Abstract
This chapter introduces various practical use-case scenarios of Near Field Communication (NFC). These use-cases are then transformed into more general scenarios. Based on the generalized use-cases, security aspects of NFC applications are identified.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
carIT: Autos brauchen Schutz vor Hacker-Attacken. carIT Mobilität 3.0. http://www.car-it.com/secunet-infotainment-hacker-sicherheit/id-0012184 (2010)
Ecma International: ECMA-385: NFC-SEC: NFCIP-1 Security Services and Protocol (2008)
Ecma International: ECMA-386: NFC-SEC-01: NFC-SEC cryptography standard using ECDH and AES (2008)
European Commission: Progress Report on the Single European Electronic Communications Market (15th Report). Commission Staff Working Document SEC (2010) 630 final (2010)
GlobalPlatform: Card specification. Version 2.2.1 (2011)
Grünweg, T.: Lernfähiger Routenplaner: Big Navi is watching you. http://www.spiegel.de/auto/aktuell/0,1518,608617,00.html. Spiegel Online (2009)
GSMA: Mobile NFC services. Version 1.0. White paper (2007)
Hoppe, T., Kiltz, S., Dittmann, J.: Security Threats to Automotive CAN Networks—Practical Examples and Selected Short-Term Countermeasures. In: Computer Safety, Reliability, and Security. LNCS, vol. 5219/2008, pp. 235–248. Springer, Berlin Heidelberg (2008). doi:10.1007/978-3-540-87698-4_21
International Organization for Standardization: ISO/IEC 13157: Information technology—Telecommunications and information exchange between systems—NFC Security (Parts 1–2) (2010)
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 447–462. IEEE, Oakland, CA, USA (2010). doi:10.1109/SP.2010.34
Langer, J., Roland, M.: Anwendungen und Technik von Near Field Communication (NFC). Springer, Heidelberg (2010)
Larson, U.E., Nilsson, D.K.: Securing vehicles against cyber attacks. In: Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW ’08). ACM, Oak Ridge, TN, USA (2008). doi:10.1145/1413140.1413174
NFC Forum: Connection Handover. Technical specification, version 1.1 (2008)
Roland, M., Langer, J., Bogner, M., Wiesinger, F.: NFC im Automobil: Software bringt Ökonomie und braucht Sicherheit. In: Höfler, L., Kastner, J., Kern, T., Zauner, G. (eds.) Energieeffiziente Mobilität, Informations- und Kommunikationstechnologie, pp. 112–119. Shaker, Aachen (2010)
Steffen, R., Preißinger, J., Schöllermann, T., Müller, A., Schnabel, I.: Near Field Communication (NFC) in an automotive environment. In: Proceedings of the Second International Workshop on Near Field Communication (NFC 2010), pp. 15–20. IEEE, Monaco (2010). doi:10.1109/NFC.2010.11
Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Embed. Syst. 2007: 074706 (2007). doi:10.1155/2007/74706
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Roland, M. (2015). Exemplary Use-Cases. In: Security Issues in Mobile NFC Devices. T-Labs Series in Telecommunication Services. Springer, Cham. https://doi.org/10.1007/978-3-319-15488-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-15488-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15487-9
Online ISBN: 978-3-319-15488-6
eBook Packages: EngineeringEngineering (R0)