A Countermeasure against Relay Attack in NFC Payment

被引:2
|
作者
Li, Peng [1 ]
Fang, Huayi [1 ]
Liu, Xiang [1 ]
Yang, Baijian [1 ]
机构
[1] Dept Comp & Informat Technol, 401 N Grant St, W Lafayette, IN 47907 USA
关键词
Relay Attack; Mobile payment; Near Field Communication; Android Security;
D O I
10.1145/3018896.3025144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Near Field Communication (NFC) is a convenient short range contactless communication method that is receiving more and more attentions for its simplicity to support mobile payment. Influential industry players, such as Apple, Google and Samsung have integrated NFC technology in their mobile payment applications, i.e. Apple Pay, Android Pay and Samsung Pay, respectively. To deploy NFC for mobile payment, one of the most significant concern is its security. In this article, we proposed a countermeasure to fight against Replay attacks. While some existing work has proposed to set a time bound to prevent relay attack based on the assumption that a relay attack will take much longer time to complete than a normal NFC transaction. Existing approaches however did not address the situation when cloud-based authentication is involved and may confuse it as a relay attack. We extended the time-bound approach in this work and presents a comprehensive estimate of normal transactions versus relayed transactions. A prototype Android application was also built to prove the correctness of the proposed approach.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Countermeasure of NFC Relay attack with Jamming
    Oh, SungTaek
    Doo, Taekyun
    Ko, Taehyung
    Kwak, Jin
    Hong, Manpyo
    2015 12TH INTERNATIONAL CONFERENCE & EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2015,
  • [2] Implementation of an RFID Relay Attack Countermeasure
    Guizani, Sghaier
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 1318 - 1323
  • [3] NFC Payment Spy: A Privacy Attack on Contactless Payments
    Mehrnezhad, Maryam
    Ali, Mohammed Aamir
    Hao, Feng
    van Moorsel, Aad
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 92 - 111
  • [4] Implementation and Analysis of a Practical NFC Relay Attack Example
    Wang, Zhao
    Xu, Zhigang
    Xin, Wei
    Chen, Zhong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 143 - 146
  • [5] Countermeasure against the Jacobi symbol attack
    Computational Science Graduate Program, Universidad Nacional Aut´onoma de &#7742exico, Campus Cuautitĺan, Av. 1 de Mayo s/n, Col. Atlanta. 54740 Cuautitĺan Izcalli, United States
    WSEAS Trans. Comput., 12 (407-416):
  • [6] An NFC Relay Attack with Off-the-shelf Hardware and Software
    Bocek, Thomas
    Killer, Christian
    Tsiaras, Christos
    Stiller, Burkhard
    MANAGEMENT AND SECURITY IN THE AGE OF HYPERCONNECTIVITY, AIMS 2016, 2016, 9701 : 71 - 83
  • [7] An Effective Countermeasure Against UAV Swarm Attack
    He, Daojing
    Yang, Guang
    Li, Hongyi
    Chan, Sammy
    Cheng, Yao
    Guizani, Nadra
    IEEE NETWORK, 2021, 35 (01): : 380 - 385
  • [8] Countermeasure of TWINE against Power Analysis Attack
    Nozaki, Yusuke
    Asahi, Kensaku
    Yoshikawa, Masaya
    2015 IEEE INTERNATIONAL MEETING FOR FUTURE OF ELECTRON DEVICES, KANSAI (IMFEDK), 2015,
  • [9] Timing Attack and Countermeasure on NEMS Relay Based Design of Block Ciphers
    Mazumdar, Bodhisatwa
    Saeed, Samah Mohamed
    Ali, Sk Subidh
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (03) : 317 - 328
  • [10] A Countermeasure to Defend Against Relay Attacks in Wireless Networks
    Tang, Caimu
    Wu, Dapeng Oliver
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,