2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2015
DOI: 10.1109/mipro.2015.7160477
|View full text |Cite
|
Sign up to set email alerts
|

A practical NFC relay attack on mobile devices using card emulation mode

Abstract: -In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising communication technology which is also used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payments, access control etc. Because of the nature of these transactions, security is a critical issue that should be considered in system design and development phases. Although… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…could be utilized [5]. Modern attempts of the DF relay attack have been shown to be easily implementable when utilizing smartphones and the built in NFC and Bluetooth capabilities that they have [10]- [12]. An open source Android application by E. Lee called NFCProxy [13] can be used on some devices to easily make NFC packets available for relaying.…”
Section: Relevant Work and Motivationsmentioning
confidence: 99%
“…could be utilized [5]. Modern attempts of the DF relay attack have been shown to be easily implementable when utilizing smartphones and the built in NFC and Bluetooth capabilities that they have [10]- [12]. An open source Android application by E. Lee called NFCProxy [13] can be used on some devices to easily make NFC packets available for relaying.…”
Section: Relevant Work and Motivationsmentioning
confidence: 99%
“…There are many scenarios in which relay attacks are used. Its application on Near Field Communication (NFC), for instance, is analyzed in different works in literature [11,20]. Recently, researchers have successfully proved the effectiveness of a relay attack on the SARS-CoV-2 contact tracking application, proposing a hashing-based countermeasure to secure the environment without losing privacy [10].…”
Section: Related Workmentioning
confidence: 99%
“…PEELING THE APPLET This layer serves as a link between mobile devices and desktop computers. To check if a phone is nearby, it uses an NFC reader to send a request (Çavdar & Tomur, 2015, May). If a phone is found, data is then transferred to the browser using NFC technology.…”
Section: IImentioning
confidence: 99%