Strengths and Weaknesses of Near Field Communication (NFC) Technology

Download Now
Provided by: Global Journals
Topic: Security
Format: PDF
In this paper, the authors give a comprehensive analysis of security with respect to NFC. They propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. The paper introduced an NFC specific key agreement mechanism, which provides cheap and fast secure key agreement. Key agreement techniques without authentication can be used to provide a standard secure channel. This resistance against Man-In-The-Middle (MITM) attacks makes NFC an ideal method for secure pairing of devices.
Download Now

Find By Topic