Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37C.2.140

Active Authentication Method using NFC  

Lee, Min-Gu (KT 종합기술원)
Kim, Dong-Wan (KT 종합기술원)
Sohn, Jin-Soo (KT 종합기술원)
Abstract
Since most of recently launched smart devices support NFC(Near Field Communication), RFID applications are tend to be replaced. For instance, previous RFID application areas such as entrance control, mobile e-ticket, electronic payment and et. al are subject to change using NFC. Due to the limitation of passive communication in RFID, it is impossible to cover all security requirements of authentication and authorization mechanism that wide areas of applications demand. Therefore authentication and authorization mechanism based on NFC is very attractive to such applications because active communication methods make it possible to be highly secure in authentication and authorization. In this paper, authors propose a new approach of secure authentication and authorization mechanism using NFC smart devices based on EAP(Extensible Authentication Protocol) and AAA(Authentication, Authorization and Accounting) protocols.
Keywords
NFC; Security; EAP; AAA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Florent Bersani and Hannes Tschofenig, "The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method", RFC 4764, http://ietf.org/rfc/rfc4764.txt
2 Wei-Dar Chen, Mayes, K.E, Yuan-Hung Lien and Jung-Hui Chiu, "NFC Mobile Payment with Citizen Digital Certificate", The 2nd International Conference on Next Generation Information Technology (ICNIT), Jun. 21-23, Gyeongju, Korea, 2011
3 Wei-Dar Chen, Mayes, K.E, Yuan-Hung Lien and Jung-Hui Chiu, "NFC Mobile Transactions and Authentication based on GSM Network", The 2nd International Workshop on Near Field Communication, Apr. 20-20, Monaco, 2010
4 Wei-Dar Chen, Mayes, K.E, Yuan-Hung Lien and Jung-Hui Chiu, "Using 3G Network Components to Enable NFC Mobile Transactions and Authentication", 2010 IEEE International Conference on Progress Informatics and Computing (PIC), Dec. 10-12, Sanghai, China, 2010
5 이민구, 김동완, 손진수, "시간제 차량 임대 사업과 NFC 활용", R&D Horizon, Vol. 25, No. 2, Jun. 2011
6 Nakhjiri and Nakhjiri, AAA and Network Security for Mobile Access, Wiley, 2005
7 Carl Rigney, Allan C. Rubens, William Allen Simpson and Steve Willens, "Remote Authentication Dial In User Service (RADIUS)", RFC 2865, http://ietf.org/rfc/rfc2865.txt
8 Pat R. Calhoun, John Loughney, Jari Arkko, Erik Guttman and Glen Zorn, "Diameter Base Protocol", RFC 3588, http://ietf.org/rfc/rfc3588.txt
9 Bernard Aboba, Larry J. Blunk, John R. Vollbrecht, James Carlon and Henrik Levkowetz, "Extensible Authentication Protocol(EAP)", RFC 3748, http://ietf.org/rfc/rfc3748.txt
10 Jari Arkko and Henry Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)", RFC 4187, http://ietf.org/rfc/rfc4187.txt
11 Bernard Aboba and Dan Simon, "PPP EAP TLS Authentication Protocol", RFC 2716, http://ietf.org/rfc/rfc2716.txt
12 Paul Funk and Simon Blake-Wilson, "Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)", RFC 5281, http://ietf.org/rfc/rfc5281.txt
13 Joan Daemen and Vincent Rijmen, "The Design of Rijndael: AES-The Advanced Encryption Standard." Springer, 2002. ISBN 3-540-42580-2
14 Pablo Holman, "How to hack RFID-enabled Credit Cards for $8", BoingBoingTV, http://www.youtube.com/watch?v=vmajlKJlT3U
15 NXP Semiconductor, MIFARE Classic - a pioneer and front runner in contactless smart card ICs, http://www.nxp.com/products/identification_and_security/smart_card_ics/mifare_smart_card_ics/mifare_classic/
16 Gerhard P. Hancke, "A practical relay attack on ISO/IEC 14443 proximity cards", Project Report, 2005년 1월
17 Dan Balaban, "Tansport for London to Discard Mifare classic", NFC times, Jan. 21, 2010, http://www.nfctimes.com/news/transport-london-discard-mifare-classic-seeks-desfire-sims
18 Thomas Ricker, "Duch RFID e-passport cracked-US next?" Engadget, 2006년 2월 23일, http://www.engadget.com/2006/02/03/dutch-rfid-e-passport-cracked-us-next/
19 길민권, "해킹 시연 'RFID 적용 탄약고.물류센터 등 해킹에 무방비'," 보안뉴스, 2007년 5월 22일, http://www.boannews.com/media/view.asp?idx=6226&kind=2
20 T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. O'Hare. "Vulnerabilities in first-generation RFID-enabled credit cards". In Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, Lecture Notes in Computer Science, Vol. 4886, pages 2-14, Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007.
21 양진비, "전자여권, 10분이면 감쪽같이 '해킹'", 프레시안, 2008년 9월 29일, http://www.pressian.com/article/article.asp?articlenum=60080929141547&Section=
22 Hsu-Chen Cheng, Wen-Wei Liao, Tian-Yow Chi and Siao-Yun Wei, "A secure and practical key management mechanism for NFC read-write mode", The 13th International Conference on Advanced Communication Technology(ICACT), Feb. 13-16, 2011, Seoul, Korea, 2011
23 Sandeep Tamrakar, Jan-Erik Ekberg and N. Asokan, "Identity Verification Schemes for Public Transport Ticketing with NFC Pohones", Proceedings of the sixth ACM workshop on Scalable trusted computing, OCT. 17-21, Chicago, USA, 2011
24 이유지, "KT텔레캅, NFC 적용한 출입통제시 스템 개발", 디지털 데일리, 2011년 5월 24일, http://www.kttelecop.co.kr/jsp/board/board.jsp?sa=ci&bid=8&pg=2&no=5181
25 NFC Forum, "What is NFC?", http://www.nfc-forum.org/aboutnfc/
26 Zigbee Alliance, "Understanding ZigBee", http://www.zigbee.org/About/UnderstandingZigBee.aspx
27 Bluetooth Special Interest Group, "Bluetooth Basics", http://www.bluetooth.com/Pages/Basics.aspx
28 Darren Murphy, "Charge Anywhere update turns Nexus S into full-on mobile payment terminal", Engadget, 2011년 3월 25일, http://www.engadget.com/2011/03/25/charge-anywhere-update-turns-nexus-s-into-full-on-mobile-payment/
29 ISO/IEC 14443, Identification cards-Contractless integrated circuit cards-Proximity cards, ISO, Geneva, Switzerland, 2008
30 Ernst Haselsteiner and Klemens Breitfuss, "Security in near field communication (NFC)," Philips Semiconductors Workshop on RFID Security(RFIDSec 06), July 2006
31 ECMA International, "NFC-SEC NFCIP-1 Security Services and Protocol, Cryptography Standard using ECDH and AES", Ecma/TC47/2008/089, http://www.ecmainternational.org/activities/Communications/tc47-2008-089.pdf
32 Brian Lloyd and William Allen Simpson, "PPP Authentication Protocols", RFC 1334, http://ietf.org/rfc/rfc1334.txt