC Payments: The Art of Relay & Replay Attacks NFC Payments: The Art of Relay & Replay Attacks Who am I? Security Researcher @Netxing Co-founder of Women in Tech Fund (WomenInTechFund.org) NFC Technology RFID Spectrum (Radio Frequency Identification)

More information

A Near Field Communication Tool for Building Intelligent Environment using Smart Posters

A Near Field Communication Tool for Building Intelligent Environment using Smart Posters A Near Field Communication Tool for Building Intelligent Environment using Smart Posters Pilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz and Miguel Ángel Gómez-Nieto Abstract NFC is becoming

More information

Mobile Identity Management

Mobile Identity Management Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks

More information

A SURVEY ON NEAR FIELD COMMUNICATION IN MOBILE PHONES & PDAS

A SURVEY ON NEAR FIELD COMMUNICATION IN MOBILE PHONES & PDAS Technical report, IDE1062, Sept 2010 A SURVEY ON NEAR FIELD COMMUNICATION IN MOBILE PHONES & PDAS Master s Thesis in Computer Systems Engineering IMHONTU, EROMON EMMANUEL & KUMAH, YAW OWUSU School of Information

More information

Near Field Communication: IoT with NFC. Dominik Gruntz Fachhochschule Nordwestschweiz Institut für Mobile und Verteilte Systeme

Near Field Communication: IoT with NFC. Dominik Gruntz Fachhochschule Nordwestschweiz Institut für Mobile und Verteilte Systeme Near Field Communication: IoT with NFC Dominik Gruntz Institut für Mobile und Verteilte Systeme NFC Experience at FHNW 2005/06 First NFC demonstrator (with Siemens CX70 Emoty) NFC was included in a removable

More information

Multifunctional Identifiers ESMART Access

Multifunctional Identifiers ESMART Access AIR TAG Multifunctional Identifiers ESMART Access Contents ESMART Access technology 4 Key advantages of ESMART Access 6 Multifunctional identifiers ESMART Access 8 AIRTAG RFID keyfobs 9 Silicone RFID

More information

Digital Signature Records for the NFC Data Exchange Format

Digital Signature Records for the NFC Data Exchange Format Digital Signature Records for the NFC Data Exchange Format Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including

More information

ISO / NFC Standards and Specifications Overview. NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team

ISO / NFC Standards and Specifications Overview. NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team ISO / NFC Standards and Specifications Overview NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team HF RFID ISO STANDARDS HF RFID ISO Standards Overview The main worldwide accepted High

More information

The impact of NFC on multimodal social media application

The impact of NFC on multimodal social media application Second International Workshop on Near Field Communication The impact of NFC on multimodal social media application Erkki Siira, Vili Törmänen VTT, Finland firstname.lastname@vtt.fi Abstract In this paper

More information

Enhancing Security and Usability Features of NFC

Enhancing Security and Usability Features of NFC Master Thesis Computer Science Thesis no: MCS-2009-30 September 2009 Enhancing Security and Usability Features of NFC Ömer Kerem Beygo Cihan Eraslan School of Computing Blekinge Institute of Technology

More information

Overview RFID-Systems

Overview RFID-Systems Overview RFID-Systems MSE, Rumc, RFID, 1 References [1] Klaus Finkenzeller, RFID-Handbuch, 5. Auflage, Hanser, 2008. [2] R. Küng, M. Rupf, RFID-Blockkurs, ergänzende MSE-Veranstaltung, ZHAW, 2009. [3]

More information

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware EMBEDDED SYSTEMS PROGRAMMING 2016-17 Accessing Hardware HARDWARE LIST Accelerometer Vector magnetometer (compass) Gyroscope GPS and/or other location facilities (Front/rear) camera Microphone Speaker Battery

More information

Mobile Near Field Communications (NFC) Tap n Go Keep it Secure & Private

Mobile Near Field Communications (NFC) Tap n Go Keep it Secure & Private Mobile Near Field Communications (NFC) Tap n Go Keep it Secure & Private Ann Cavoukian, Ph.D. Information and Privacy Commissioner, Ontario, Canada Acknowledgements The Information and Privacy Commissioner

More information

Near Field Communication and the NFC Forum: The Keys to Truly Interoperable Communications

Near Field Communication and the NFC Forum: The Keys to Truly Interoperable Communications The Keys to Truly Interoperable Communications ABSTRACT This white paper highlights the capabilities of Near Field Communication (NFC) and its potential to enhance our everyday lives. It shows how NFC

