Security Issues in Mobile NFC Devices pp 33-45 | Cite as
Exemplary Use-Cases
Chapter
First Online:
Abstract
This chapter introduces various practical use-case scenarios of Near Field Communication (NFC). These use-cases are then transformed into more general scenarios. Based on the generalized use-cases, security aspects of NFC applications are identified.
Keywords
Mobile Phone Shared Secret Near Field Communication Secure Element Integrity Protection
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
- 1.carIT: Autos brauchen Schutz vor Hacker-Attacken. carIT Mobilität 3.0. http://www.car-it.com/secunet-infotainment-hacker-sicherheit/id-0012184 (2010)
- 2.Ecma International: ECMA-385: NFC-SEC: NFCIP-1 Security Services and Protocol (2008)Google Scholar
- 3.Ecma International: ECMA-386: NFC-SEC-01: NFC-SEC cryptography standard using ECDH and AES (2008)Google Scholar
- 4.European Commission: Progress Report on the Single European Electronic Communications Market (15th Report). Commission Staff Working Document SEC (2010) 630 final (2010)Google Scholar
- 5.GlobalPlatform: Card specification. Version 2.2.1 (2011)Google Scholar
- 6.Grünweg, T.: Lernfähiger Routenplaner: Big Navi is watching you. http://www.spiegel.de/auto/aktuell/0,1518,608617,00.html. Spiegel Online (2009)
- 7.GSMA: Mobile NFC services. Version 1.0. White paper (2007)Google Scholar
- 8.Hoppe, T., Kiltz, S., Dittmann, J.: Security Threats to Automotive CAN Networks—Practical Examples and Selected Short-Term Countermeasures. In: Computer Safety, Reliability, and Security. LNCS, vol. 5219/2008, pp. 235–248. Springer, Berlin Heidelberg (2008). doi: 10.1007/978-3-540-87698-4_21
- 9.International Organization for Standardization: ISO/IEC 13157: Information technology—Telecommunications and information exchange between systems—NFC Security (Parts 1–2) (2010)Google Scholar
- 10.Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 447–462. IEEE, Oakland, CA, USA (2010). doi: 10.1109/SP.2010.34
- 11.Langer, J., Roland, M.: Anwendungen und Technik von Near Field Communication (NFC). Springer, Heidelberg (2010)Google Scholar
- 12.Larson, U.E., Nilsson, D.K.: Securing vehicles against cyber attacks. In: Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW ’08). ACM, Oak Ridge, TN, USA (2008). doi: 10.1145/1413140.1413174
- 13.NFC Forum: Connection Handover. Technical specification, version 1.1 (2008)Google Scholar
- 14.Roland, M., Langer, J., Bogner, M., Wiesinger, F.: NFC im Automobil: Software bringt Ökonomie und braucht Sicherheit. In: Höfler, L., Kastner, J., Kern, T., Zauner, G. (eds.) Energieeffiziente Mobilität, Informations- und Kommunikationstechnologie, pp. 112–119. Shaker, Aachen (2010)Google Scholar
- 15.Steffen, R., Preißinger, J., Schöllermann, T., Müller, A., Schnabel, I.: Near Field Communication (NFC) in an automotive environment. In: Proceedings of the Second International Workshop on Near Field Communication (NFC 2010), pp. 15–20. IEEE, Monaco (2010). doi: 10.1109/NFC.2010.11
- 16.Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Embed. Syst. 2007: 074706 (2007). doi: 10.1155/2007/74706
Copyright information
© Springer International Publishing Switzerland 2015