NFC is a wireless proximity communication technology allowing us to transfer data over a distance of up to 10 cm.
NCF is a contactless technology , A contactless technology as one that lets users pay for transactions by simply holding cards close to, rather than swiping them through a reader.
Combining NFC technology with applications such as payment in a mobile device or contactless access raises potential security risks and attacks. Attacks against an NFC device can be performance anywhere and may not be noticed by the victim as the communication itself is contactless.
The technology is relatively new to be accepted widely world it should demonstrate the ability to fend off attacks.
NFC Operation Modes
NFC devices are unique in that they can change their mode of operation to be in reader/writer mode, peer-to-peer mode, or card emulation mode. The different operating modes are based on the ISO/IEC 18092 NFC IP-1 and ISO/IEC 14443 contactless smart card standards. Madmayr and Langer give the NFC modes in as;
- Reader/writer mode
- Card Emulation
- Peer to peer
NFC threats
From the operational modes discussed in the previous section, the following attacks can be performed on the different modes;
- Eaves dropping
The main question is how close an attacker needs to be to be able to retrieve a usable RF (Radio Frequency) signal? There is no correct answer to this question, the reason for that is the huge number of parameters which determine the answer. For example characteristics of the attacker’s antenna, quality of the attacker’s receiver, power sent out by the NFC device and so on. Additionally the mode in which the sender of the data is operating i.e. whether the sender is generating its own RF field (active mode) or whether the sender is using the RF field generated by another device (passive mode), can be used to determine eave’s dropping because of the different ways of transmitting the data for example it is harder to eaves drop on devices sending data in passive mode.
- Data corruption
- Data modification
- Data insertion
Conclusion
In this survey, I have given the possible attacks that can be performed on the Near-Field Technology. These attacks are not limited to NFC wireless technology only; other wireless technologies are susceptible to these very attacks e.g. Bluetooth, Zigbee etc. I hope this survey will make students and general public appreciate the technology and affirm security of the technology in order for the usage and adapt it widely.
No comments:
Post a Comment