A Security-Aware Near Field Communication Architecture

被引:0
|
作者
Asaduzzaman, A. [1 ]
Mazumder, S. [1 ]
Salinas, S. [1 ]
Mridha, Muhammad F. [2 ]
机构
[1] Wichita State Univ, EECS Dept, Wichita, KS 67260 USA
[2] Univ Asia Pacific, CSE Dept, Dhaka, Bangladesh
关键词
Near field communication; Networking attacks; NFC architecture; NFC Data Exchange Format; System security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the popularity of the Near Field Communication (NFC) applications, NFC technology is being adopted by a wide variety of devices suitable for the Internet of things (IoT). However, NFC is vulnerable to numerous networking attacks such as tag manipulation. In this paper, a security-aware architecture is introduced to protect the NFC devices and associated data from several attacks. The proposed NFC system has a secure protocol, connected to the NFC chip. The NFC Data Exchange Format (NDEF) message is enriched with a certificate record. The proposed NFC system checks the authenticity of the sender first; then if appropriate, processes the incoming NDEF messages and stores them in device memory. The proposed NFC system is simulated using MATLAB. Simulation results suggest that the proposed protocol offers better security by detecting certificate modification, message modification, etc. It is also observed that the processing time remains almost the same for various record sizes and the processing time slightly increases as the certificate size increases. Therefore, the proposed NFC architecture has potential to be used in IoT devices.
引用
收藏
页码:33 / 38
页数:6
相关论文
共 50 条
  • [21] Towards Security-aware Mutation Testing
    Loise, Thomas
    Devroey, Xavier
    Perrouin, Gilles
    Papadakis, Mike
    Heymans, Patrick
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 97 - 102
  • [22] Sechduler: A Security-Aware Kernel Scheduler
    Zonouz, Saman
    Han, Rui
    Haghani, Parisa
    2013 IEEE 19TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2013), 2013, : 236 - 245
  • [23] Designing Security-Aware Incentives for Computation Offloading via Device-to-Device Communication
    Xu, Jie
    Chen, Lixing
    Liu, Kun
    Shen, Cong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (09) : 6053 - 6066
  • [24] Security-aware dual-hop communication for amplify-and-forward relay networks
    Ding, Fei
    Sun, Xiaojun
    Ding, Xiaojin
    Su, Ruoyu
    Zhang, Dengyin
    Zhu, Hongbo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (09)
  • [25] Security-Aware Beacon Based Network Monitoring
    Sasaki, Masahiro
    Zhao, Liang
    Nagamochi, Hiroshi
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 527 - 531
  • [26] Reusable components for developing security-aware applications
    Probst, S
    Essmayr, W
    Weippl, E
    18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 239 - 248
  • [27] Towards security-aware virtual network embedding
    Liu, Shuhao
    Cai, Zhiping
    Xu, Hong
    Xu, Ming
    COMPUTER NETWORKS, 2015, 91 : 151 - 163
  • [28] Security-Aware Approximate Spiking Neural Networks
    Ahmad, Syed Tihaam
    Siddique, Ayesha
    Hoque, Khaza Anuarul
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [29] Composable mediation for security-aware mobile services
    Tarkoma, Sasu
    Prehofer, Christian
    Sovio, Sampo
    Laitinen, Pekka
    IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (07) : 58 - 65
  • [30] Security-aware scheduling model for computational grid
    Kashyap, Rekha
    Vidyarthi, Deo Prakash
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (12): : 1377 - 1391