2013 International Conference on Computing, Networking and Communications (ICNC) 2013
DOI: 10.1109/iccnc.2013.6504182
|View full text |Cite
|
Sign up to set email alerts
|

Practical provably secure key sharing for near field communication devices

Abstract: We present a novel practical and provably secure key sharing scheme for Near Field Communication (NFC) devices. The scheme is based on sharing secret keys using the noisy wireless channel. We present two schemes based on the different modes of operation of typical NFC devices. Our numerical results establish the achievability of vanishing secrecy rates using the proposed techniques. Implementation of our proposed schemes on NFC-enabled Android and Nokia phones verifies our theoretical analysis and demonstrates… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…The works in [13,14] proposed Physical layer key generation methods by using the wireless channel measurements. By exploiting the reciprocal property of the wireless fading channel between two NFC devices, shared secret key can be generated.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The works in [13,14] proposed Physical layer key generation methods by using the wireless channel measurements. By exploiting the reciprocal property of the wireless fading channel between two NFC devices, shared secret key can be generated.…”
Section: Related Workmentioning
confidence: 99%
“…Existing works [1,2,12,13,14] indicate that using symmetric key cryptography to secure the NFC is a practical solution to protect against many kinds of attacks. It is mentioned in [1] that due to the inherent protection of NFC against Man-in-the-MiddleAttacks, standard key agreement protocols like DiffieHellman based on RSA or Elliptic Curves could be applied to establish symmetric keys.…”
Section: Related Workmentioning
confidence: 99%
“…The works in [12,8] proposed Physical layer key generation methods by using the wireless channel measurements. By exploiting the reciprocal property of the wireless fading channel between two NFC devices, shared secret key can be generated.…”
Section: Related Workmentioning
confidence: 99%
“…Existing works [14,3,7,12,8] indicate that using symmetric key cryptography to secure the NFC is a practical solution to protect against many kinds of attacks. It is mentioned in [14] that due to the inherent protection of NFC against Man-in-the-Middle-Attacks, standard key agreement protocols like Diffie-Hellman based on RSA or Elliptic Curves could be applied to establish symmetric keys.…”
Section: Related Workmentioning
confidence: 99%
“…NFC was designed to allow different objects with the same technology to communicate securely with each other. However, this protocol suffers from several attacks [42]. The most important attacks are the following:…”
Section: Connectivity Protocols-based Attacksmentioning
confidence: 99%