More information

GSM Association (GSMA) Mobile Ticketing Initiative

GSM Association (GSMA) Mobile Ticketing Initiative GSM Association (GSMA) Mobile Ticketing Initiative Sue Monahan Director - GSMA NA Clif Campbell Lead Member of Technical Staff AT&T April 2010 Content GSM World Today GSMA Overview GSMA M-Ticketing Initiative

More information

Near Field Communication Security

Near Field Communication Security Near Field Communication Security Thomas Patzke 22.04.2015 Who am I... Thomas Patzke (formerly Skora) Who am I... Thomas Patzke (formerly Skora) Started with security related topics somewhere in the 90s

More information

IDGo Middleware and SDK for Mobile Devices

IDGo Middleware and SDK for Mobile Devices Smartjac Industries Inc. - Kanalvägen 1A 2nd floor SE-194 61 Upplands Väsby Sweden www.smartjac.com / www.smartjac.biz Phone: +46(8)41071230 - Email: order@smartjac.com IDGo 800 - Middleware and SDK for

More information

Near Field Communication (NFC) in an Automotive Environment

Near Field Communication (NFC) in an Automotive Environment Near Field Communication (NFC) in an Automotive Environment Use Cases, Architecture and Realization Rainer Steffen, Jörg Preißinger, Tobias Schöllermann BMW Group Research and Technology Munich, Germany

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

NFC DESIGN FOR ATTENDANCE SYSTEM IN THE UNIVERSITY

NFC DESIGN FOR ATTENDANCE SYSTEM IN THE UNIVERSITY International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 6, June 2018, pp. 566 571, Article ID: IJMET_09_06_065 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=6

More information

WHITE PAPER. Bluetooth 4 LE: the only viable solution for next generation payments

WHITE PAPER. Bluetooth 4 LE: the only viable solution for next generation payments WHITE PAPER Bluetooth 4 LE: the only viable solution for next generation payments 2 Introduction As the IoT and connected devices become more prevalent, our smartphones are becoming increasingly connected

More information

Relay Attacks on Secure Element-enabled Mobile Devices?

Relay Attacks on Secure Element-enabled Mobile Devices? Relay Attacks on Secure Element-enabled Mobile Devices 1 Relay Attacks on Secure Element-enabled Mobile Devices? Virtual Pickpocketing Revisited Michael Roland 1, Josef Langer 1, and Josef Scharinger 2

More information

AUTO DISCOVERY REMOTE CONTROL ADRC GLOSSARY

AUTO DISCOVERY REMOTE CONTROL ADRC GLOSSARY AUTO DISCOVERY REMOTE CONTROL ADRC GLOSSARY THE INTERNET OF THINGS VERSION 1.0 // SEPTEMBER 2016 Contents 1 About this document... 1 Document purpose... 1 Scope... 1 Contact information... 1 2 Definitions...

More information

The State of Android Near Field Communication Jonas Estberger Bespoke Code

The State of Android Near Field Communication Jonas Estberger Bespoke Code The State of Android Near Field Communication 2010 Jonas Estberger Bespoke Code Introduction Scope With Android version 2.3 (Gingerbread) Google introduced Near Field Communication (NFC) support. This

More information

Managing an NFC Ecosystem

Managing an NFC Ecosystem Managing an NFC Ecosystem Gerald Madlmayr NFC, ICMB 2008, Barcelona 1 NFC - What is it all about RFID Derivate 13,56 Mhz Integrated in mobile devices for consumer market Operating Modes Tag/SmartCard Emulation

More information

Secure Over-The-Air Services in NFC Ecosystems

Secure Over-The-Air Services in NFC Ecosystems Secure Over-The-Air Services in NFC Ecosystems Sirpa Nordlund Venyon Hagenberg March 20th, 2007 Contents of the presentation 1. Building up NFC ecosystem 2. Trusted third party and value proposition 3.

