Vulnerability Analysis And Security System For NFC-Enabled Mobile Phones
Journal: International Journal of Scientific & Technology Research (Vol.3, No. 6)Publication Date: 2014-06-15
Authors : S.Kavya; K.Pavithra; Sujitha Rajaram; M.Vahini; N Harini;
Page : 207-210
Keywords : Index Terms Authentication; Decryption; Encryption; NFC tag; Security; NFC technology;
Abstract
Abstract An encryption system for NFC enabled applications using a combination of AES cryptography algorithm and Diffie-Hellman key negotiation scheme which when implemented prevents data modification man in the middle attack and eavesdropping has been proposed in the paper. A timestamp based Protocol where the size of the file and time at which it is sent is retrieved to calculate the estimated time of reception which will be compared with actual reception time is also proposed to prevent relay attacks. A complete study of authentication methodologies in NFC technology and a critical analysis of our proposed system with the existing systems showing how it can resist all the possible attacks on the data exchanged between mobile phones through NFC technology.
Other Latest Articles
- Growth Analysis Of Soybean Varieties At Dry Land With Application Of Nitrogen Sources
- Identification Of Interplanetary Coronal Mass Ejection With Magnetic Cloud In Year 2005 At 1 AU
- Interest Of Navigation Surgery In Total Knee Arthroplasty
- Pseudarthosis Of The Femoral Neck Treated With Total Hip Arthroplasty About 14 Cases.
- Osteochondritis Dissecans Of The Femoral Condyles About 5 Cases
Last modified: 2015-06-28 03:57:56