首页> 外文期刊>IEEE transactions on mobile computing >Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones
【24h】

Pricing Data Tampering in Automated Fare Collection with NFC-Equipped Smartphones

机译:使用配备NFC的智能手机对自动票价收集中的数据篡改进行定价

获取原文
获取原文并翻译 | 示例

摘要

Automated Fare Collection (AFC) systems have been globally deployed for decades, particularly in the public transportation network where the transit fee is calculated based on the length of the trip (a.k.a., distance-based pricing AFC systems). Although most messages of AFC systems are insecurely transferred in plaintext, system operators did not pay much attention to this vulnerability, since the AFC network is basically isolated from the public network (e.g., the Internet)-there is no way of exploiting such a vulnerability from the outside of the AFC network. Nevertheless, in recent years, the advent of Near Field Communication (NFC)-equipped smartphones has opened up a channel to invade into the AFC network from the mobile Internet, i.e., by Host-based Card Emulation (HCE) over NFC-equipped smartphones. In this paper, we identify a novel paradigm of attacks, called LessPay, against modern distance-based pricing AFC systems, enabling users to pay much less than what they are supposed to be charged. The identified attack has two important properties: 1) it is invisible to AFC system operators because the attack never causes any inconsistency in the back-end database of the operators; and 2) it can be scalable to affect a large number of users (e.g., 10,000) by only requiring a moderate-sized AFC card pool (e.g., containing 150 cards). To evaluate the efficacy of the attack, we developed an HCE app to launch the LessPay attack; and the real-world experiments demonstrate not only the feasibility of the LessPay attack (with 97.6 percent success rate) but also its low cost in terms of bandwidth and computation. Finally, we propose, implement and evaluate four types of countermeasures, and present security analysis and comparison of these countermeasures on defending against the LessPay attack.
机译:自动化票价收集(AFC)系统已经在全球部署了数十年,尤其是在公共交通网络中,该交通网络是根据行程时间计算过境费的(也就是基于距离的定价AFC系统)。尽管大多数AFC系统消息都是以纯文本格式不安全地传输的,但是由于AFC网络基本上与公共网络(例如Internet)是隔离的,因此系统运营商并未对此漏洞进行过多关注-无法利用此漏洞从AFC网络的外部。然而,近年来,配备近场通信(NFC)的智能手机的出现开辟了从移动互联网侵入AFC网络的渠道,即通过配备NFC的智能手机通过基于主机的卡仿真(HCE)。 。在本文中,我们确定了一种针对现代基于距离的定价AFC系统的新型攻击范式,即LessPay,从而使用户所支付的费用远低于他们应支付的费用。所识别的攻击具有两个重要属性:1)AFC系统操作员看不到该攻击,因为该攻击绝不会在操作员的后端数据库中引起任何不一致; 2)仅需中等大小的AFC卡池(例如包含150张卡)即可扩展到影响大量用户(例如10,000个)。为了评估攻击的有效性,我们开发了一个HCE应用程序来发起LessPay攻击。真实世界的实验不仅证明了LessPay攻击的可行性(成功率为97.6%),而且还证明了其在带宽和计算方面的低成本。最后,我们提出,实施和评估了四种类型的对策,并针对这些抵御LessPay攻击的对策进行了安全性分析和比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号