Browse > Article

NFC 기반 모바일 서비스 보안 위협 및 대책  

Baek, Jonghyun (한국인터넷진흥원)
Youm, HeungYoul (순천향대학교 정보보호학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Housley, T. Polk, W. Ford, and D Solo, "RFC3280 : Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL) Profile, IETF, 2002.
2 NFC 개인정보보호 대책 연구, KISA. 2011.
3 ISO/IEC 18092:2004 Near Field Communication Interface and Protocol(NFCIP-1), ISO/IEC, 2004.
4 ECMA-340 : Near Field Communication Interface and Protocol(NFCIP-1) 2nd Edition, ECMA, 2004.
5 백종현, "NFC 기반 시범서비스 추진 현황", TTA NFC 표준기술전략 세미나, 2011.
6 ISO/IEC 21481:2005 Near Field Communication Interface and Protocol-2 (NFCIP-2), ISO/IEC, 2005.
7 ECMA-352 : Near Field Communication Interface and Protocol-2(NFCIP-2), ECMA, 2005.
8 ECMA-385 : NFC-SEC : NFCIP-1 Security Services and Protocol 2nd Edition, ECMA, 2010.
9 ECMA-386 : NFC-SEC-01 : NEC-SEC Cryptography Standard using ECDH and AES 2nd Edition, ECMA, 2010.
10 NFC Signature Record Type Definition, NFC Forum Technical Specification, 2010.
11 NFC Data Exchange Format(NDEF), NFC Forum Technical Specification, 2006.
12 NFC Forum Tag Type Tag Operation Specification, NFC Forum Technical Specification, 2007.
13 NFC Record Type Definition(RTD), NFC Forum Technical Specification, 2006.
14 NFC Logical Link Control Protocol(LLCP) 1.1, NFC Forum Technical Specification, 2011.
15 NFC Simple NDEF Exchange Protocol(SNEP), NFC Forum Technical Specification, 2011.
16 M.Weib, "Performing Relay Attacks on ISO 14443 Contactless Smart Cards using NFC Mobile Equipment," Masters Thesis in Computer Science, 2010.
17 Lishoy Francis, Gerhard Hancke, K. M., "Practical NFC Peer to peer Relay Attack using Mobile Phones," Workshop on RFID Security- RFIDSec'10, 2010.
18 E. Haselsteiner, K. Breitfub, "Security in Near Field Communication(NFC), Workshop on RFID Security RFIDSec, 2006.
19 M. Roland, J. Langer, J. Scharinger, "Security Vulnerabilities of the NDEF Signature Record Type," Third International Workshop on NFC, 2011.
20 M. Q. Saeed, Colin D. Walter, "A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition, 6th International Conference on Internet Technology and Secured Transactions, 2011.
21 C. Mulliner, "Vuluerability Analysis and Attacks on NFC-enabled Mobile Phones," International Conference on Availability, Reliability and Security, 2009.
22 M.Kilas, "Digital Signatures on NFC tags, Masters of Science Thesis, 2009.
23 T. Rosati, G. Zaverucha, "Elliptic Curve Certificates and signatures for NFC Signature Records, RIM, Certicom Reseatch, 2011.