Advertisement

e & i Elektrotechnik und Informationstechnik

, Volume 130, Issue 7, pp 201–206 | Cite as

Comparison of the usability and security of NFC’s different operating modes in mobile devices

  • Michael RolandEmail author
  • Josef Langer
Originalarbeiten

Abstract

This paper highlights the benefits and drawbacks of NFC’s different operating modes with regard to their usability and security. Based on an analysis of both traditional and new communication concepts for mobile NFC devices, their current availability and, specifically, the features to provide security are evaluated. The result of this evaluation is a comparison between the availability, the usability and the security of NFC’s different operating modes.

Keywords

near field communication mobile phone operating modes security availability 

Vergleich der Benutzbarkeit und Sicherheit der unterschiedlichen Betriebsmodi von NFC in Mobiltelefonen

Zusammenfassung

Dieser Artikel zeigt die Vor- und Nachteile der unterschiedlichen Betriebsmodi von NFC in Bezug auf deren Benutzbarkeit und Sicherheit auf. Ausgehend von einer Analyse herkömmlicher und neuer Kommunikationskonzepte für mobile NFC-Geräte werden deren derzeitige Verfügbarkeit sowie deren aktuelle Sicherheitsfunktionen evaluiert. Das Ergebnis dieser Evaluierung ist ein Vergleich zwischen der Verfügbarkeit, der Benutzbarkeit und der Sicherheit der unterschiedlichen Betriebsmodi von NFC.

Schlüsselwörter

Near Field Communication Mobiltelefon Betriebsmodi Sicherheit Verfügbarkeit 

Notes

Acknowledgements

This work is part of the project “High Speed RFID” within the EU program “Regionale Wettbewerbsfähigkeit OÖ 2007–2013 (Regio 13)” funded by the European regional development fund (ERDF) and the Province of Upper Austria (Land Oberösterreich).

Moreover, this work has been carried out in cooperation with “u’smile”, the Josef Ressel Center for User-Friendly Secure Mobile Environments, funded by the Christian Doppler Gesellschaft, A1 Telekom Austria AG, Drei-Banken-EDV GmbH, LG Nexera Business Solutions AG, and NXP Semiconductors Austria GmbH.

References

  1. 1.
    Benninger, C. (2012): Google wallet—last four digits revealed to malware vulnerability. Intrepidus Group Insight, 20 April 2012. Google Scholar
  2. 2.
    Clark, S. (2011): RIM releases BlackBerry NFC APIs. NFC World, 31 May 2011. Google Scholar
  3. 3.
    Francis, L., Hancke, G. P., Mayes, K. E., Markantonakis, K. (2011): Practical relay attack on contactless transactions by using NFC mobile phones. Cryptology ePrint archive, report 2011/618. Google Scholar
  4. 4.
    Höbarth, S., Mayrhofer, R. (2011): A framework for on-device privilege escalation exploit execution on Android. In 3rd intl. workshop on security and privacy in spontaneous interaction and mobile phone use, San Francisco, CA, USA. Google Scholar
  5. 5.
    Hoog, A. (2011): Forensic security analysis of Google wallet. viaForensics Mobile security blog, 12 December 2011. Google Scholar
  6. 6.
    Jakl, A., Roland, M. (2013): Near field communication (NFC) developer comparison. http://www.nfcinteractor.com/.
  7. 7.
    Langer, J., Roland, M. (2010): Anwendungen und Technik von Near Field Communication (NFC). Berlin: Springer. CrossRefGoogle Scholar
  8. 8.
    Lotito, A., Mazzocchi, D. (2013): OPEN-SNEP project: enabling P2P over NFC using NPP and SNEP. In 5th intl. workshop on near field communication (NFC 2013), Zurich: IEEE. Google Scholar
  9. 9.
    RIM (2011): Blackberry API 7.0.0: Package net.rim.device.api.io.nfc.emulation. Google Scholar
  10. 10.
    Roland, M. (2012): Software card emulation in NFC-enabled mobile phones: great advantage or security nightmare? In 4th intl. workshop on security and privacy in spontaneous interaction and mobile phone use, Newcastle, UK. Google Scholar
  11. 11.
    Roland, M. (2013): Security issues in mobile NFC devices. Ph.D. thesis, Johannes Kepler University Linz, Department of Computational Perception, Linz, Austria. Google Scholar
  12. 12.
    Roland, M., Langer, J., Scharinger, J. (2011): Security vulnerabilities of the NDEF signature record type. In 3rd intl. workshop on near field communication (NFC 2011) (pp. 65–70). Hagenberg, Austria: IEEE. CrossRefGoogle Scholar
  13. 13.
    Roland, M., Langer, J., Scharinger, J. (2012): Relay attacks on secure element-enabled mobile devices: virtual pickpocketing revisited. In Information security and privacy research, IFIP AICT, Heraklion, Creete, Greece (Vol. 376/2012, pp. 1–12). Berlin: Springer. CrossRefGoogle Scholar
  14. 14.
    Roland, M., Langer, J., Scharinger, J. (2013): Applying relay attacks to Google wallet. In: 5th intl. workshop on near field communication (NFC 2013). Zurich: IEEE. Google Scholar
  15. 15.
    Rubin, J. (2012): Google wallet security: PIN exposure vulnerability. zveloBLOG, 8 Feb 2012. Google Scholar
  16. 16.
    Saminger, C., Grünberger, S., Langer, J. (2013): An NFC ticketing system with a new approach of an inverse reader mode. In 5th intl. workshop on near field communication (NFC 2013), Zurich: IEEE. Google Scholar
  17. 17.
    Urien, P. (2013): LLCPS: a new security framework based on TLS for NFC P2P applications in the Internet of things. In Proceedings of the IEEE consumer communications and networking conference (CCNC 2013) (pp. 845–846). Las Vegas: IEEE. CrossRefGoogle Scholar
  18. 18.
    Yeager, D. (2012): Added NFC reader support for two new tag types: ISO PCD type A and ISO PCD type B. Commit to the CyanogenMod GIT source code repository, 20 January 2012. Google Scholar

Copyright information

© Springer Verlag Wien 2013

Authors and Affiliations

  1. 1.NFC Research Lab HagenbergUniversity of Applied Sciences Upper AustriaHagenbergAustria

Personalised recommendations