Advertisement

Exemplary Use-Cases

  • Michael RolandEmail author
Chapter
Part of the T-Labs Series in Telecommunication Services book series (TLABS)

Abstract

This chapter introduces various practical use-case scenarios of Near Field Communication (NFC). These use-cases are then transformed into more general scenarios. Based on the generalized use-cases, security aspects of NFC applications are identified.

Keywords

Mobile Phone Shared Secret Near Field Communication Secure Element Integrity Protection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    carIT: Autos brauchen Schutz vor Hacker-Attacken. carIT Mobilität 3.0. http://www.car-it.com/secunet-infotainment-hacker-sicherheit/id-0012184 (2010)
  2. 2.
    Ecma International: ECMA-385: NFC-SEC: NFCIP-1 Security Services and Protocol (2008)Google Scholar
  3. 3.
    Ecma International: ECMA-386: NFC-SEC-01: NFC-SEC cryptography standard using ECDH and AES (2008)Google Scholar
  4. 4.
    European Commission: Progress Report on the Single European Electronic Communications Market (15th Report). Commission Staff Working Document SEC (2010) 630 final (2010)Google Scholar
  5. 5.
    GlobalPlatform: Card specification. Version 2.2.1 (2011)Google Scholar
  6. 6.
    Grünweg, T.: Lernfähiger Routenplaner: Big Navi is watching you. http://www.spiegel.de/auto/aktuell/0,1518,608617,00.html. Spiegel Online (2009)
  7. 7.
    GSMA: Mobile NFC services. Version 1.0. White paper (2007)Google Scholar
  8. 8.
    Hoppe, T., Kiltz, S., Dittmann, J.: Security Threats to Automotive CAN Networks—Practical Examples and Selected Short-Term Countermeasures. In: Computer Safety, Reliability, and Security. LNCS, vol. 5219/2008, pp. 235–248. Springer, Berlin Heidelberg (2008). doi: 10.1007/978-3-540-87698-4_21
  9. 9.
    International Organization for Standardization: ISO/IEC 13157: Information technology—Telecommunications and information exchange between systems—NFC Security (Parts 1–2) (2010)Google Scholar
  10. 10.
    Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 447–462. IEEE, Oakland, CA, USA (2010). doi: 10.1109/SP.2010.34
  11. 11.
    Langer, J., Roland, M.: Anwendungen und Technik von Near Field Communication (NFC). Springer, Heidelberg (2010)Google Scholar
  12. 12.
    Larson, U.E., Nilsson, D.K.: Securing vehicles against cyber attacks. In: Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW ’08). ACM, Oak Ridge, TN, USA (2008). doi: 10.1145/1413140.1413174
  13. 13.
    NFC Forum: Connection Handover. Technical specification, version 1.1 (2008)Google Scholar
  14. 14.
    Roland, M., Langer, J., Bogner, M., Wiesinger, F.: NFC im Automobil: Software bringt Ökonomie und braucht Sicherheit. In: Höfler, L., Kastner, J., Kern, T., Zauner, G. (eds.) Energieeffiziente Mobilität, Informations- und Kommunikationstechnologie, pp. 112–119. Shaker, Aachen (2010)Google Scholar
  15. 15.
    Steffen, R., Preißinger, J., Schöllermann, T., Müller, A., Schnabel, I.: Near Field Communication (NFC) in an automotive environment. In: Proceedings of the Second International Workshop on Near Field Communication (NFC 2010), pp. 15–20. IEEE, Monaco (2010). doi: 10.1109/NFC.2010.11
  16. 16.
    Wolf, M., Weimerskirch, A., Wollinger, T.: State of the art: embedding security in vehicles. EURASIP J. Embed. Syst. 2007: 074706 (2007). doi: 10.1155/2007/74706

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.School of Informatics/Communications/MediaUniversity of Applied Sciences Upper AustriaHagenbergAustria

Personalised recommendations