Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Design of a context aware security model for preventing relay attacks using NFC enabled mobile devices
Download
index.pdf
Date
2020
Author
Çavdar, Davut
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
314
views
244
downloads
Cite This
Near Field Communication (NFC) is a promising communication technology used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payment, access control etc. Because of the nature of these transactions, security is an important issue since NFC is used in critical applications such as payment and access control. There are several attacks mentioned in literature against NFC-enabled applications, yet, none of the security solutions offered provides sufficient protection for NFC enabled access control systems due to their static nature. In this context, the contribution of this work is threefold. First, we demonstrate how easy to perform such attacks implementing a relay attack in a realistic testbed. Second, we propose a context-aware security model for preventing relay attacks for NFC enabled mobile devices even if attackers compromise authentication tokens. Third, we prove the validity of our proposed security model both theoretically by formal verification and practically by the deployment of the model on a testbed infrastructure where we also analyze the performance in comparison to other approaches.
Subject Keywords
System safety.
,
NFC
,
relay attack
,
access methods
,
security
,
context-aware.
URI
http://etd.lib.metu.edu.tr/upload/12625530/index.pdf
https://hdl.handle.net/11511/45754
Collections
Graduate School of Informatics, Thesis
Suggestions
OpenMETU
Core
Having 4G, Enabling Cloud Based Execution for NFC based Financial Transactions
Turk, Ismail; Coşar, Ahmet (2015-11-03)
Near Field Communication (NFC) is a technology which has found wide use in recent years in Mobile Sector. NFC enables your mobile handset to become your secure wallet and it also converts your mobile to a device that easily communicates with NFC tags in a contactless way to trigger any desired action such as approving your credit card payment without requiring you to type your pin number. The Secure Element is a component in NFC which is a tamper-resistant device used to store sensitive user credentials (su...
A Practical NFC Relay Attack on Mobile Devices Using Card Emulation Mode
Cavdar, D.; Tomur, E. (2015-05-29)
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising communication technology which is also used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payments, access control etc. Because of the nature of these transactions, security is a critical issue that should be considered in system design and development phases. Althou...
RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions
Turk, Ismail; Angın, Pelin; Cosar, Ahmet (Institute of Electrical and Electronics Engineers (IEEE), 2019-01-01)
The use of near field communication (NFC) technology for contactless mobile transactions has become popular in the past decade with the availability of this technology in mobile devices. Today, there are millions of the NFC-enabled mobile handsets in the market, with mobile handset manufacturers and mobile network operators enabling m-wallet solutions using the secure elements (SEs) that they own, thus can remotely control, on the devices. While this approach gives full control to the SE owner to activate a...
Design of dual-frequency probe-fed microstrip antennas with genetic optimization algorithm
Ozgun, O; Mutlu, S; Aksun, MI; Alatan, Lale (2003-08-01)
Dual-frequency operation of antennas has become a necessity for many applications in recent wireless communication systems, such as GPS, GSM services operating at two different frequency bands, and services of PCS and IMT-2000 applications. Although there are various techniques to achieve dual-band operation from various types of microstrip antennas, there is no efficient design tool that has been incorporated with a suitable optimization algorithm. In this paper, the cavity-model based simulation tool alon...
A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Wireless Multimedia Sensor Networks
Hasan, Mohammed Zaki; Al-Rizzo, Hussain; Al-Turjman, Fadi (2017-01-01)
The vision of wireless multimedia sensor networks (WMSNs) is to provide real-time multimedia applications using wireless sensors deployed for long-term usage. Quality of service assurances for both best effort data and real-time multimedia applications introduced new challenges in prioritizing multipath routing protocols in WMSNs. Multipath routing approaches with multiple constraints have received considerable research interest. In this paper, a comprehensive survey of both best effort data and real-time m...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
D. Çavdar, “Design of a context aware security model for preventing relay attacks using NFC enabled mobile devices,” Thesis (Ph.D.) -- Graduate School of Social Sciences. Information Systems., Middle East Technical University, 2020.