首页> 外文会议>2015 IEEE Conference on Communications and Network Security >SecNFC: Securing inductively-coupled Near Field Communication at physical layer
【24h】

SecNFC: Securing inductively-coupled Near Field Communication at physical layer

机译:SecNFC:在物理层确保感应耦合近场通信的安全

获取原文
获取原文并翻译 | 示例

摘要

Near Field Communication (NFC) is widely used today in many useful applications, such as contactless payment, identification, and file exchange. Due to the limitations on computation, power, and cost of NFC devices, NFC systems are often lack of encryption or weakly encrypted, leaving them exposed to security attacks. One solution for this problem is to install strong cryptographic protocols on NFC devices. However, it involves upgrading and revoking deployed NFC devices, which is costly and impractical. Moreover, encryption algorithms are usually considered expensive for resource constrained NFC devices in terms of computation overhead and energy consumption. In this paper, aiming at securing NFC from eavesdropping at physical layer, we propose SecNFC, a solution that changes the signals on the initiators to hide the communications, but does not require any changes to the targets. In this work, for the first time, we address a practical problem of synchronization offset between two NFC terminals, which can be exploited by an eavesdropper to compromise the transmitted bits. SecNFC takes into consideration the synchronization offset and solves the challenge by introducing blocking signals around the transition point when the target switches load between on and off. With this solution, even with the existence of synchronization offset, eavesdroppers cannot extract any bit information from eavesdropping. We conduct extensive simulations to evaluate the performance of SecNFC. We also build a testbed based on USRP software defined radio and off-the-shelf NFC tags to evaluate SecNFC in a real-world environment. Both simulation and experimental results show that SecNFC can efficiently prevent NFC from eavesdropping with a slight and tolerable decoding performance degradation at the initiator.
机译:如今,近场通信(NFC)在许多有用的应用程序中得到了广泛使用,例如非接触式支付,识别和文件交换。由于NFC设备在计算,功能和成本方面的限制,NFC系统通常缺乏加密或弱加密,从而使它们容易受到安全攻击。解决此问题的一种方法是在NFC设备上安装强大的加密协议。但是,这涉及升级和撤销已部署的NFC设备,这既昂贵又不切实际。而且,就资源消耗的NFC设备而言,就计算开销和能量消耗而言,加密算法通常被认为昂贵。在本文中,为了保护NFC免受物理层的窃听,我们提出了SecNFC,该解决方案可以更改启动器上的信号以隐藏通信,但不需要对目标进行任何更改。在这项工作中,我们首次解决了两个NFC终端之间的同步偏移的实际问题,窃听者可以利用该偏移来损害传输的比特。当目标开关在开和关之间切换负载时,SecNFC考虑到同步偏移并通过在过渡点周围引入阻塞信号来解决挑战。使用这种解决方案,即使存在同步偏移,窃听者也无法从窃听中提取任何比特信息。我们进行了广泛的仿真,以评估SecNFC的性能。我们还基于USRP软件定义的无线电和现成的NFC标签构建了一个测试平台,以评估实际环境中的SecNFC。仿真和实验结果均表明,SecNFC可以有效防止NFC窃听,并且在启动器处解码性能会出现轻微且可忍受的下降。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号