A Security-Aware Near Field Communication Architecture

被引:0
|
作者
Asaduzzaman, A. [1 ]
Mazumder, S. [1 ]
Salinas, S. [1 ]
Mridha, Muhammad F. [2 ]
机构
[1] Wichita State Univ, EECS Dept, Wichita, KS 67260 USA
[2] Univ Asia Pacific, CSE Dept, Dhaka, Bangladesh
关键词
Near field communication; Networking attacks; NFC architecture; NFC Data Exchange Format; System security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the popularity of the Near Field Communication (NFC) applications, NFC technology is being adopted by a wide variety of devices suitable for the Internet of things (IoT). However, NFC is vulnerable to numerous networking attacks such as tag manipulation. In this paper, a security-aware architecture is introduced to protect the NFC devices and associated data from several attacks. The proposed NFC system has a secure protocol, connected to the NFC chip. The NFC Data Exchange Format (NDEF) message is enriched with a certificate record. The proposed NFC system checks the authenticity of the sender first; then if appropriate, processes the incoming NDEF messages and stores them in device memory. The proposed NFC system is simulated using MATLAB. Simulation results suggest that the proposed protocol offers better security by detecting certificate modification, message modification, etc. It is also observed that the processing time remains almost the same for various record sizes and the processing time slightly increases as the certificate size increases. Therefore, the proposed NFC architecture has potential to be used in IoT devices.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 50 条
  • [1] An Advanced Security-Aware Cloud Architecture
    Bobelin, Laurent
    Bousquet, Aline
    Briffaut, Jeremy
    Couturier, Jean-Francois
    Toinard, Christian
    Caron, Eddy
    Lefray, Arnaud
    Rouzaud-Cornabas, Jonathan
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 572 - 579
  • [2] Security-Aware Multi-User Architecture for IoT
    Birgersson, Marcus
    Artho, Cyrille
    Balliu, Musard
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 102 - 113
  • [3] A Security-aware Software-defined IoT Network Architecture
    Zuo, Xinbin
    Pang, Xue
    Zhang, Pengping
    Zhang, Junsan
    Dong, Tao
    Zhang, Peiying
    2020 IEEE COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2021,
  • [4] Security-aware program transformations
    Bartoletti, M
    Degano, P
    Ferrari, GL
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2003, 2841 : 355 - 368
  • [5] Composing security-aware software
    Khan, KM
    Han, J
    IEEE SOFTWARE, 2002, 19 (01) : 34 - +
  • [6] On security-aware transmission scheduling
    He, Ting
    Agaskar, Ameya
    Tong, Lang
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1681 - +
  • [7] Security-Aware and Privacy-Preserving Communication in the Internet of Things: A Review
    Priya, J.
    Gunasekaran, M.
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 225 - 230
  • [8] Deadline-constrained security-aware workflow scheduling in hybrid cloud architecture
    Abdi, Somayeh
    Ashjaei, Mohammad
    Mubeen, Saad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [9] Security-aware Virtual Network Embedding
    Liu, Shuhao
    Cai, Zhiping
    Xu, Hong
    Xu, Ming
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 834 - 840
  • [10] Optimal Security-Aware Query Processing
    Guarnieri, Marco
    Basin, David
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (12): : 1307 - 1318