Professional Documents
Culture Documents
Field
Communication
Contents
Introduction Standards and Compatibility Technology Overview Communication Coding and odes! "ctive and Passive odulation iller Code
anchester Code odi#ied Initiator and Target Collision "voidance $eneral Protocol #low Comparison with other Technologies NFC and %FI& Comparison with 'luetooth and In#rared Security "spects (avesdropping &ata &estruction &ata odi#ication &ata Insertion an)in)the) iddle)"ttac* Conclusion
Introduction
Near Field Communication (NFC) is a technology #or contactless short)range communication+ 'ased on the %adio Fre,uency Identi#ication (%FI&)- it uses magnetic #ield induction to enable communication between electronic devices+ The number o# short)range applications #or NFC technology is growing continuously- appearing in all areas o# li#e+ (specially the use in con.unction with mobile phones o##ers great opportunities+ The main applications are! Payment & ticketing NFC enables users to ma*e #ast and secure purchases- go shopping with electronic money- and also to buy- store and use electronic tic*ets- such as concert/event tic*ets- plane tic*ets- travel cards- etc+ Electronic keys For e0ample- these can be car *eys- house/o##ice *eys- etc+ Identification In addition- NFC ma*es it possible to use mobile phones instead o# identity documents+ In 1apan- #or e0ample- student I&s can be stored on cell phonewhich allows the students to electronically register #or classes- to open loc*ed campus doors- buy #ood at the school ca#eteria- borrow boo*s- and even get discounts at local movie theaters- restaurants- and shops+ 2 %eceive and share in#ormation The data stored on any tagged ob.ect (e+g+ a &3& bo0 or a poster) can be accessed by mobile phones in order to download movie trailers- street)mapstravel timetables etc+ 2 Set)up service To avoid the complicated con#iguration process- NFC can be used #or the set)up o# other longer)range wireless technologies- such as 'luetooth or 4ireless 5"N+ 6p to now the convenience o# NFC is mostly used in "sia- #or instance in 1apan or South 7orea- where paying with a mobile phone or a NFC)smartcard already
belongs to everyday li#e+ In September 899:- "'I research predicted that by 89;;- about <9= o# the mobile phones in the world (about >?9 million phones) would be NFC)enabled+ In this paper we will discuss the characteristics o# NFC+ 4e start with the underlying Standards and Compatibility in Chapter 8- be#ore we will consider the basic technology capabilities in Chapter <+ Chapter > deals with the correlation between NFC and %FI& and con#ronts NFC with 'luetooth and in#rared+ Chapter ? observes the Near Field Communication #rom the security point o# viewconsidering di##erent types o# attac*+ In Chapter : the ma.or results o# this wor* are summari@ed+
contactless interconnection technologies- NFC is compatible with todayEs #ield proven %FI&)technology+ That means- it is providing compatibility with the millions o# contactless smartcards and scanners that already e0ist worldwide+
Technology Overvie
NFC operates in the standard- globally available ;<+?: G@ #re,uency band+ Possible supported data trans#er rates are ;9:- 8;8 and >8> *bps and there is potential #or higher data rates+ The technology has been designed #or communications up to a distance o# 89 cm- but typically it is used within less than ;9 cm+ This short range is not a disadvantage- since it aggravates eavesdropping+
Passive In this mode the communication ta*es place between an active and a passive device+ The passive device has no battery and uses the %F #ield generated by the active device+ In general- at most two devices communicate with each other at the same time+ Gowever- as de#ined in C8D- H;;+8+8+<- in passive mode the initiator (see Section This is reali@ed by a time slot method- which is used to per#orm a Single &evice &etection (S&&)+ The ma0imal number o# time slots is limited to ;:+ " target responds in a random chosen time slot that may lead to collision with the response o# another target+ In order to reduce the collisions- a target may ignore a polling re,uest set out by the initiator+ I# the initiator receives no response- it has to send the polling re,uest again+
!anchester Code
The anchester coding depends on two possible transitions at the midpoint o# a period+ " low)to)high transition e0presses a 9 bit- whereas a high)to)low transition stands #or a ; bit+ Conse,uently- in the middle o# each bit period there is always a transition+ Transitions at the start o# a period are not considered+ "mplitude)shi#t *eying is a #orm o# modulation that represents digital data as variations in the amplitude o# a carrier wave+
Collision #voidance
6sually misunderstandings are rather rare- since the devices have to be placed in direct pro0imity+ The protocol proceeds #rom the principle! listen be#ore tal*+ I# the initiator wants to communicate- #irst- it has to ma*e sure that there is no e0ternal %F #ield- in order not to disturb any other NFC communication+ It has to wait silently as long as another %F #ield is detected- be#ore it can start the communication- a#ter an accurately de#ined guard)time (C8D- H;;+;)+ I# the case occurs that two or more targets answer at e0actly the same time- a collision will be detected by the initiator+
Comparison
%&C and '&I(
'asically- the technologies %adio Fre,uency Identi#ication and Near Field Communication use the same wor*ing standards+ Gowever- the essential e0tension o# %FI& is the communication mode between two active devices+ In addition to contactless smart cards (ISO ;>>>< CFD)- which only support communication between powered devices and passive tags- NFC also provides peer)to)peer communication+
Thus- NFC combines the #eature to read out and emulate %FI& tags- and #urthermore- to share data between electronic devices that both have active power+
Comparison
Compared to other short)range communication technologies- which have been integrated into mobile phones- NFC simpli#ies the way consumer devices interact with one another and obtains #aster connections+ The problem with in#rared- the oldest wireless technology introduced in ;BB<- is the #act that a direct line o# sight is re,uired- which reacts sensitively to e0ternal in#luences such as light and re#lecting ob.ects+ The signi#icant advantage over 'luetooth is the shorter set)up time+ Instead o# per#orming manual con#igurations to identi#y the otherEs phonethe connection between two NFC devices is established at once (I9-;s)+ "ll these protocols are point)to)point protocols+ 'luetooth also supports point)to multipoint communications+ 4ith less than ;9 cm- NFC has the shortest range+ This provides a degree o# security and ma*es NFC suitable #or crowded areas+ The data trans#er rate o# NFC (>8> *bps) is slower than 'luetooth (F8; *bps)- but #aster than in#rared (;;? *bps)+ In contrast to 'luetooth and in#rared NFC is compatible to %FI&+
Security #spects
In this chapter- we want to analy@e the security o# NFC+ In this conte0t two very interesting papers have been published+ In CBD (rnst Gaselsteiner and 7lemens 'reit#uJ discuss some threats and solution #or the security o# NFC- and also the paper KSecurity "spects and Prospective "pplications o# %FI& SystemsK C;<D gives some use#ul in#ormation+ First o# all it should be mentioned that the short communication range o# a #ew centimeters- though it re,uires conscious user interaction- does not really ensure secure communication+ There are di##erent possibilities to attac* the Near Field Communication technology+ On the one hand the di##erent used devices can be manipulated physically+
This may be the removal o# a tag #rom the tagged item or wrapping them in metal #oil in order to shield the %F signal+ "nother aspect is the violation o# privacy+ I# proprietary in#ormation is stored on a tag it is important to prevent #rom unauthori@ed read and write access+ "s outlined in C;<D read)only tags are secure against an unauthori@ed write access+ In the case o# rewritable tags we have to assume that attac*ers may have mobile readers and the appropriate so#tware which enable unauthori@ed read and write access i# the reader distance is normal+ In this wor* we want to #ocus on attac*s with regard to the communication between two devices+ For detecting errors- NFC uses the cyclic redundancy chec* (C%C)+ This method allows devices to chec* whether the received data has been corrupted+ In the #ollowing- we will consider di##erent possible types o# attac*s on the NFC communication+ For most o# these attac*s there are countermeasures in order to avoid or at least reduce the threats+
Eavesdropping
NFC o##ers no protection against eavesdropping+ %F waves #or the wireless data trans#er with an antenna enables attac*ers to pic* up the transmitted onitoring data+ In practice a malicious person would have to *eep a longer distance in order not to get noticed+ The short range between initiator and target #or a success#ul communication is no signi#icant problem- since attac*ers are not bound by the same transmission limits+ Conse,uently the ma0imum distance #or a normal read se,uence can be e0ceeded+ The ,uestion how close an attac*er has to be located to retrieve an usable %F signal is di##icult to answer+ Furthermore- eavesdropping is e0tremely a##ected by the communication mode+ ThatEs because- based on the active or passive mode- the trans#erred data is coded and modulated di##erently (see Section <+8)+ I# data is trans#ered with stronger modulation it can be attac*ed easier+ Thus- a passive device- which does not generate itEs own %F #ield is much harder to attac*- than an active device+ In
