Near Field Communication: Vibhor Sharma
Near Field Communication: Vibhor Sharma
VIBHOR SHARMA
Department of Computer Science & Engineering
TULA's Institute, The Engineering and Management College,
Dehradun, Uttarakhand 248001, India
[email protected]
PREETI GUSAIN
Department of Computer Science & Engineering
TULA's Institute, The Engineering and Management College,
Dehradun, Uttarakhand 248001, India
[email protected]
PRASHANT KUMAR
Department of Computer Science & Engineering
TULA's Institute, The Engineering and Management College,
Dehradun, Uttarakhand 248001, India
[email protected]
Abstract
Near Field Communication (NFC) technology is being grown up at enormous speed. NFC technology provides
the fastest way to communicate two devices with in a fraction of second. This technology has only been
implemented on smart phones so far. Like Bluetooth it works only in short range and data transfer takes place
at very low speed. Several security issues are attached with NFC, which is a big concern. Security attacks like
eavesdropping, data corruption and modification, interference attacks and theft, are the most dangerous for the
customer who is using his/her smart phone for payment purpose. In this paper we present the comparison of
NFC with Bluetooth and security analysis of NFC.
Keywords: NFC Modes, NFC and RFID, NFC over Bluetooth, Security Issues, Protection Measures.
2. NFC Modes
343
In figure 2 we can see comparison of NFC with other manipulated data i.e. data integrity is broken.
technologies in terms of data rate and range. Imposter attack can be a big threat to NFC
technology too, because an imposter can hack the
data between two parties during transmission and
alter it. After that the imposter can pretend to be a
different entity i.e. sender in front of receiver and
receiver in front of sender. It is similar to man in the
middle attack. Another major security issue is theft
attempt. If the NFC enabled device is stolen, the thief
can swipe the phone in front of card reader or tap
phone with another NFC enabled phone and make
transactions, no matter how strong encryption is
applied. Thus these are some security issues which
can be faced by NFC technology during any
transaction or transmission.
344
We can think a number of things using NFC. Let’s complementary-or-competitive-both-offer-
distinct-advantages-for-users-in-vehicles.aspx
think that we are doing shopping at Mall and paying
9. http://www.nearfieldcommunication.org/nfc-
the bill not in cash or credit card but just by waving security.html
our mobile phone in front of the reader. We can also 10. https://www.cdt.org/blogs/harley-geiger/nfc-
think to pay the electricity bill, water bill etc. not by phones-raise-opportunities-privacy-and-security-
issues
waiting in the queue for hours but just to tap our
11. http://www.cso.com.au/article/440741/near_field
phone and deduct the bill. Kenya has adopted this _communication_security_risks_/
technology. NFC is provided by a few number of 12. http://android.appstorm.net/general/opinion/near-
Mobile manufacturing companies to a very few field-communication-and-the-future-of-mobile/
13. http://www.nfc-forum.org
handsets (Smart phones). But in future it will be 14. http://mondato.com/en/articles/newsletter-vol-4-
provided in all kind of devices because of its ease of issue-14-nfc-bypass-security-in-mobile-payments
use. But the obstacle is to make people understand to
make payment by their mobile phones instead of
credit cards, debit cards or cash.
8. Conclusion
345