More information

NEAR FIELD COMMUNICATION-SAFETY AND SECURITY

NEAR FIELD COMMUNICATION-SAFETY AND SECURITY International Journal of Advances in Engineering & Scientific Research (IJAESR) ISSN: 2349 3607 (Online) ISSN: 2349 4824 (Print) Available online at: http://www.arseam.com/content/volume-1-issue-5- sep-2014

More information

A SECURE NFC APPLICATION FOR CREDIT TRANSFER USING MOBILE PHONES

A SECURE NFC APPLICATION FOR CREDIT TRANSFER USING MOBILE PHONES Journal homepage: www.mjret.in ISSN:2348 6953 A SECURE NFC APPLICATION FOR CREDIT TRANSFER USING MOBILE PHONES Sanket Tadas, Abhishek Kuwad, Pankaj Thorat, Ajay Gunjal, Abhishek Kamble Department of Computer

More information

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Hao Zhao, Sead Muftic School of Information and Communication Technologies (ICT) Royal Institute of Technology

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 9, September ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 9, September ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 9, September-2017 375 Summary of NFC and providing a method to improve security at NFC Omid movagharislamic Azad University, Tabriz,Iran

More information

ACR122S NFC Reader. Datenblatt / Specifications. Technical Specifications

ACR122S NFC Reader. Datenblatt / Specifications. Technical Specifications Datenblatt / Specifications NFC Reader Technical Specifications Table of Contents 1.0. Introduction 3 2.0. Features 4 3.0. Typical Applications 5 4.0. Technical Specifications 6 Page 2 of 6 1.0. Introduction

More information

Considering the Security of Mobile Commerce and Banking. Professor Keith Mayes Information Security Group ACE-CSR

Considering the Security of Mobile Commerce and Banking. Professor Keith Mayes Information Security Group ACE-CSR Considering the Security of Mobile Commerce and Banking Professor Keith Mayes Information Security Group ACE-CSR Information Security Group (ISG) Established 1992 17 Full-time Academics, 8+ Research Assistants

More information

NFC Application Ecosystems: Introduction, Peer-to-Peer, NFC Tags/Posters and Product Label Applications

NFC Application Ecosystems: Introduction, Peer-to-Peer, NFC Tags/Posters and Product Label Applications NFC Application Ecosystems: Introduction, Peer-to-Peer, NFC Tags/Posters and Product Label Applications Smart Card Alliance Mobile & NFC Council Webinar September 27, 2012 Introductions Brent Bowen, INSIDE

More information

Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack

Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack arxiv:1209.0875v1 [cs.cr] 5 Sep 2012 Technical Report Applying recent secure element relay attack scenarios to the real world: Abstract Michael Roland NFC Research Lab Hagenberg University of Applied Sciences

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

What s In Your e-wallet? Using ARM IP to Enable Security in Mobile Phones. Richard Phelan Media Processing Division TrustZone Security Technology

What s In Your e-wallet? Using ARM IP to Enable Security in Mobile Phones. Richard Phelan Media Processing Division TrustZone Security Technology What s In Your e-wallet? Using ARM IP to Enable Security in Mobile Phones Richard Phelan Media Processing Division TrustZone Security Technology 1 What s In Your Wallet Today? Some cards A bus ticket A

More information

NFC USE CASES FOR INDUSTRIAL APPLICATIONS. December 2016

NFC USE CASES FOR INDUSTRIAL APPLICATIONS. December 2016 NFC USE CASES FOR INDUSTRIAL APPLICATIONS December 2016 Agenda Session 1 st December: NFC use cases for industrial applications NFC technology essentials NFC Forum specifications Application examples NFC

More information

HCE security implications. Analyzing the security aspects of HCE

HCE security implications. Analyzing the security aspects of HCE HCE security implications Analyzing the security aspects of HCE January 8th, 2014 White paper - HCE security implications, analyzing the security aspects of HCE HCE security implications About the authors:

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

ST25TV product presentation. June 2018

ST25TV product presentation. June 2018 ST25TV product presentation June 2018 ST25TV512 / 02K Product 2 The ST25TV chip belongs to ST25 NFC / RFID Tags & Readers family ST25TV is the natural evolution of LRI2K series The ST25TV512 / ST25TV02K

More information

Mobile Applications Approaches using Near Field Communication Support

Mobile Applications Approaches using Near Field Communication Support UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática Mobile Applications Approaches using Near Field Communication Support David Miguel Oliveira Bexiga Monteiro Submitted

More information

NFC. control time RFID. copy protection. Barcode. Security. App. Quick control. NFC eco system ISO Secure Element. Near Field Communication

NFC. control time RFID. copy protection. Barcode. Security. App. Quick control. NFC eco system ISO Secure Element. Near Field Communication Quick control Casual users App mobile ticketing NFC Smartphone OPTIMOS Investment protection RFID control time Ticket issuing mobile network Data transfer Ticket purchase existing infrastructure Security

More information

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies 1 Connected devices communication to the Local Network and Gateway 1 st to i th

More information