To read this content please select one of the options below:

Quick detection of NFC vulnerability: Implementation weakness exploitation

Firman Azhari (School of Electrical Engineering and Informatics, Institut Teknologi Bandung (ITB), Bandung, Indonesia)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 3 June 2014

1250

Abstract

Purpose

The purpose of this research is to explain particular implementation weaknesses of near field communication (NFC) systems done by several institutions which apply for critical purposes and provide practical solutions.

Design/methodology/approach

This research is done by literature studies of previous findings in NFC security, observations of some existing implemented systems and experimentations to provide practical solutions.

Findings

Unintentional lack of security protection of the NFC cards and tags by some card issuers make them a vulnerable target. The outcomes of this research are proposed solutions on methods to quickly detect vulnerability in NFC tags using an Android-based mobile application. Another solution involves the assembly of a detection device using the portable, low power and powerful Raspberry Pi to analyze the NFC tags or cards and NFC reader vulnerabilities.

Research limitations/implications

This research is conducted in Indonesia; therefore, the results and solutions may lack generalizability. However, the findings may occur in other countries which newly apply NFC technology.

Practical implications

System implementer should become more aware about the security issue of old NFC tags like MIFARE Classic. Price should be considered after tag security. People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology.

Social implications

People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology.

Originality/value

This research fulfills an identified need to evaluate the security aspect of a system that uses NFC as one of the main technologies. The results and solutions also provides cheap, easy and practical tools to analyze NFC security.

Keywords

Acknowledgements

The author would like to acknowledge the contributions of Prof Suhono Harso Supangkat, Dr IGB Baskara and Dr Ir. Joko Suryana

Citation

Azhari, F. (2014), "Quick detection of NFC vulnerability: Implementation weakness exploitation", Information Management & Computer Security, Vol. 22 No. 2, pp. 134-140. https://doi.org/10.1108/IMCS-09-2013-0067

Publisher

:

Emerald Group Publishing Limited

Copyright © 2014, Emerald Group Publishing Limited

Related articles