SECURITY            INNEAR FIELD COMMUNICATION                   By: Vinit Varghese
MY CONTRIBUTION Analysis of security with respect to NFC. Misconceptions about security and NFC. Threats applicable to ...
INTRODUCTION Near Field Communication ISO 18092
MODES OF OPERATION Active Passive
DEVICES
APPLICATIONS / USE-CASES Contactless   Token Ticketing   / Micro Payment Device   Pairing
THREATS   Eavesdropping      •   RF filed characteristic of the given sender device      •   Characteristic of the attack...
DATA CORRUPTION AND MODIFICATION
MAN IN THE MIDDLE ATTACK       Possible in NFC?
SOLUTION Eavesdropping Data Corruption/ Modification Man-in-the-Middle-Attack Secure Channel for NFC NFC Specific Key...
NFC SPECIFIC KEY AGREEMENT
OTHER CONCERNS/ FUTURE DEVELOPMENT StolenDevice Google Wallet Shopping Experience Acceptance
QUESTIONS ????           Thank You
Upcoming SlideShare
Loading in...5
×

Security in Near Field Communication

309

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
309
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security in Near Field Communication

  1. 1. SECURITY INNEAR FIELD COMMUNICATION By: Vinit Varghese
  2. 2. MY CONTRIBUTION Analysis of security with respect to NFC. Misconceptions about security and NFC. Threats applicable to NFC. Solutions to protects against these threats. Future developments.
  3. 3. INTRODUCTION Near Field Communication ISO 18092
  4. 4. MODES OF OPERATION Active Passive
  5. 5. DEVICES
  6. 6. APPLICATIONS / USE-CASES Contactless Token Ticketing / Micro Payment Device Pairing
  7. 7. THREATS Eavesdropping • RF filed characteristic of the given sender device • Characteristic of the attacker’s antenna • Quality of the attacker’s receiver • Quality of the attacker’s RF signal decoder • Setup of the location where the attack is performed • Power sent out by the NFC device
  8. 8. DATA CORRUPTION AND MODIFICATION
  9. 9. MAN IN THE MIDDLE ATTACK Possible in NFC?
  10. 10. SOLUTION Eavesdropping Data Corruption/ Modification Man-in-the-Middle-Attack Secure Channel for NFC NFC Specific Key Agreement
  11. 11. NFC SPECIFIC KEY AGREEMENT
  12. 12. OTHER CONCERNS/ FUTURE DEVELOPMENT StolenDevice Google Wallet Shopping Experience Acceptance
  13. 13. QUESTIONS ???? Thank You

×