ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Vulnerability Analysis And Security System For NFC-Enabled Mobile Phones

Journal: International Journal of Scientific & Technology Research (Vol.3, No. 6)

Publication Date:

Authors : ; ; ; ; ;

Page : 207-210

Keywords : Index Terms Authentication; Decryption; Encryption; NFC tag; Security; NFC technology;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Abstract An encryption system for NFC enabled applications using a combination of AES cryptography algorithm and Diffie-Hellman key negotiation scheme which when implemented prevents data modification man in the middle attack and eavesdropping has been proposed in the paper. A timestamp based Protocol where the size of the file and time at which it is sent is retrieved to calculate the estimated time of reception which will be compared with actual reception time is also proposed to prevent relay attacks. A complete study of authentication methodologies in NFC technology and a critical analysis of our proposed system with the existing systems showing how it can resist all the possible attacks on the data exchanged between mobile phones through NFC technology.

Last modified: 2015-06-28 03:57:56