Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014
DOI: 10.1145/2590296.2590327
|View full text |Cite
|
Sign up to set email alerts
|

Practical secret key agreement for full-duplex near field communications

Abstract: Near Field Communication (NFC) is a promising short distance radio communication technology for many useful applications. Although its communication range is short, NFC alone does not guarantee secure communication and is subject to security attacks, such as eavesdropping attack. Generating a shared key and using symmetric key cryptography to secure the communication between NFC devices is a feasible solution to prevent various attacks. However, conventional Diffie-Hellman key agreement protocol is not prefera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Theoretical key generation approaches have been proposed for IBFD mode in [216], [217]. Practical key generation testbeds relying on the IBFD capability of USRP devices and near field communication (NFC) devices are demonstrated in [218] and [219], respectively.…”
Section: ) Fdd Modementioning
confidence: 99%
“…Theoretical key generation approaches have been proposed for IBFD mode in [216], [217]. Practical key generation testbeds relying on the IBFD capability of USRP devices and near field communication (NFC) devices are demonstrated in [218] and [219], respectively.…”
Section: ) Fdd Modementioning
confidence: 99%
“…One solution comes from the fact that the SI channel changes slower than the channel between users. At this point, theoretical CRKG approaches in IBFD mode are proposed in [ 37 , 38 ], while practical CRKG testbed with IBFD capability universal software radio peripheral (USRP) devices and near field communication (NFC) devices are demonstrated in [ 38 , 39 ], respectively. IBFD communications can noticeably boost the secret key rate in an operationally interesting regime of parameters.…”
Section: Crkg In Three Typical Duplex Modesmentioning
confidence: 99%
“…Study towards mutual authentication scheme was also carried out by Fan et al [18], [19] that implements logical operation of XOR for resisting denial-of-service attacks. Adoption of key management towards securing NFC-based devices was seen in the work presented by Jin et al [20] where the authors have presented a key agreement scheme that ensures energy efficiency using software-defined radio testbed. Literatures have also witnessed the usage of pseudonyms towards secure authentication of NFC application as seen in the work carried out by Odelu et al [21].…”
Section: Existing Security Approaches In Nfcmentioning
confidence: 99%