Mehr lesen
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.
Inhaltsverzeichnis
Introduction.- Basics.- Exemplary Use-Cases.- Related Work.- Tagging.- Card Emulation.- Software-based Relay Attacks on Existing Applications.- Summary and Outlook.
Zusammenfassung
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.
Zusatztext
“This book focuses on security issues in mobile NFC
devices. … This well-written book is an enhanced version of the author’s PhD
thesis. … this book will be useful for offering an introduction to the security
issues related to NFC. The style of writing is good … . I recommend this book
for security experts, researchers, practitioners, and anyone curious about NFC
security.” (S. V. Nagaraj, Computing Reviews, November, 2015)
Bericht
"This book focuses on security issues in mobile NFC devices. ... This well-written book is an enhanced version of the author's PhD thesis. ... this book will be useful for offering an introduction to the security issues related to NFC. The style of writing is good ... . I recommend this book for security experts, researchers, practitioners, and anyone curious about NFC security." (S. V. Nagaraj, Computing Reviews, November, 2015)