Utilizing NFC to secure identification

@article{Gripentog2015UtilizingNT,
  title={Utilizing NFC to secure identification},
  author={Robert Gripentog and Yoohwan Kim},
  journal={2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)},
  year={2015},
  pages={101-105}
}
He Near Field Communication(NFC) protocol was standardized by the International Organization for Standards in 2003. As a result the use of NFC as a communication conduit has grown, is popular with several applications and becoming the standard in many cases. However, the protocol for NFC does not include security measures and can result in data being compromised. Consequently, different methods of securing NFC data have been developed when applied to door security, and payment transaction… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

NFC — Vulnerabilities and defense

  • 2014 Conference on Information Assurance and Cyber Security (CIACS)
  • 2014
VIEW 2 EXCERPTS

Security analysis of NFC relay attacks using probabilistic model checking

  • 2014 International Wireless Communications and Mobile Computing Conference (IWCMC)
  • 2014
VIEW 1 EXCERPT

Texas instruments - nfc active and passive peer-to-peer communication using the trf7970A

Erick Macias, Josh Wyatt
  • Application Report,
  • 2014
VIEW 2 EXCERPTS

Challenges of managing secure elements within the NFC ecosystem

  • 2012 International Conference for Internet Technology and Secured Transactions
  • 2012

NFC Devices: Security and Privacy

  • 2008 Third International Conference on Availability, Reliability and Security
  • 2008
VIEW 2 EXCERPTS

Similar Papers

Loading similar papers…