Security in Near Field Communication
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Security in Near Field Communication

on

  • 438 views

 

Statistics

Views

Total Views
438
Views on SlideShare
438
Embed Views
0

Actions

Likes
0
Downloads
13
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Security in Near Field Communication Presentation Transcript

  • 1. SECURITY INNEAR FIELD COMMUNICATION By: Vinit Varghese
  • 2. MY CONTRIBUTION Analysis of security with respect to NFC. Misconceptions about security and NFC. Threats applicable to NFC. Solutions to protects against these threats. Future developments.
  • 3. INTRODUCTION Near Field Communication ISO 18092
  • 4. MODES OF OPERATION Active Passive
  • 5. DEVICES
  • 6. APPLICATIONS / USE-CASES Contactless Token Ticketing / Micro Payment Device Pairing
  • 7. THREATS Eavesdropping • RF filed characteristic of the given sender device • Characteristic of the attacker’s antenna • Quality of the attacker’s receiver • Quality of the attacker’s RF signal decoder • Setup of the location where the attack is performed • Power sent out by the NFC device
  • 8. DATA CORRUPTION AND MODIFICATION
  • 9. MAN IN THE MIDDLE ATTACK Possible in NFC?
  • 10. SOLUTION Eavesdropping Data Corruption/ Modification Man-in-the-Middle-Attack Secure Channel for NFC NFC Specific Key Agreement
  • 11. NFC SPECIFIC KEY AGREEMENT
  • 12. OTHER CONCERNS/ FUTURE DEVELOPMENT StolenDevice Google Wallet Shopping Experience Acceptance
  • 13. QUESTIONS ???? Thank You