StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Near Field Communication Technology Security Issues - Case Study Example

Cite this document
Summary
The study "Near Field Communication Technology Security Issues" critically analyzes, establishes, and discusses the various possible security risks associated with the use of NFC technology, a form of technology that utilizes Smartphone technology in the enhancement of services…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Near Field Communication Technology Security Issues
Read Text Preview

Extract of sample "Near Field Communication Technology Security Issues"

? NFC Security issues: A case study Introduction Near Field Communication technology is a form of technology that utilises the Smartphone technology in the enhancement of services such as contactless payments through pre-stored information in the credit cards. It is the current technology that has the capabilities to turn one’s cell phone into an array of several other functions such as being a wallet to be used for currency, a key to locking and unlocking items and a form of personal identification. The technology due to its promising security features has been widely embraced by most people and organizations that perceive it more relatively efficient in usage than other forms of technology. Particularly, this form of technology is quite popular in advanced nations such as Japan (Gordon & British Computer Society, 2007). However, according to various studies that have been conducted into the technology, especially in the UK by a team of researchers from Surrey University, an alarm is fast being raised about the security risks involved with the same, particularly with regard to the safety of private information of a client that is stored in it. This is because, the likely threats that arise are when the transmission for payments are made, which can be a few meters away from the payment terminal, may create a window of opportunity for someone to tap into the same and transmit that same private information to another phone for their own malicious use. In this paper, I seek to establish and discuss the various possible security risks associated with the use of NFC technology. This may include eavesdropping as slightly mentioned above, data or message corruption or modification, and interception or relay attacks. Another risk can be the physical theft of the Smart phones in order to gain access to the required passwords and credit card details. In order to ensure that trust in the continued use of this technology is maintained, there should be efficient means by which the breaches in the security can be prevented (Taylor & British Computer Society, 2008). a. Eavesdropping This form of security risk is one which occurs when there is an inappropriate listening of the NFC transactions by an unauthorised third party. Criminals who practice this form of activity engage in it with the intent of copying such transactions so as to capture the transcript images of the NFC passwords and other financial information contained in it that are related to the user’s credit cards. This form of a security breach is the most common today and happens in the manner that the criminal needs not pick on only one signal to be able to gather the required information but, collects all the available data at that particular point and scams through them until the sufficient matches are met. To be able to prevent this form of a security breach or risk on Near Form Communication (NFC) technology, there are two main methods that can be efficiently applied. The first solution is in line with the determination of the range of NFC transactions from the purchase terminal. Since the NFC data theft devices used by the criminals require close range to work in, it is essential that a short range transmission of the signals be adopted so that users have to get nearer to the terminal point to use NFC and not send the signals from a far off distance. If the signals are made to be close ranged, the criminals are denied the opportunity to tap into the channel as in order to do so, they will require moving closer to the terminal points, which implies risking arrests. However, in case of a more determined eavesdropper, the short signal range may not be deterrent to their malice; hence, the concerned NFC authorities need to adopt much safer means to shield users from such kind of data theft from eavesdropping. The second most efficient means by which this problem can be solved is through the use of secure channels when making NFC transactions. When the NFC users are capable of establishing secure channels for their transactions, which are mostly encrypted, it becomes extremely difficult for eavesdroppers to get through or into it since, that would require them to have authorization of the same. This method seems more effective than the former since it entails the use of specific devices to decode the information sent through NFC technology. As such, it should be the responsibility of every NFC user to ensure that the organization they transact with, be it a bank or restaurant has a secure channel over which NFC technology can be used. b. Data or message corruption or modification This is another form of security risk that arises from the use of the NFC technology. This form of threat is nearly similar to that of eavesdropping except for the fact that the criminal in this case instead of tapping into the data, manipulates or distorts the nature of the data that is being sent through the NFC technology to the reader so that it appears corrupted when it gets to the intended destination. The intention of carrying out this form of malice is still unknown since, in most instances, the criminals do not take the information and use it for their own gain. A message modification operates in the form of a middleman existing between the two NFC devices, cell phone and NFC reader, to alter and change the information that passes across his/her device into the intended devices. The only best option through which this form of security risk to NFC technology can be prevented is when a secure channel is adopted for the communication of the NFC information. In some instances, the various organizations can acquire the NFC devices that have the capability to listen for any forms of data corruption attacks and prevent the same from taking place (Berna et al, 2010). c. Interception or relay attacks This is another form of security risk or threat to NFC technology in which the data manipulation is enhanced. According to this form of attack, a person acts as a middleman between the two NFC devices and receives and alters the subsequent information that passes through them. This is the most difficult form of attack to NFC technology and the least common to detect. According to the Surrey University stud, this study if not properly detected and analyzed, can prove to be the most lethal and yet most difficult form to solve. Consequently, the study recommends that the most efficient way by which to deal with this threat would be to use NFC devices that are in an active-passive pairing. The implication of having this form of arrangement implies that one device cannot perform the two functions of receiving and sending the NFC information at the same time. Therefore, it would be essential that there be two devices with one device solely receiving the data while the second device solely tasked with sending of the data. This study was against the intention of having one Near Form Communication devices receiving and sending the information at the same time. This is because the same can slow the process and thus, create a window of opportunity for the data criminals to tap into the system. d. Theft of the NFC cell phones This is the last form of threat to the NFC technology, which is quite tricky since it cannot be prevented even with the greatest form of data encryption. In this form of security risk, the owner of a phone may suffer from the loss of their NFC device when criminals attack them and steal it from them this is very lethal as it exposes all of the private NFC information of the user which were stored in the phone (Whitman & Mattord, 2012). The best way by which this threat can be prevented or at least if it occurs, the NFC accounts of a user remains safe is to set up passwords for the phones. As such, when the thieves cannot be able to unlock one’s phone, they would not be able to gather NF information from a particular phone. Conclusion In the world today, technology has changed or completely altered the form and manner in which transactions are conducted. One such avenue is the adoption of NFC technology. While it may appear that this form of technology is the most efficient and secure, still security issues dodge its application as most people are afraid of losing or exposing their private information over the channel that can be easily attacked by criminals. Therefore, the only feasible way by which its continued use and application by most users than using credit cards would be to ensure that there are efficient data encryption and communication channels that are secure. This will guarantee that there would be no hacking of the same information by fraudsters when one attempts to use the same NFC technology in conducting their transactions (Jung & Yung, 2012). References Berna, S., Yalcin, O., & International Workshop on Radio Frequency Identification: Security and Privacy Issues, RFIDSec. (2010). Radio frequency identification: security and privacy issues: 6th international workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010 : revised selected papers. Berlin [etc.: SpringerLink. Gordon, K., & British Computer Society. (2007). Principles of data management: Facilitating information sharing. Swindon: British Computer Society. Jung, Souhwan, & Yung, Moti. (2012). Information Security Applications: 12th International Workshop, Wisa 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers. Springer-Verlag New York Inc. Taylor, A., & British Computer Society. (2008). Information security management principles: An ISEB certificate. Swindon: British Computer Society. Whitman, M. E., & Mattord, H. J. (2012). Principles of information security. Boston, MA: Course Technology. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“NFC Security Issues: A Case Study Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/design-technology/1497259-nfc-security-issues-a-case-study
(NFC Security Issues: A Case Study Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/design-technology/1497259-nfc-security-issues-a-case-study.
“NFC Security Issues: A Case Study Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/design-technology/1497259-nfc-security-issues-a-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Near Field Communication Technology Security Issues

