Skip to main content

Exemplary Use-Cases

  • Chapter
  • First Online:
  • 1803 Accesses

Part of the book series: T-Labs Series in Telecommunication Services ((TLABS))

Abstract

This chapter introduces various practical use-case scenarios of Near Field Communication (NFC). These use-cases are then transformed into more general scenarios. Based on the generalized use-cases, security aspects of NFC applications are identified.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. carIT: Autos brauchen Schutz vor Hacker-Attacken. carIT Mobilität 3.0. http://www.car-it.com/secunet-infotainment-hacker-sicherheit/id-0012184 (2010)

  2. Ecma International: ECMA-385: NFC-SEC: NFCIP-1 Security Services and Protocol (2008)

    Google Scholar 

  3. Ecma International: ECMA-386: NFC-SEC-01: NFC-SEC cryptography standard using ECDH and AES (2008)

    Google Scholar 

  4. European Commission: Progress Report on the Single European Electronic Communications Market (15th Report). Commission Staff Working Document SEC (2010) 630 final (2010)

    Google Scholar 

  5. GlobalPlatform: Card specification. Version 2.2.1 (2011)

    Google Scholar 

  6. Grünweg, T.: Lernfähiger Routenplaner: Big Navi is watching you. http://www.spiegel.de/auto/aktuell/0,1518,608617,00.html. Spiegel Online (2009)

  7. GSMA: Mobile NFC services. Version 1.0. White paper (2007)

    Google Scholar 

  8. Hoppe, T., Kiltz, S., Dittmann, J.: Security Threats to Automotive CAN Networks—Practical Examples and Selected Short-Term Countermeasures. In: Computer Safety, Reliability, and Security. LNCS, vol. 5219/2008, pp. 235–248. Springer, Berlin Heidelberg (2008). doi:10.1007/978-3-540-87698-4_21

  9. International Organization for Standardization: ISO/IEC 13157: Information technology—Telecommunications and information exchange between systems—NFC Security (Parts 1–2) (2010)

    Google Scholar 

  10. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 447–462. IEEE, Oakland, CA, USA (2010). doi:10.1109/SP.2010.34

  11. Langer, J., Roland, M.: Anwendungen und Technik von Near Field Communication (NFC). Springer, Heidelberg (2010)

    Google Scholar 

  12. Larson, U.E., Nilsson, D.K.: Securing vehicles against cyber attacks. In: Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW ’08). ACM, Oak Ridge, TN, USA (2008). doi:10.1145/1413140.1413174

  13. NFC Forum: Connection Handover. Technical specification, version 1.1 (2008)

    Google Scholar 

  14. Roland, M., Langer, J., Bogner, M., Wiesinger, F.: NFC im Automobil: Software bringt Ökonomie und braucht Sicherheit. In: Höfler, L., Kastner, J., Kern, T., Zauner, G. (eds.) Energieeffiziente Mobilität, Informations- und Kommunikationstechnologie, pp. 112–119. Shaker, Aachen (2010)

    Google Scholar 

  15. Steffen, R., Preißinger, J., Schöllermann, T., Müller, A., Schnabel, I.: Near Field Communication (NFC) in an automotive environment. In: Proceedings of the Second International Workshop on Near Field Communication (NFC 2010), pp. 15–20. IEEE, Monaco (2010). doi:10.1109/NFC.2010.11

  16. Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Embed. Syst. 2007: 074706 (2007). doi:10.1155/2007/74706

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Roland .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Roland, M. (2015). Exemplary Use-Cases. In: Security Issues in Mobile NFC Devices. T-Labs Series in Telecommunication Services. Springer, Cham. https://doi.org/10.1007/978-3-319-15488-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15488-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15487-9

  • Online ISBN: 978-3-319-15488-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics