Securing NFC Againts Data Corruption and Eavesdropping Using Diffie Hellman

Authors(2) :-Darshankumar M Parmar, Prof. Bakul Panchal

Now a day's smart phone have Near Field Communication (NFC), which can be used for transferring data, payment trough mobile gateway and automation. With this new contactless technology set to become an important part of our lives, people have some valid and understandable security concerns. NFC is inherently vulnerable to data corruption and eavesdropping attacks. In this research work, we are trying to make security data model in secure element of NFC. Our aim is securing against data corruption and eavesdropping using Daffier Hellman.

Authors and Affiliations

Darshankumar M Parmar
Information Technology Department, L.D. College of Engineering, Ahmedabad, Gujarat, India
Prof. Bakul Panchal
Information Technology Department, L.D. College of Engineering, Ahmedabad, Gujarat, India

NFC, Diffie Hallman Algorithm, Data Corruption and Eavesdropping

  1. Boyle, T. (2013, September 6). 5 reasons you should use nfc. Retrieved November 21, 2016, from Qfuse Blog - QR Code, NFC, and Mobile Marketing News: http://qfuse.com/blog/5-reasons-you-should-use-nfc/
  2. Rampton, J. (2016, June 14). The evolution of the mobile payment. Retrieved November 13, 2016, from techcrunch.com/2016/06: https://techcrunch.com/2016/06/17/the-evolution-of-the-mobile-payment/
  3. Fan, W., Huang, W., Zhang, Z., Wang, Y., & Sun, D. (2015). A Near Field Communication (NFC) security model based on OSI reference model. IEEE Computer Society, 1324-1328
  4. Hameed, S., Jamali, U. M., & Samad, A. (2016). Protecting NFC Data Exchange against Eavesdropping with Encryption Record Type Definition. Network Operations and Management Journal, 577-583.
  5. Madlmayr, G., Langer, J., Kantner, C., & Scharinger, J. (2008). NFC Devices: Security and Privacy. IEEE Computer Society, 642-647
  6. Roland, M. (2015). Security Issues in Mobile NFC Devices. Switzerland: Springer.
  7. Sajid , O., & Haddara, M. (2016). NFC Mobile Payments, Are we ready for them? SAI Computing Journal, 961-967.
  8. Zhuang, Z. J., Zhang, J., & Geng, W. D. (2014). Analysis and Optimization to an NFC Security Authentication Algorithm Based on Hash Functions. Wireless Communication and Sensor Network Journal, 240-245.

Publication Details

Published in : Volume 3 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 802-805
Manuscript Number : IJSRSET1732222
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Darshankumar M Parmar, Prof. Bakul Panchal, " Securing NFC Againts Data Corruption and Eavesdropping Using Diffie Hellman, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.802-805, March-April-2017.
Journal URL : http://ijsrset.com/IJSRSET1732222

Follow Us

Contact Us