User Behavior Based Enhanced Protocol (UBEP) for Secure Near Field Communication
Authors: Vinay Gautam, Vivek Gautam
Abstract:
With increase in the unauthorized users access, it is required to increase the security in the Near Field Communication (NFC). In the paper we propose a user behavior based enhanced protocol entitled ‘User Behavior based Enhanced Protocol (UBEP)’ to increase the security in NFC enabled devices. The UBEP works on the history of interaction of a user with system.The propose protocol considers four different factors (touch, time and distance & angle) of user behavior to know the authenticity or authorization of the users. These factors can be same for a user during interaction with the system. The UBEP uses two phase user verification system to authenticate a user. Firstly the acquisition phase is used to acquire and store the user interaction with NFC device and the same information is used in future to detect the authenticity of the user. The second phase (recognition) uses analysis of current and previous scenario of user interaction and digital signature verification system to finally authenticate user. The analysis of user based input makes a NFC transaction more advance and secure. This security is very tactical because it is completely depends on usage of the device.
Keywords: Security, Network Field communication, NFC Protocol.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1336564
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2012References:
[1] Annika Paus, "Near Field Communication in Cell Phones”,in Chair for Embedded Security, 24.07.2007.
[2] Ernst Haselsteiner and KlemensBreitfu, Security in Near Field Communication (NFC), in Workshop on RFID Security RFIDSec, 2006.
[3] C.Mulliner, "Attacking NFC mobile phone”, SIT Fraunhofer - EUSecWest - 85.10.227.147, http://www.mulliner.org/collin/acad emic/, 2008
[4] David M. Monteiro, Joel J. P. C. Rodrigues and Jaime Lloret, "A Secure NFC Application for credit Transfer Among Mobile Phones.”International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1 – 5 ISBN: 978-1-4673-1549-4, doi:10.1109/CITS.2012.6220369, 2012.
[5] Michael Roland, Josef Langer and Josef Scharinger, "Security Vulnerabilities of the NDEF Signature Record Type.” 3rd International Workshop on Near Field Communication (NFC), pp. 65 – 70, ISBN:978-1-61284-176-2, doi: 10.1109/NFC.2011.9, 2011.
[6] Lishoy Francis, Gerhard Hancke, Keith Mayes, KonstantinosMarkantonakis, "Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.” IOS press, doi: 10.32.33/978-1-61499-143-4-2-1, 2012
[7] A. Arutaki, D. Cavendish, H. Sakai, A. Matsumoto and Y. Oie, "Direction of Wireless Access Convergence; Can Near Field Communication (NFC) Be a Member of Future Internet.”ICMU, 2012.
[8] H. Sakai and A. Arutaki, "Protocol Enhancement for Near Field Communication (NFC); Future Direction and Cross-Layer Approach,” IEEE INCoS2011, November 2011, Fukuoka, Japan.
[9] Information technology – Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1), ISO/IEC 18092, Second edition, 2013-03-15.
[10] PN65 Chip, http://www.nfc.cc/technology/nxp-nfc-chips/,2012
[11] Kiran S. Kadambi, Jun Li and Alan H. Karp,”Near-field communication-based secure mobile payment service”, in ICEC '09 Proceedings of the 11th International Conference on Electronic Commerce, pp. 142-151, 2009.
[12] Francis, L., R. Holloway, Egham, Hancke, G., Mayes, K. and Markantonakis, K.,”A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions”, in Telecommunications (AICT), pp. 452 – 461, 2010.
[13] Aigner, M., Dominikus, S. and Feldhofer, M.,”A System of Secure Virtual Coupons Using NFC Technology”, In Pervasive Computing and Communications Workshops, PerCom Workshops '07. Fifth Annual IEEE International Conference, pp. 362 – 366, 2007.
[14] Z. Antoniou and D.N. Kalofonos, "NFC-based Mobile Middleware for Intuitive user Interaction with Security in Smart Homes”, in