Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A Practical NFC Relay Attack on Mobile Devices Using Card Emulation Mode
Date
2015-05-29
Author
Cavdar, D.
Tomur, E.
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
284
views
0
downloads
Cite This
In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising communication technology which is also used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payments, access control etc. Because of the nature of these transactions, security is a critical issue that should be considered in system design and development phases. Although inherited from Radio Frequency Identification (RFID) technology, NFC security needs, requirements and solutions differ in terms of its usage areas and solutions. Based on these parameters, security precautions in communication layer of RFID technology do not prevent relay attacks occurred in the application layer NFC solutions. This study is conducted to prove relay attack practicability with using only mobile phones for relaying credentials instead of RFID based smart cards in an access control application. The Host Card Emulation (HCE) mode also eases relay attacks in NFC communication. The study explains the conceptual description of proposed relay attack, development and operating logic of mobile applications working based on card emulation mode and server software and also data communication basics between modules and web services descriptions.
Subject Keywords
NFC
,
Relay attack
,
Mobile
,
Card emulation
URI
https://hdl.handle.net/11511/65753
Collections
Department of Electrical and Electronics Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
Design of a context aware security model for preventing relay attacks using NFC enabled mobile devices
Çavdar, Davut; Betin Can, Aysu; Department of Information Systems (2020)
Near Field Communication (NFC) is a promising communication technology used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payment, access control etc. Because of the nature of these transactions, security is an important issue since NFC is used in critical applications such as payment and access control. There are several attacks mentioned in literature against NFC-enabled applications, yet, none of the securit...
Having 4G, Enabling Cloud Based Execution for NFC based Financial Transactions
Turk, Ismail; Coşar, Ahmet (2015-11-03)
Near Field Communication (NFC) is a technology which has found wide use in recent years in Mobile Sector. NFC enables your mobile handset to become your secure wallet and it also converts your mobile to a device that easily communicates with NFC tags in a contactless way to trigger any desired action such as approving your credit card payment without requiring you to type your pin number. The Secure Element is a component in NFC which is a tamper-resistant device used to store sensitive user credentials (su...
A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Wireless Multimedia Sensor Networks
Hasan, Mohammed Zaki; Al-Rizzo, Hussain; Al-Turjman, Fadi (2017-01-01)
The vision of wireless multimedia sensor networks (WMSNs) is to provide real-time multimedia applications using wireless sensors deployed for long-term usage. Quality of service assurances for both best effort data and real-time multimedia applications introduced new challenges in prioritizing multipath routing protocols in WMSNs. Multipath routing approaches with multiple constraints have received considerable research interest. In this paper, a comprehensive survey of both best effort data and real-time m...
An Implantable Multichannel Digital Neural Recording System for a Micromachined Sieve Electrode
Akın, Tayfun; Bradley, R.M. (1995-06-29)
This paper reports the development of an implantable, fully integrated, single-chip, multichannel neural recording system, which is powered and communicated with using an RF telemetry link. The system allows recording of /spl plusmn/500/spl mu/V neural signals from axons regenerated through a micromachined silicon sieve electrode. These signals are amplified using on-chip 100Hz to 3.IkHz bandlimited amplifiers, multiplexed, and digitized with a low-power, high speed current-mode 8-bit ADC, and then transmit...
A multi-hop routing protocol in tag-to-tag networks of passive tags
Murat, Furkan; Onur, Ertan; Eroğlu, Alperen; Department of Computer Engineering (2023-1-27)
With the evolution of technology, tag-to-tag communication between passive RFID tags using backscattering, which is accepted as a milestone in RFID technology, has emerged in recent years. Different from the conventional passive RFID systems, tags could communicate with each other with the existence of RF signals in the environment. With this development, passive RFID tags evolved into passive tags because the usage areas could not be limited to the identification or tracking of attached objects. On the oth...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
D. Cavdar and E. Tomur, “A Practical NFC Relay Attack on Mobile Devices Using Card Emulation Mode,” 2015, p. 1308, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/65753.