DSpace Repository

Getting into the middle of near field communication

Show simple item record

dc.contributor.advisor Al Islam, Dr. A. B. M. Alim
dc.contributor.author Akter, Sajeda
dc.date.accessioned 2018-07-31T09:40:55Z
dc.date.available 2018-07-31T09:40:55Z
dc.date.issued 2018-05-05
dc.identifier.uri http://lib.buet.ac.bd:8080/xmlui/handle/123456789/4949
dc.description.abstract A recent development emanating from the widely used RFID technology is Near Field Com-munication (NFC). Basically, NFC is a popular short range (<10 cm) wireless communica-tion technology with applications in areas sensitive to security and privacy concerns including contactless payment. Since NFC communications require very close proximity between two communicating devices (for example, a smartcard and a reader), it is generally believed that Man-in-the-Middle (MITM) attacks are practically infeasible here. On the contrary to this general belief, in this research, we successfully establish MITM attack in NFC communica-tions between a passive tag and an active reader. Here, we present physical fundamentals of the attack, our engineering design, and results of our successful implementation. We identify a potential vulnerability in existing contactless payment protocol due to separation between card authentication and transaction authorization phases. Exploiting this vulnerability an at-tacker is able to conduct transaction interchangeably using original and malicious card. Here, we present practical impacts of the attack from the perspective of how a malicious user can leverage our MITM attack to compromise integrity of contactless payment transactions. We elaborate the complete mechanism of the attack and describe pragmatic attack scenarios to accomplish the practical feasibility of the MITM attack over NFC communication. Through describing di erent pragmatic attack scenarios, we clarify the bene ciary and loser of this at-tack. After successfully establishing the attack, we perform rigorous experimental analysis to reveal di erent aspects of this attack. Finally, we propose a countermeasure to combat the MITM attack based on our experimental analysis. Our proposed countermeasure does not demand any additional hardware to be integrated with the existing system. We evaluate per-formance of our proposed countermeasure for defending the attack and demonstrate its e cacy in defending the MITM attack. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering en_US
dc.subject Radio frequency identification systems en_US
dc.title Getting into the middle of near field communication en_US
dc.type Thesis-MSc en_US
dc.contributor.id 1014052052 P en_US
dc.identifier.accessionNumber 116191
dc.contributor.callno 681.202/SAJ/2018 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BUET IR


Advanced Search

Browse

My Account