Skip to main content
Erschienen in: e & i Elektrotechnik und Informationstechnik 7/2013

01.11.2013 | Originalarbeiten

Comparison of the usability and security of NFC’s different operating modes in mobile devices

verfasst von: Michael Roland, Josef Langer

Erschienen in: e+i Elektrotechnik und Informationstechnik | Ausgabe 7/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper highlights the benefits and drawbacks of NFC’s different operating modes with regard to their usability and security. Based on an analysis of both traditional and new communication concepts for mobile NFC devices, their current availability and, specifically, the features to provide security are evaluated. The result of this evaluation is a comparison between the availability, the usability and the security of NFC’s different operating modes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Benninger, C. (2012): Google wallet—last four digits revealed to malware vulnerability. Intrepidus Group Insight, 20 April 2012. Benninger, C. (2012): Google wallet—last four digits revealed to malware vulnerability. Intrepidus Group Insight, 20 April 2012.
2.
Zurück zum Zitat Clark, S. (2011): RIM releases BlackBerry NFC APIs. NFC World, 31 May 2011. Clark, S. (2011): RIM releases BlackBerry NFC APIs. NFC World, 31 May 2011.
3.
Zurück zum Zitat Francis, L., Hancke, G. P., Mayes, K. E., Markantonakis, K. (2011): Practical relay attack on contactless transactions by using NFC mobile phones. Cryptology ePrint archive, report 2011/618. Francis, L., Hancke, G. P., Mayes, K. E., Markantonakis, K. (2011): Practical relay attack on contactless transactions by using NFC mobile phones. Cryptology ePrint archive, report 2011/618.
4.
Zurück zum Zitat Höbarth, S., Mayrhofer, R. (2011): A framework for on-device privilege escalation exploit execution on Android. In 3rd intl. workshop on security and privacy in spontaneous interaction and mobile phone use, San Francisco, CA, USA. Höbarth, S., Mayrhofer, R. (2011): A framework for on-device privilege escalation exploit execution on Android. In 3rd intl. workshop on security and privacy in spontaneous interaction and mobile phone use, San Francisco, CA, USA.
5.
Zurück zum Zitat Hoog, A. (2011): Forensic security analysis of Google wallet. viaForensics Mobile security blog, 12 December 2011. Hoog, A. (2011): Forensic security analysis of Google wallet. viaForensics Mobile security blog, 12 December 2011.
7.
Zurück zum Zitat Langer, J., Roland, M. (2010): Anwendungen und Technik von Near Field Communication (NFC). Berlin: Springer. CrossRef Langer, J., Roland, M. (2010): Anwendungen und Technik von Near Field Communication (NFC). Berlin: Springer. CrossRef
8.
Zurück zum Zitat Lotito, A., Mazzocchi, D. (2013): OPEN-SNEP project: enabling P2P over NFC using NPP and SNEP. In 5th intl. workshop on near field communication (NFC 2013), Zurich: IEEE. Lotito, A., Mazzocchi, D. (2013): OPEN-SNEP project: enabling P2P over NFC using NPP and SNEP. In 5th intl. workshop on near field communication (NFC 2013), Zurich: IEEE.
9.
Zurück zum Zitat RIM (2011): Blackberry API 7.0.0: Package net.rim.device.api.io.nfc.emulation. RIM (2011): Blackberry API 7.0.0: Package net.rim.device.api.io.nfc.emulation.
10.
Zurück zum Zitat Roland, M. (2012): Software card emulation in NFC-enabled mobile phones: great advantage or security nightmare? In 4th intl. workshop on security and privacy in spontaneous interaction and mobile phone use, Newcastle, UK. Roland, M. (2012): Software card emulation in NFC-enabled mobile phones: great advantage or security nightmare? In 4th intl. workshop on security and privacy in spontaneous interaction and mobile phone use, Newcastle, UK.
