Vis enkel innførsel

dc.contributor.advisorBoyd, Colin Alexandernb_NO
dc.contributor.authorChu, Xiqingnb_NO
dc.date.accessioned2014-12-19T14:16:10Z
dc.date.available2014-12-19T14:16:10Z
dc.date.created2014-08-29nb_NO
dc.date.issued2014nb_NO
dc.identifier742061nb_NO
dc.identifierntnudaim:12078nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/262988
dc.description.abstractNear Field Communication (NFC) is a set of standards, which allows two devices to transfer messages over a short range of distance of 10 cm. NFC based smart cards and applications are widely used for public transportation, ticketing system and security critical identity cards. NFC contains mainly two proximity smart card specifications ISO 14443 and ISO 18092 for lower level data exchange. However, none of the specifications above provides security mechanism to protect communication between smart card and reader device.Regardless the variety of different application protocols that developers implement on both smart card and reader side, the communication in between is vulnerable and easy to be tempered. With available commodity smart card readers, mobile phone with NFC read/write functionalities. Attacker can monitor and relay messages between card and reader without the actual present of the real smart card. In this scenario, the card holder won't be noticed that his/her card has been used already. This thesis would study and understand a public transportation ticketing system based on DESFire cards. Student would investigate whether replay attack using two proxy devices is possible or not. After establishment of attack, student observes what would be the consequences of the replay attack on public transportation system and the valuable assets attackers can profit on during the attack. Student would develop Android programs on NFC based phones to perform research. Testing environment would be built on legacy Java and C code. Possible attacks experiment would be carried on real public ticketing system. Bases on the findings from research, student will try to recommend solutions to improve the ticket protocol that this system is unaffected by the relay attack or at least minimize the profit that attacker can get.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.titleRelay attacks of NFC smart cardsnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber77nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel