Near Field Communication (NFC) is a new technology which can provide communication between mobile devices in short range. Data would be communicate in three modes: (1) between two mobile systems (MS), (2) MS2 NFC tags (3) reader2MS. One of the must public application in this technology is micropayment system, so by developing NFC technology it would be used in E-commerce and e-everything. In combination of E-Commerce and NFC technology MS would be used as smart card. It is clear that by developing one technology we should consider security and protection system for that. Therefore NFC security and protecting MS from attacks and eavesdropping is so important and critical. In this article at the first we will briefly review about this technology and the architecture, in the next step we will explain about NFC threats therefore we can analyze the attack. After that we will describe some scenarios for protecting against the NFC threats. Then we will explain NFC security standards. In this part we will mention to SSH and SCH, we will show that in secure channel we should use a symmetric algorithm. In this standard AES is has been recommended but we will show that two fish algorithm is more complex than in AES on the other hand we will simulate our proposed approach and we will show that the power consumption and processing time are decreased.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.