Abstract
In this paper we present the advantages and possibilities of a modular test platform for the evaluation of security protocols in NFC applications. Furthermore, we also depict some practical implementation results of this modular system. The scope of the platform is to provide a highly modular system. Adding or removing certain functionality can be done without the need of rebuilding the entire system. Security measures in hardware as well as software can be tested and evaluated with this platform. It can serve as a basis for a broad range of security related applications, NFC being our domain of interest, but even so in other domains.
Chapter PDF
Similar content being viewed by others
References
Madlmayr, G., Langer, J., Scharinger, J.: Managing an NFC Ecosystem, In: 7th International Conference on Mobile Business, ICMB 2008, pp.95–101 (2008)
Van Damme, G., Wouters, K., Karahan, H., Preneel, B.: Offline NFC Payments with Electronic Vouchers. In: Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds (MobiHeld 2009), 6 pages. ACM, New York (2009)
Juntunen, A., Luukkainen, S., Tuunainen, V.K.: Deploying NFC Technology for Mobile Ticketing Services - Identification of Critical Business Model Issues. In: 2010 Ninth International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), June 13-15, pp. 82–90 (2010)
Peeters, R., Singele, D., Preneel, B.: Threshold-Based Location-Aware Access Control. International Journal of Handheld Computing Research 2(2), 17 pages (2011)
Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC Devices: Security and Privacy. In: Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, pp. 642–647 (2008)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer-Verlag New York, Inc., Secaucus (2002)
Federal Information Processing Standards Publication 197. Specification for the Advanced Encryption Standard, AES (2001)
Breitfuß, K., Haselsteiner, E.: Security in Near Field Communication, NFC (2006)
Van Damme, G., Wouters, K.: Practical Experiences with NFC Security on mobile Phones (2009)
ECMA International, NFC-SEC NFCIP-1 Security Services and Protocol Cryptography Standard using ECDH and AES (white paper) (December 2008), http://www.ecma-international.org/activities/Communications/tc47-2008-089.pdf
Manninger, M.: Smart Card Technology. In: Sklavos, N., Zhang, X. (eds.) Wireless Security and Cryptography - Specifications and Implementations, ch.13, p. 364. CRC Press, Boca Raton (2007)
Örs, S.B., Preneel, B., Verbauwhede, I.: Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms. In: Sklavos, N., Zhang, X. (eds.) Wireless Security and Cryptography - Specifications and Implementations, ch.7, pp. 213–247. CRC Press, Boca Raton (2007)
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, p. 292. Springer, Heidelberg (1999)
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
De Mulder, E., Örs, S.B., Preneel, B., Verbauwhede, I.: Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Computers and Electrical Engineering 33(5-6), 367–382 (2007)
Xilinx Inc., Xilkernel (December 2006) http://www.xilinx.com/ise/embedded/edk91i_docs/xilkernel_v3_00_a.pdf
NXP: UM0701-02 PN532 User Manual, Rev. 02 (2007), http://www.nxp.com/documents/user_manual/141520.pdf
Stallings, W.: Transport Layer Security. In: Cryptography and Network Security - Principles and Practice, 5th edn., ch.16. Pearson Prentice Hall, London (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ottoy, G. et al. (2011). A Modular Test Platform for Evaluation of Security Protocols in NFC Applications. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds) Communications and Multimedia Security. CMS 2011. Lecture Notes in Computer Science, vol 7025. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24712-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-24712-5_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24711-8
Online ISBN: 978-3-642-24712-5
eBook Packages: Computer ScienceComputer Science (R0)