Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/5487
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Çavdar, Davut | - |
dc.contributor.author | Tomur, Emrah | - |
dc.date.accessioned | 2017-05-12T08:15:12Z | - |
dc.date.available | 2017-05-12T08:15:12Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Çavdar, D., and Tomur, E. (2015, May). A practical NFC relay attack on mobile devices using card emulation mode. Paper presented at the 38th International Convention on Information and Communication Technology, Electronics and Microelectronics. doi:10.1109/MIPRO.2015.7160477 | en_US |
dc.identifier.isbn | 9789532330854 | - |
dc.identifier.uri | http://doi.org/10.1109/MIPRO.2015.7160477 | - |
dc.identifier.uri | http://hdl.handle.net/11147/5487 | - |
dc.description | 38th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2015; Grand Hotel Adriatic Congress Centre and Hotel Admiral in Opatija; Croatia; 25 May 2015 through 29 May 2015 | en_US |
dc.description.abstract | In this study, a practical card-emulated relay attack is implemented on Near Field Communication (NFC) equipped mobile devices. NFC is a promising communication technology which is also used in smart mobile devices. As an effective and flexible communication technology, NFC is frequently used in innovative solutions nowadays such as payments, access control etc. Because of the nature of these transactions, security is a critical issue that should be considered in system design and development phases. Although inherited from Radio Frequency Identification (RFID) technology, NFC security needs, requirements and solutions differ in terms of its usage areas and solutions. Based on these parameters, security precautions in communication layer of RFID technology do not prevent relay attacks occurred in the application layer NFC solutions. This study is conducted to prove relay attack practicability with using only mobile phones for relaying credentials instead of RFID based smart cards in an access control application. The Host Card Emulation (HCE) mode also eases relay attacks in NFC communication. The study explains the conceptual description of proposed relay attack, development and operating logic of mobile applications working based on card emulation mode and server software and also data communication basics between modules and web services descriptions. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 38th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2015 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Near field communication | en_US |
dc.subject | Relay attack | en_US |
dc.subject | Card emulation | en_US |
dc.subject | Radio frequency identification | en_US |
dc.subject | Mobile devices | en_US |
dc.subject | Communication technologies | en_US |
dc.title | A practical NFC relay attack on mobile devices using card emulation mode | en_US |
dc.type | Conference Object | en_US |
dc.institutionauthor | Tomur, Emrah | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.startpage | 1308 | en_US |
dc.identifier.endpage | 1312 | en_US |
dc.identifier.wos | WOS:000380405300202 | en_US |
dc.identifier.scopus | 2-s2.0-84946135493 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1109/MIPRO.2015.7160477 | - |
dc.relation.doi | 10.1109/MIPRO.2015.7160477 | en_US |
dc.coverage.doi | 10.1109/MIPRO.2015.7160477 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosqualityttp | Top10% | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.fulltext | With Fulltext | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
14
checked on Nov 22, 2024
WEB OF SCIENCETM
Citations
9
checked on Oct 26, 2024
Page view(s)
314
checked on Nov 18, 2024
Download(s)
772
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.