NFC technology is considered extremely secure for communication and the number of phones that can support NFC is also at a rise. The technology is gaining worldwide recognition and as it is easy to implement and since it is really economical numerous applications are using it. Most of NFC applications involve the usage of tags, which can easily be duplicated or can be replaced by a fake one. Therefore, though the technology is so useful and secure, this weakness makes it vulnerable to certain attacks.
NFC has numerous applications but in this thesis, I will be discussing various security threats related to NFC applications involving NFC tag and an NFC enabled smartphone, for example smart posters. This thesis will evaluate various security threats like phishing, exposure to adult content etc., what they are and how an attacker can carry out these attacks. Further discussion will be on what an artificial neural network (ANN) is and how it can be used to eliminate these threats. The thesis also proposes a security model that will use ANN, to provide security against threats and will also provide user confidentiality, anonymity and privacy, and a category classifier to increase the overall efficiency of the model and to decrease the memory usage, and will also provide users with an added feature of personalizing their security according to their requirements.
Inhaltsverzeichnis (Table of Contents)
- Abstract
- Chapter 1
- Introduction
- Chapter 2
- Background
- Near Field Communication
- Tag Reader/Writer Mode
- Peer to Peer Mode
- Card Emulation Mode
- NFC tags
- Tag types
- NFC Data Exchange Format (NDEF)
- Reading NDEF data from an NFC tag
- Cryptography
- Symmetric Key Cryptography
- Public Key Cryptography
- Artificial Neural Network (ANN)
- Category Classifier
- Near Field Communication
- Background
- Chapter 3
- NFC Security Threats
- Exposure to Adult/Objectionable content
- Phishing
- Automated malware download and malicious web pages
- Eavesdropping
- Data Corruption
- Data Modification
- NFC Security Threats
- Chapter 4
- Counter-Measures
- Exposure to Adult/Objectionable content
- Phishing
- Automated malware downloads and malicious websites
- Counter-Measures
- Chapter 5
- Proposed Security Model
- Components
- User Sign-Up
- Working
- Personalised Security List
- Data Uploading
- Data Retrieval
- Anonymity
- Proposed Security Model
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This thesis aims to enhance the security of data transmission between NFC tags and NFC-enabled smartphones, particularly focusing on the vulnerabilities of NFC tags. The primary objective is to develop a security model that can effectively protect against various security threats associated with NFC technology, while maintaining a rapid data transmission rate.
- Security threats associated with NFC technology.
- Counter-measures and existing methodologies for securing NFC data transmission.
- The application of artificial neural networks (ANNs) in enhancing NFC security.
- The development and implementation of a secure model that incorporates user anonymity, confidentiality, and privacy.
- The role of a category classifier in optimizing the security model's efficiency and memory usage.
Zusammenfassung der Kapitel (Chapter Summaries)
Chapter 1 introduces the thesis and its primary goal of securing data transmission from NFC tags to smartphones. It highlights the importance of maintaining a rapid data transmission rate while implementing security measures. The thesis outlines the structure of the report, outlining the content of each chapter.
Chapter 2 provides a comprehensive overview of NFC technology, exploring its functionalities and data transmission mechanisms. It delves into various aspects of NFC, including different modes of operation, tag types, and the NFC Data Exchange Format (NDEF). The chapter also discusses cryptography, artificial neural networks (ANNs), and category classifiers, which are crucial concepts for understanding the proposed security model.
Chapter 3 focuses on the various security threats that can compromise NFC technology. It examines the potential impact of these threats on user privacy and outlines how attackers can exploit these vulnerabilities.
Chapter 4 explores various counter-measures that can be implemented to protect users from NFC security threats. It discusses existing approaches and methodologies used to secure NFC data transmission and examines their effectiveness in training artificial neural networks (ANNs).
Schlüsselwörter (Keywords)
The primary focus of this thesis is on securing data transmission between NFC tags and NFC-enabled smartphones. Key areas of focus include NFC security, NFC threats, counter-measures, artificial neural networks (ANNs), category classifier, user anonymity, confidentiality, and privacy.
Frequently Asked Questions
What are the main security threats associated with NFC tags?
NFC tags are vulnerable to several threats, including phishing, exposure to adult or objectionable content, automated malware downloads, eavesdropping, and data modification or corruption.
How can Artificial Neural Networks (ANN) enhance NFC security?
ANNs can be used to identify and eliminate security threats by learning patterns of malicious behavior. The proposed model uses ANN to provide protection while maintaining user confidentiality and privacy.
What are the three main modes of NFC operation?
NFC technology typically operates in three modes: Tag Reader/Writer mode, Peer-to-Peer mode, and Card Emulation mode.
What is NDEF in NFC technology?
NDEF stands for NFC Data Exchange Format. It is a lightweight binary format used to encapsulate and exchange data between NFC devices and tags.
What is the role of a category classifier in the proposed security model?
A category classifier is used to increase the overall efficiency of the security model and decrease memory usage, allowing for faster and more optimized data processing.
Does the proposed model allow for personalized security?
Yes, the model includes a feature that allows users to personalize their security settings according to their specific requirements and preferences.
- Quote paper
- Siddharth Sharma (Author), 2015, Secure data transmission between an NFC tag and an NFC enabled smartphone, Munich, GRIN Verlag, https://www.grin.com/document/337906