Browse > Article
http://dx.doi.org/10.14400/JDC.2016.14.12.183

A Study on Analysis and Countermeasure of Security threat in NFC  

Kim, Hyung-Uk (School of Computer Science & Engineering, Soongsil University)
Kim, Hyung-joo (School of Computer Science & Engineering, Soongsil University)
Kang, Jung-ho (School of Computer Science & Engineering, Soongsil University)
Jun, Moon-seog (School of Computer Science & Engineering, Soongsil University)
Publication Information
Journal of Digital Convergence / v.14, no.12, 2016 , pp. 183-191 More about this Journal
Abstract
Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.
Keywords
Near Field Communication; Radio Frequency Identification; Vulnerability; Mobile; ISO/IEC standard;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 GSMA, "mobile NFC Service V1.0," 2007
2 EU, "Privacy and Data Protection Impact Assessment Framework for RFID Application", 2011.1.12.
3 ECMA International : "ECMA-089 NFC-SEC White paper," Dec 9, 2008
4 Ernst Haselsteiner, Klemens BreitfuB, "Security in Near Field Communication (NFC)", Workshop on RFID Security RFIDSec, 2006.[1] ECMA International : "ECMA-089 NFC-SEC White paper," Dec 9, 2008
5 GSMA, "mobile NFC echnical guidelines V2.0," 2007
6 ISO/IEC 14443-3:2011, Identification cards - Contactless integrated circuit cards - Proximity cards - Part 3: Initialization and anticollision
7 ISO/IEC 14443-4:2008, Identification cards - Contactless integrated circuit cards - Proximity cards - Part 4: Transmission protocol
8 ISO/IEC 13157-2:2010, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 2: NFC-SEC cryptography standard using ECDH and AES
9 ISO/IEC 15693-1:2010, Identification cards - Contactless integrated circuit cards - Vicinity cards - Part 1: Physical characteristics
10 ISO/IEC 21481:2005, Information technology - Telecommunications and information exchange between systems - Near Field Communication Interface and Protocol 2 (NFCIP-2)
11 NFC technology trends and certification, TTA Journal Vol.133, 2011
12 Sun-Hee Lim, Jae-woo Jeon, Jung Imjin, Okyeon Yi, "Study on NFC Security Analysis and UICC Alternative Effect". J-KICS Vol36 No.1, 01.2011
13 Ernst Haselsteiner and Klemens Breitfub, "Security in NFC", Workshop on RFID Security RFIDSec, 2006
14 Gerhard P. Hancke, Markus G. kuhn, "An RFID Distance Bounding Protocol." Security and Privacy for Emerging Areas in Communications Networks, 2005.
15 Collin Mulliner, "Vnlnerability Analysis and Attack on NFC-enabled Mobile Phones", International Conference on Availability, Reliability and Security, 2009.
16 NFC Forum-TS-signature RTD-1.0, 2010-11-18
17 C.H. Choi. "CPND ecosystem ICCT (Information, Communication, Contents Technology)." Journal of Digital Convergence. 12.3 (2014): 7-16.   DOI
18 Seong-Hoon Lee, "Actual Cases and Analysis of IT Convergence for Green IT", Journal of the Korea Convergence Society, Vol. 6, No. 6, pp. 147-152, 2015.   DOI
19 S.H. Won, and H.S. Yang. "Research and policy direction for the success of ICT-based company Fusion." Journal of Digital Convergence. 13.4 (2015): 39-50.   DOI
20 J.H.Han, et al. "Effects of perceived usefulness and ease reliance on payment services and loyalty mall ." Journal of Digital Convergence 13.12 (2015): 75-87.   DOI
21 Seong-Hoon Lee, Dong-Woo Lee, "FinTech- Conversions of Finance Industry based on ICT", Journal of the Korea Convergence Society, Vol. 6, No. 3, pp. 97-102, 2015.   DOI