Securing NFC Againts Data Corruption and Eavesdropping Using Diffie Hellman

Authors

  • Darshankumar M Parmar  Information Technology Department, L.D. College of Engineering, Ahmedabad, Gujarat, India
  • Prof. Bakul Panchal  Information Technology Department, L.D. College of Engineering, Ahmedabad, Gujarat, India

Keywords:

NFC, Diffie Hallman Algorithm, Data Corruption and Eavesdropping

Abstract

Now a day's smart phone have Near Field Communication (NFC), which can be used for transferring data, payment trough mobile gateway and automation. With this new contactless technology set to become an important part of our lives, people have some valid and understandable security concerns. NFC is inherently vulnerable to data corruption and eavesdropping attacks. In this research work, we are trying to make security data model in secure element of NFC. Our aim is securing against data corruption and eavesdropping using Daffier Hellman.

References

  1. Boyle, T. (2013, September 6). 5 reasons you should use nfc. Retrieved November 21, 2016, from Qfuse Blog - QR Code, NFC, and Mobile Marketing News: http://qfuse.com/blog/5-reasons-you-should-use-nfc/
  2. Rampton, J. (2016, June 14). The evolution of the mobile payment. Retrieved November 13, 2016, from techcrunch.com/2016/06: https://techcrunch.com/2016/06/17/the-evolution-of-the-mobile-payment/
  3. Fan, W., Huang, W., Zhang, Z., Wang, Y., & Sun, D. (2015). A Near Field Communication (NFC) security model based on OSI reference model. IEEE Computer Society, 1324-1328
  4. Hameed, S., Jamali, U. M., & Samad, A. (2016). Protecting NFC Data Exchange against Eavesdropping with Encryption Record Type Definition. Network Operations and Management Journal, 577-583.
  5. Madlmayr, G., Langer, J., Kantner, C., & Scharinger, J. (2008). NFC Devices: Security and Privacy. IEEE Computer Society, 642-647
  6. Roland, M. (2015). Security Issues in Mobile NFC Devices. Switzerland: Springer.
  7. Sajid , O., & Haddara, M. (2016). NFC Mobile Payments, Are we ready for them? SAI Computing Journal, 961-967.
  8. Zhuang, Z. J., Zhang, J., & Geng, W. D. (2014). Analysis and Optimization to an NFC Security Authentication Algorithm Based on Hash Functions. Wireless Communication and Sensor Network Journal, 240-245.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Darshankumar M Parmar, Prof. Bakul Panchal, " Securing NFC Againts Data Corruption and Eavesdropping Using Diffie Hellman, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 2, pp.802-805, March-April-2017.