The Complexity of Security Studies in NFC Payment System
نویسندگان
چکیده
If we compare the security problem of a face-to-face contactless card payment process with a mobile phone NFC payment process, we may easily consider that the latter is far more difficult to study. Indeed, the more partners from different organizations involved in the process there are, the more complex the studies are and, accordingly, its protection. As well as the current solutions applied to studying the electronic payment security chain (Common Criteria, ISO 27005, etc), the James Reason model has pointed out the specific risks implied by the interaction between the different links in a complex chain. His theory has been applied to various fields (airplanes, nuclear power plants, health, etc) and various ways of studying it have been proposed. In this article we will attempt to apply his model to the complex electronic payment chain required by the NFC payment process.
منابع مشابه
Secure Authentication Protocol for NFC Mobile Payment Systems
Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...
متن کامل“Payment with mobile NFC phones” How to analyze the security problems
We present in this paper a method to analyze the security problems which can occur in a NFC mobile phone payment. In the first section, we give a simplified description of the technical realization for this pilot limited to a part of the system. In the second section, we present the security concepts as a major issue in this scenario. Roughly main requirement is to have same level of security a...
متن کاملDEMO: NFCGate - An NFC Relay Application for Android
Near Field Communication (NFC) is a technology widely used for security-critical applications like access control or payment systems. Many of these systems rely on the security assumption that the card has to be in close proximity to communicate with the reader. We developed NFCGate, an Android application capable of relaying NFC communication between card and reader using two rooted but otherw...
متن کاملPractical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a short-range contactless technology allowing mobile devices to act primarily as either a reader or a token. Relay attacks exploit the assumption that a contactless token within communication range is in close proximity, by pla...
متن کاملMobile Payment Ecosystems in Transition
One of the most prominent mobile payment technologies of interaction paradigms is Near Field Communication (NFC), which provides simple and secure two-way communication between electronic devices. However, NFC-based services have not increased as expected. In this paper, the NFC payment ecosystems are introduced and reasons to why their use has not rapidly become more prevalent are discussed. T...
متن کامل