Publication Type : Journal Article
Publisher : International Journal of Scientific Technology Research
Source : International Journal of Scientific Technology Research, Volume 3, Number 6, p.207-210 (2014)
Url : http://www.ijstr.org/final-print/june2014/Vulnerability-Analysis-And-Security-System-For-Nfc-enabled-Mobile-Phones.pdf
Campus : Coimbatore
School : School of Engineering
Department : Computer Science
Verified : Yes
Year : 2014
Abstract : An encryption system for NFC enabled applications using a combination of AES cryptography algorithm and DiffieHellman key negotiation scheme which when implemented prevents data modification, man in the middle attack and eavesdropping has been proposed in the paper. A timestamp based Protocol where the size of the file and time at which it is sent is retrieved to calculate the estimated time of reception which will be compared with actual reception time is also proposedto prevent relay attacks. A complete study of authentication methodologies in NFC technology and a critical analysis of our proposed system with the existing systems showing how it can resist all the possible attacks on the data exchanged between mobile phones through NFC technology.
Cite this Research Publication : K. S., K., P., ,, ,, and Dr. Harini N., “Vulnerability Analysis and Security System for NFC Enabled Mobile Phones”, International Journal of Scientific Technology Research, vol. 3, pp. 207-210, 2014.