2017 IEEE 42nd Conference on Local Computer Networks (LCN) 2017
DOI: 10.1109/lcn.2017.39
|View full text |Cite
|
Sign up to set email alerts
|

Can You Get into the Middle of Near Field Communication?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Unfortunately, it has been proven possible in [39] where an eavesdropping attack on a commodity NFC-enabled mobile device has been successful from a distance up to 240 cm. Furthermore, a man-in-the-middle attack has been demonstrated in [40] between two NFC-enabled devices separated by a 10 cm distance. The fact that the security is provided based on a proximity assumption, an attacker can always violate such…”
Section: Near-field Communication (Nfc)mentioning
confidence: 99%
“…Unfortunately, it has been proven possible in [39] where an eavesdropping attack on a commodity NFC-enabled mobile device has been successful from a distance up to 240 cm. Furthermore, a man-in-the-middle attack has been demonstrated in [40] between two NFC-enabled devices separated by a 10 cm distance. The fact that the security is provided based on a proximity assumption, an attacker can always violate such…”
Section: Near-field Communication (Nfc)mentioning
confidence: 99%
“…Also the NFC channel is vulnerable against MITM attacks. Such an attack is demonstrated in the work of Akter, Chakraborty, Khan, et al [10]. Consequently, the NFC channel must be protected against manipulation of transferred information.…”
Section: A Potential Security Threats To Poc Devicesmentioning
confidence: 99%