Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

View through CrossRef
Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a short-range contactless technology allowing mobile devices to act primarily as either a reader or a token. Relay attacks exploit the assumption that a contactless token within communication range is in close proximity, by placing a proxy-token in range of a contactless reader and relaying communication over a greater distance to a proxy-reader communicating with the authentic token. It has been theorised that NFC-enabled mobile phones could be used as a generic relay attack platform without any additional hardware, but this has not been successfully demonstrated in practice. We present the first generic practical implementation of a contactless relay attack by using only NFC-enabled mobile phones, requiring only suitable mobile software applications. This implementation reduces the complexity of relay attacks and therefore has potential security implications for current contactless systems.
Title: Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
Description:
Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems.
Near Field Communication (NFC) is a short-range contactless technology allowing mobile devices to act primarily as either a reader or a token.
Relay attacks exploit the assumption that a contactless token within communication range is in close proximity, by placing a proxy-token in range of a contactless reader and relaying communication over a greater distance to a proxy-reader communicating with the authentic token.
It has been theorised that NFC-enabled mobile phones could be used as a generic relay attack platform without any additional hardware, but this has not been successfully demonstrated in practice.
We present the first generic practical implementation of a contactless relay attack by using only NFC-enabled mobile phones, requiring only suitable mobile software applications.
This implementation reduces the complexity of relay attacks and therefore has potential security implications for current contactless systems.

Related Results

Tourist Applications Made Easier Using Near Field Communication
Tourist Applications Made Easier Using Near Field Communication
Near field communication (NFC) is a new wireless connectivity technology that enables short-range communication between electronic devices. The operation of NFC is intuitive, makin...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
ANALISIS PENGUJIAN RELAY PROTEKSI MENGGUNAKAN RELAY TESTING UNIT TIPE PTE-100-C PLUS
ANALISIS PENGUJIAN RELAY PROTEKSI MENGGUNAKAN RELAY TESTING UNIT TIPE PTE-100-C PLUS
Relay proteksi adalah suatu relay listrik yang digunakan untuk mengamankan peralatan-peralatan listrik terhadap kondisi abnormal. Banyaknya karakteristik beban dan penambahan beban...
Adaptive ANN based differential protective relay for reliable power transformer protection operation during energisation
Adaptive ANN based differential protective relay for reliable power transformer protection operation during energisation
Power transformer is the most expensive equipment in electrical power system that needs continuous monitoring and fast protection response. Differential relay is usually used in po...
NFC TAG AUTHENTICATION: AN OVERVIEW
NFC TAG AUTHENTICATION: AN OVERVIEW
Near Field Communication (NFC) technology is a short-range wireless communication between two devices that are NFC-enabled. NFC has found application in various institutions like t...
Pengamanan Data Identitas Bus pada Kartu NFC Menggunakan Enkripsi AES-128
Pengamanan Data Identitas Bus pada Kartu NFC Menggunakan Enkripsi AES-128
Pendataan dan pemeriksaan bus  yang keluar masuk terminal yang ada di Indonesia saat ini masih banyak yang menggunakan cara manual, yaitu menuliskan hasil pendataan dan pe...

Back to Top