11.
Zurück zum Zitat Roland, M. (2013): Security issues in mobile NFC devices. Ph.D. thesis, Johannes Kepler University Linz, Department of Computational Perception, Linz, Austria. Roland, M. (2013): Security issues in mobile NFC devices. Ph.D. thesis, Johannes Kepler University Linz, Department of Computational Perception, Linz, Austria.
12.
Zurück zum Zitat Roland, M., Langer, J., Scharinger, J. (2011): Security vulnerabilities of the NDEF signature record type. In 3rd intl. workshop on near field communication (NFC 2011) (pp. 65–70). Hagenberg, Austria: IEEE. CrossRef Roland, M., Langer, J., Scharinger, J. (2011): Security vulnerabilities of the NDEF signature record type. In 3rd intl. workshop on near field communication (NFC 2011) (pp. 65–70). Hagenberg, Austria: IEEE. CrossRef
13.
Zurück zum Zitat Roland, M., Langer, J., Scharinger, J. (2012): Relay attacks on secure element-enabled mobile devices: virtual pickpocketing revisited. In Information security and privacy research, IFIP AICT, Heraklion, Creete, Greece (Vol. 376/2012, pp. 1–12). Berlin: Springer. CrossRef Roland, M., Langer, J., Scharinger, J. (2012): Relay attacks on secure element-enabled mobile devices: virtual pickpocketing revisited. In Information security and privacy research, IFIP AICT, Heraklion, Creete, Greece (Vol. 376/2012, pp. 1–12). Berlin: Springer. CrossRef
14.
Zurück zum Zitat Roland, M., Langer, J., Scharinger, J. (2013): Applying relay attacks to Google wallet. In: 5th intl. workshop on near field communication (NFC 2013). Zurich: IEEE. Roland, M., Langer, J., Scharinger, J. (2013): Applying relay attacks to Google wallet. In: 5th intl. workshop on near field communication (NFC 2013). Zurich: IEEE.
15.
Zurück zum Zitat Rubin, J. (2012): Google wallet security: PIN exposure vulnerability. zveloBLOG, 8 Feb 2012. Rubin, J. (2012): Google wallet security: PIN exposure vulnerability. zveloBLOG, 8 Feb 2012.
16.
Zurück zum Zitat Saminger, C., Grünberger, S., Langer, J. (2013): An NFC ticketing system with a new approach of an inverse reader mode. In 5th intl. workshop on near field communication (NFC 2013), Zurich: IEEE. Saminger, C., Grünberger, S., Langer, J. (2013): An NFC ticketing system with a new approach of an inverse reader mode. In 5th intl. workshop on near field communication (NFC 2013), Zurich: IEEE.
17.
Zurück zum Zitat Urien, P. (2013): LLCPS: a new security framework based on TLS for NFC P2P applications in the Internet of things. In Proceedings of the IEEE consumer communications and networking conference (CCNC 2013) (pp. 845–846). Las Vegas: IEEE. CrossRef Urien, P. (2013): LLCPS: a new security framework based on TLS for NFC P2P applications in the Internet of things. In Proceedings of the IEEE consumer communications and networking conference (CCNC 2013) (pp. 845–846). Las Vegas: IEEE. CrossRef
18.
Zurück zum Zitat Yeager, D. (2012): Added NFC reader support for two new tag types: ISO PCD type A and ISO PCD type B. Commit to the CyanogenMod GIT source code repository, 20 January 2012. Yeager, D. (2012): Added NFC reader support for two new tag types: ISO PCD type A and ISO PCD type B. Commit to the CyanogenMod GIT source code repository, 20 January 2012.
Metadaten
Titel
Comparison of the usability and security of NFC’s different operating modes in mobile devices
verfasst von
Michael Roland
Josef Langer
Publikationsdatum
01.11.2013
Verlag
Springer Vienna
Erschienen in
e+i Elektrotechnik und Informationstechnik / Ausgabe 7/2013
Print ISSN: 0932-383X
Elektronische ISSN: 1613-7620
DOI
https://doi.org/10.1007/s00502-013-0157-x

Weitere Artikel der Ausgabe 7/2013

e & i Elektrotechnik und Informationstechnik 7/2013 Zur Ausgabe