Technology Support System for Homeland Security

TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND security Technology Support System for Homeland security TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND security Executive Summary The Department of Homeland security or DHS was created by former U.... President Barack Obama perceives to be a “systemic failure in the existing homeland security services (Newsweek, an.... TECHNOLOGY SUPPORT SYSTEM FOR HOMELAND security Problem Identification The September 11, 2001 terrorist attacks in the United States have greatly dismayed Americans on their vulnerability to terrorism at home....
9 Pages (2250 words) Assignment

Search and Seizure: 1700s Reasoning and 2000s Technology

To conclude, the researcher states that the US constitution requires to be overhauled to address such issues.... This term paper dscribes the United States Constitution Amendment Four, that was written in the year 1791 and stipulates that people have a right to be always secure in their houses, persons, or papers....
15 Pages (3750 words) Term Paper

Computer Security or Ethical Issue

This paper outlines various security issues along with their solutions.... This research paper "Computer security or Ethical Issue" shows that due to the amazing efficiency of a computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance.... Therefore, computer system security is considered to be a vital aspect of any organization.... Furthermore, web-based technology and digital companies make it simple to collect, incorporate, and share business information, offering new fears regarding the suitable usage of customer details, the safety of individual confidentiality, as well as the security of the intellectual property of the organization (Armor2net Software Ltd....
9 Pages (2250 words) Research Paper

Near Field Communication

This report "near field communication" discusses what NFC is, as it stands for near field communication.... For instance, a handheld device will become a multipurpose device that may also eliminate security issues, as a single device is easy to manage.... In the same context, mobile payment methods are in reach, as new field communication (NFC) is embedded in many mobile chipsets around the globe (Ondrus, Pigneur 2009).... One significant advantage of using a contactless smartcard from the traditional smart cards made of plastic embedded with a magnetic strip or security chip is that the card reader becomes faulty....
6 Pages (1500 words) Report

Technology versus Humanity

Name Professor Class 12 April 2012 technology versus Humanity I was born in the year 1978.... The most surprising technology introduced that directly influenced our lives and was a major breakthrough in the field of entertainment was perhaps the introduction of Walkman brand of portable stereo players by Sony in the year....  With the development of new technology over time, our productive capabilities as well as our lifestyle have changed.... technology has not only improved in entertainment sector as with the development from a Sony Walkman to smart phones we use today, but this change can be applied to every field....
9 Pages (2250 words) Research Paper

Near Field Communication and Contactless Technologies

The near field communication technology has been incorporated in contactless card standard hence making it possible to use devices which are NFC-enabled instead of credit and debit cards thereby reducing the weight to customers, For instance, there has been a proposal of several NFC – enabled smartphones to be used with Paywave, NFC-enabled makes it possible for users to make payments by using their phone devices in the place of credit or debit cards (visa 2012).... The paper "near field communication and Contactless Technologies" concerns that NFC technology is also compatible with the existing RFID structures making it easier for firms that already make use of these RFID structures to adopt this technology hence saving the cost starting from scratch....
6 Pages (1500 words) Assignment

Security in Short Range Wireless Networks

The paper "security in Short Range Wireless Networks" argues security can be achieved through the establishment of a secure channel.... To combat the security threats faced by this short-range wireless communication, several techniques have been brought forward.... This paper is aimed at evaluating the various threats faced by the short-range wireless networks and the effective solutions to these security threats.... ne of the security problems is eavesdropping....
12 Pages (3000 words) Case Study

Near field communication (NFC) and its validity as a secure system of data transfer

The increasing number of applications that require short-range wireless communication has led to an increase in technologies that are designed to meet such a need, including the near field communication (NFC).... The short range of the NFC s vital for its success Near Field Commuication By near field communication (NFC) The increasing number of applications that require short-range wireless communication has led to an increase in technologies that are designed to meet such a need, including the near field communication (NFC)....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us