NFC technology is considered extremely secure for communication and the number of phones that can support NFC is also at a rise. The technology is gaining worldwide recognition and as it is easy to implement and since it is really economical numerous applications are using it. Most of NFC applications involve the usage of tags, which can easily be duplicated or can be replaced by a fake one. Therefore, though the technology is so useful and secure, this weakness makes it vulnerable to certain attacks.
NFC has numerous applications but in this thesis, I will be discussing various security threats related to NFC applications involving NFC tag and an NFC enabled smartphone, for example smart posters. This thesis will evaluate various security threats like phishing, exposure to adult content etc., what they are and how an attacker can carry out these attacks. Further discussion will be on what an artificial neural network (ANN) is and how it can be used to eliminate these threats. The thesis also proposes a security model that will use ANN, to provide security against threats and will also provide user confidentiality, anonymity and privacy, and a category classifier to increase the overall efficiency of the model and to decrease the memory usage, and will also provide users with an added feature of personalizing their security according to their requirements.
Inhaltsverzeichnis (Table of Contents)
- Abstract
- Chapter 1
- Introduction
- Chapter 2
- Background
- Near Field Communication
- Tag Reader/Writer Mode
- Peer to Peer Mode
- Card Emulation Mode
- NFC tags
- Tag types
- NFC Data Exchange Format (NDEF)
- Reading NDEF data from an NFC tag
- Cryptography
- Symmetric Key Cryptography
- Public Key Cryptography
- Artificial Neural Network (ANN)
- Category Classifier
- Near Field Communication
- Background
- Chapter 3
- NFC Security Threats
- Exposure to Adult/Objectionable content
- Phishing
- Automated malware download and malicious web pages
- Eavesdropping
- Data Corruption
- Data Modification
- NFC Security Threats
- Chapter 4
- Counter-Measures
- Exposure to Adult/Objectionable content
- Phishing
- Automated malware downloads and malicious websites
- Counter-Measures
- Chapter 5
- Proposed Security Model
- Components
- User Sign-Up
- Working
- Personalised Security List
- Data Uploading
- Data Retrieval
- Anonymity
- Proposed Security Model
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This thesis aims to enhance the security of data transmission between NFC tags and NFC-enabled smartphones, particularly focusing on the vulnerabilities of NFC tags. The primary objective is to develop a security model that can effectively protect against various security threats associated with NFC technology, while maintaining a rapid data transmission rate.
- Security threats associated with NFC technology.
- Counter-measures and existing methodologies for securing NFC data transmission.
- The application of artificial neural networks (ANNs) in enhancing NFC security.
- The development and implementation of a secure model that incorporates user anonymity, confidentiality, and privacy.
- The role of a category classifier in optimizing the security model's efficiency and memory usage.
Zusammenfassung der Kapitel (Chapter Summaries)
Chapter 1 introduces the thesis and its primary goal of securing data transmission from NFC tags to smartphones. It highlights the importance of maintaining a rapid data transmission rate while implementing security measures. The thesis outlines the structure of the report, outlining the content of each chapter.
Chapter 2 provides a comprehensive overview of NFC technology, exploring its functionalities and data transmission mechanisms. It delves into various aspects of NFC, including different modes of operation, tag types, and the NFC Data Exchange Format (NDEF). The chapter also discusses cryptography, artificial neural networks (ANNs), and category classifiers, which are crucial concepts for understanding the proposed security model.
Chapter 3 focuses on the various security threats that can compromise NFC technology. It examines the potential impact of these threats on user privacy and outlines how attackers can exploit these vulnerabilities.
Chapter 4 explores various counter-measures that can be implemented to protect users from NFC security threats. It discusses existing approaches and methodologies used to secure NFC data transmission and examines their effectiveness in training artificial neural networks (ANNs).
Schlüsselwörter (Keywords)
The primary focus of this thesis is on securing data transmission between NFC tags and NFC-enabled smartphones. Key areas of focus include NFC security, NFC threats, counter-measures, artificial neural networks (ANNs), category classifier, user anonymity, confidentiality, and privacy.
- Citation du texte
- Siddharth Sharma (Auteur), 2015, Secure data transmission between an NFC tag and an NFC enabled smartphone, Munich, GRIN Verlag, https://www.grin.com/document/337906