2021
DOI: 10.1109/access.2020.3048711
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Half-Duplex Communication of NFC Read/Write Mode for Secure Multi-Factor Authentication

Abstract: Near Field Communication (NFC) is a prominent short-range, contact-less communication technology, which is rapidly getting popular in modern smart devices. For communication between two active devices via NFC, applications generally choose the peer-to-peer operation mode. In this paper, we exploit the possibility of using the NFC read/write mode, designed primarily for unidirectional data transfer from an active NFC reader to a passive NFC tag, for bi-directional half-duplex communication between two active NF… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…Core IoT technology can be further decomposed according to the type of computation to: (1) IoT platform, (2) Raspberry Pi, (3) Arduino Uno, (4) Wireless Sensor Network (WSN), (5) sensors, and (6) actuators. Respectively, passive monitoring technology can be categorized to: (1) Radio Frequency IDentifier (RFID) equipment, (2) Global Positioning System (GPS) device, (3) Ethernet protocol, (4) Wi-Fi, (5) Bluetooth, (6) ZigBee, (7) Near Field Communication (NFC), (8) 4G, (9) 5G, and (10) Low Power Wide Area Networks (LPWAN), which contain technologies such as SigFox, LoRa, LTE-M or NB-IoT, [16], [17], [18], [19], [20], [21], [22], [23]. Active monitoring devices are divided to: (1) cameras, (2) microphones, (3) smartphones, (4) smart watches, and (5) Autonomous Teller Machines (ATM).…”
Section: Proposed Taxonomymentioning
confidence: 99%
“…Core IoT technology can be further decomposed according to the type of computation to: (1) IoT platform, (2) Raspberry Pi, (3) Arduino Uno, (4) Wireless Sensor Network (WSN), (5) sensors, and (6) actuators. Respectively, passive monitoring technology can be categorized to: (1) Radio Frequency IDentifier (RFID) equipment, (2) Global Positioning System (GPS) device, (3) Ethernet protocol, (4) Wi-Fi, (5) Bluetooth, (6) ZigBee, (7) Near Field Communication (NFC), (8) 4G, (9) 5G, and (10) Low Power Wide Area Networks (LPWAN), which contain technologies such as SigFox, LoRa, LTE-M or NB-IoT, [16], [17], [18], [19], [20], [21], [22], [23]. Active monitoring devices are divided to: (1) cameras, (2) microphones, (3) smartphones, (4) smart watches, and (5) Autonomous Teller Machines (ATM).…”
Section: Proposed Taxonomymentioning
confidence: 99%
“…For MFA to be successfully implemented, one of the verification factors must be kept away from the device for accessing the system or resources (Australian Cyber Security Centre [ACSC], 2019). The MFA provides a higher security level through multiple user login credentials to protect the devices, systems, and resources from intruders (Taher et al, 2019;Ibrokhimov et al, 2019;Vorakulpipat et al, 2021;Chishti et al, 2021;Kebande et al, 2021). It also helps achieve consistency in organisations (Lone & Mir, 2021).…”
Section: Single-factor Authentication (Sfa)mentioning
confidence: 99%
“…For MFA to be successfully implemented, one of the verification factors should be kept away from the device for accessing the system or resources (Australian Cyber Security Centre (ACSC), 2019). The MFA provides a higher security level through multiple user login credentials to protect the devices, systems, and resources from intruders (Taher et al, 2019;Ibrokhimov et al, 2019;Vorakulpipat et al, 2021;Chishti et al, 2021;Kebande et al, 2021). It also helps achieve consistency in organisations (Lone & Mir, 2021).…”
Section: Single-factor Authentication (Sfa)mentioning
confidence: 99%