A Study on Analysis and Countermeasure of Security threat in NFC |
Kim, Hyung-Uk
(School of Computer Science & Engineering, Soongsil University)
Kim, Hyung-joo (School of Computer Science & Engineering, Soongsil University) Kang, Jung-ho (School of Computer Science & Engineering, Soongsil University) Jun, Moon-seog (School of Computer Science & Engineering, Soongsil University) |
1 | GSMA, "mobile NFC Service V1.0," 2007 |
2 | EU, "Privacy and Data Protection Impact Assessment Framework for RFID Application", 2011.1.12. |
3 | ECMA International : "ECMA-089 NFC-SEC White paper," Dec 9, 2008 |
4 | Ernst Haselsteiner, Klemens BreitfuB, "Security in Near Field Communication (NFC)", Workshop on RFID Security RFIDSec, 2006.[1] ECMA International : "ECMA-089 NFC-SEC White paper," Dec 9, 2008 |
5 | GSMA, "mobile NFC echnical guidelines V2.0," 2007 |
6 | ISO/IEC 14443-3:2011, Identification cards - Contactless integrated circuit cards - Proximity cards - Part 3: Initialization and anticollision |
7 | ISO/IEC 14443-4:2008, Identification cards - Contactless integrated circuit cards - Proximity cards - Part 4: Transmission protocol |
8 | ISO/IEC 13157-2:2010, Information technology - Telecommunications and information exchange between systems - NFC Security - Part 2: NFC-SEC cryptography standard using ECDH and AES |
9 | ISO/IEC 15693-1:2010, Identification cards - Contactless integrated circuit cards - Vicinity cards - Part 1: Physical characteristics |
10 | ISO/IEC 21481:2005, Information technology - Telecommunications and information exchange between systems - Near Field Communication Interface and Protocol 2 (NFCIP-2) |
11 | NFC technology trends and certification, TTA Journal Vol.133, 2011 |
12 | Sun-Hee Lim, Jae-woo Jeon, Jung Imjin, Okyeon Yi, "Study on NFC Security Analysis and UICC Alternative Effect". J-KICS Vol36 No.1, 01.2011 |
13 | Ernst Haselsteiner and Klemens Breitfub, "Security in NFC", Workshop on RFID Security RFIDSec, 2006 |
14 | Gerhard P. Hancke, Markus G. kuhn, "An RFID Distance Bounding Protocol." Security and Privacy for Emerging Areas in Communications Networks, 2005. |
15 | Collin Mulliner, "Vnlnerability Analysis and Attack on NFC-enabled Mobile Phones", International Conference on Availability, Reliability and Security, 2009. |
16 | NFC Forum-TS-signature RTD-1.0, 2010-11-18 |
17 | C.H. Choi. "CPND ecosystem ICCT (Information, Communication, Contents Technology)." Journal of Digital Convergence. 12.3 (2014): 7-16. DOI |
18 | Seong-Hoon Lee, "Actual Cases and Analysis of IT Convergence for Green IT", Journal of the Korea Convergence Society, Vol. 6, No. 6, pp. 147-152, 2015. DOI |
19 | S.H. Won, and H.S. Yang. "Research and policy direction for the success of ICT-based company Fusion." Journal of Digital Convergence. 13.4 (2015): 39-50. DOI |
20 | J.H.Han, et al. "Effects of perceived usefulness and ease reliance on payment services and loyalty mall ." Journal of Digital Convergence 13.12 (2015): 75-87. DOI |
21 | Seong-Hoon Lee, Dong-Woo Lee, "FinTech- Conversions of Finance Industry based on ICT", Journal of the Korea Convergence Society, Vol. 6, No. 3, pp. 97-102, 2015. DOI |