2017 International Conference on Networking, Systems and Security (NSysS) 2017
DOI: 10.1109/nsyss.2017.7885798
|View full text |Cite
|
Sign up to set email alerts
|

A security-aware Near Field Communication architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…It still needs efforts to earn that trust. Asaduzzman et al [18] stated that NFC is suitable for IoT devices. This paper discusses the protocol for sending data in NDEF format.…”
Section: Related Workmentioning
confidence: 99%
“…It still needs efforts to earn that trust. Asaduzzman et al [18] stated that NFC is suitable for IoT devices. This paper discusses the protocol for sending data in NDEF format.…”
Section: Related Workmentioning
confidence: 99%
“…Alternatively, message modification is a type of active attack, where an attacker sniffs actual data from the network and pass the modified data to the receiver. Asaduzzaman et al [56] designed a protocol to offer better security over message modification attack near NFC architecture. Zhang, et al [57] describes different abnormalities in VANETs, including massage suppression attacks.…”
Section: B Man-in-the-middle Attackmentioning
confidence: 99%
“…Thus, when securely changing or erasing files, this process deletes as few blocks as allowed. 7 Asaduzzaman et al 8 proposed a certificate as per the NDEF message and a data-processing secure protocol to counter data insertion, jamming, and tag manipulation attacks. Hongthai et al 9 discussed encrypted NDEF transmission in a passive NFC tag for implementation in a product authentication system.…”
Section: Related Workmentioning
confidence: 99%