Abstract
Near field communication (NFC) is a technology that facilitates communication between NFC-enabled devices by utilizing low power and radiating signals around a close proximity. The interaction is always binary, between the initiator that emits signals within a range of 4 cm and the target which enters the field of the initiator to begin the interaction. The communication may be one way (passive) or two way (active). The data shared in the session is neither encrypted not authenticated. These two factors aid in potential communication and data transfer. However, this becomes downside to this upcoming technology, when the data provided by the initiator may be subjected to data spoofing or data corruption. When the target processes such data, it could leads to unintended behaviour thereby compromising the integrity of the device. When a forensic investigator is handed a compromised device and asked to recreate the alleged crime, he relies on the presence of nonvolatile data on the device. In the Android operating system, there is no mechanism to provide the nonvolatile artefacts ensuing an NFC interaction. Therefore, any digital crime on Android devices abetted by NFC remains unsolved and the case gets deferred. The main aim of this research is to develop a logging mechanism for Android devices that will log all the interactions taking place through the NFC hardware, and the presence of these nonvolatile logs along with other volatile artefacts would benefit the forensic investigator to comprehend the exact sequence of activities that jeopardized the conventional operation of the android device.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Igoe. T, Coleman. D., Jepson. B., (2014). In NFC and RFID. Beginning NFC-Near Field Communication with Arduino, Android and PhoneGap. 11–18. O’Reilly Media Inc.
https://en.wikipedia.org/wiki/Near_field_communication#NFC_Forum.
http://nfc-forum.org/our-work/specifications-and-application-documents/.
Coskun. V., Ozdenizci. B., Ok. K., (2012). A Survey on Near Field Communication(NFC) Technology. Wireless Personal Communication. Volume 71, Issue 3. 2259–2294.
Mandia. K., & Prosise. C., (2003). Evidence Handling. In Pepe. M., Bejtlich R., & Rose. C., (Eds.) Incident Response and Computer Forensics. 198–213. Osborne: The McGraw-Hill Companies.
https://play.google.com/store/apps/details?id=com.nxp.nfc.tagwriter.
https://www.cps.gov.uk/legal/assets/uploads/files/ACPO_guidelines_computer_evidence%5B1%5D.pdf.
Andriotis. P., Oikonomou G., Tryfonas T., “Forensic Analysis of Wireless Networking Evidence of Android Smartphones” in WIFS 2012.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lakshmanan, D., Nagoor Meeran, A.R. (2017). NFC Logging Mechanism—Forensic Analysis of NFC Artefacts on Android Devices. In: Dash, S., Vijayakumar, K., Panigrahi, B., Das, S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 517. Springer, Singapore. https://doi.org/10.1007/978-981-10-3174-8_9
Download citation
DOI: https://doi.org/10.1007/978-981-10-3174-8_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3173-1
Online ISBN: 978-981-10-3174-8
eBook Packages: EngineeringEngineering (R0)