order to let the reader presume the ris* resulting #rom eavesdropping- there are given rough distances in CBD! K4hen a device is sending data in active modeeavesdropping can be done up to a distance o# about ;9 m- whereas when the sending device is in passive mode- this distance is signi#icantly reduced to about ; m+K Gowever- we assume that such attac*s will occur since the re,uired e,uipment is available #or everyone+ (,uipped with such an antenna a malicious person that is able to passively monitor the %F signal may also e0tract the plain te0t+ (0perimenting and literature research can be used to get the necessary *nowledge+ Gence- the con#identiality o# NFC is not guaranteed+ For applications which transmit sensitive data a secure channel is the only solution+ In C;>D some more detailed in#ormation o# this attac* are given+ ?+8 &ata &estruction "n attac*er who aspires data destruction intends a corruption o# the communication+ The e##ect is that a service is no longer available+ Still- the attac*er is not able to generate a valid message+ Instead o# eavesdropping this is not a passive attac*+ This attac* is relatively easy to reali@e+ One possibility to disturb the signal is the usage o# a so called %FI& 1ammer+ There is no way to prevent such an attac*- but it is possible to detect it+ NFC devices are able to receive and transmit data at the same time+ That means- they can chec* the radio #re,uency #ield and will notice the collision+ ?+< &ata ?+< &ata odi#ication ;? odi#ication
6nauthori@ed changing o# data- which results in valid messages- is much more complicated and demands a thorough understanding+ "s we will point out in the #ollowing- data modi#ication is possible only under certain conditions+ In order to modi#y the transmitted data an intruder has to concern single bits o# the %F signal+ "s already mentioned in Section <+8 data is send in di##erent ways+ The #easibility o# this attac*- that means i# it is possible to change a bit o# value 9 to
; or the other way around- is sub.ect to the strength o# the amplitude modulation+ I# ;99= modulation is used- it is possible to eliminate a pause o# the %F signalbut not to generate a pause where no pause has been+ This would demand an impracticable e0act overlapping o# the attac*ers signal with the original signal at the receiverEs antenna+ Gowever- Near Field Communication technology uses modulation o# ;99= in con.unction with the modi#ied changed by an attac*er is- where a ; is #ollowed by another ;+ 'y #illing the pause in two hal# bit o# the %F signal the decoder receives the signal o# the third case+ &ue to the agreement o# the preceding bit the decoder would veri#y a valid one+ The other three cases are not susceptible to such an attac*+ Figure ?+;! 'it modi#ication o# the odi#ied iller Code anchester For NFC- a modulation ratio o# ;9= is always used together with iller coding which leads to > possible cases (see Figure ?+;)+ The only case- where a bit might be
coding+ In contrast to the ;99= modulation- where really no signal is send in a pause- here within a pause the %F signal is e+g+ A8= o# the level o# the #ull signal+ 5etEs assume- an attac*er may increase the e0isting %F signal about ;A= during the whole session- without being noticed by the decoder+ Then- the attac*er is able to change a @ero to one by increasing the %F signal during the #irst hal# o# the signal period by another ;A=- and also may change a bit o# value one to @ero by simply stopping to send anything+ ;: Security "spects %egarding the threat in summary! (0cept #or one case- always anchester coding with ;9= "S7 is used #or NFC data trans#er+ This represents the best possible conditions #or the malicious intention o# modi#ying NFC data (compare Table <+8)+ This way o# transmitting the data o##ers a modi#ication attac* on all bits+ The only e0ception are active devices trans#ering data at ;9: *bps+ In this case the usage o# the modi#ied iller coding with a modulation ratio o# ;99= accomplishes that only certain bits can be modi#ied+ In CBD three countermeasures are described+ One possibility is the usage o# the active communication mode with ;9: *bps+ "s mentioned above this would not
prevent- but at least reduce the ris* o# this attac*+ Furthermore- it is possible to let the devices chec* the %F #ield as already described in Section ?+8+ &enoted as the Kprobably best solutionK is the use o# a secure channel+ This would provide data integrity+ ?+> &ata Insertion This attac* can only be implemented by an attac*er- i# there is enough time to send an inserted message be#ore the real device starts to send his answers+ I# a collision occurs the data e0change would be stopped at once+ In order to prevent such attac*s the device should try to answer with no delay+ "lternatively- again chec*ing the %F #ield and also the secure channel can be used to protect against attac*s+ ?+? an)in)the) iddle)"ttac* an)in)the) iddle)"ttac* we have In order to show that NFC is secure against a
to survey both- the active and the passive communication mode+ In the #ollowing we distinguish between device " and device ' that are e0changing data+ In passive mode the active device (") generates the %F #ield in order to send data to a passive device (')+ The aim o# an intruder is to intercept this message and prevent device ' #rom receiving it+ The ne0t step would be to replace it with a di##erent message+ The #irst step is possible- but can be detected i# device " chec*s the %F #ield while sending the message+ Gowever- the second one is practically impossible+ To send a message to device ' the attac*er would have to generate his own %F #ield+ Gence- the %F #ield o# device " has to be per#ectly aligned which is not practically #easible+ In contrast to the passive mode- in active mode device " switches o## the %F #ield a#ter sending a message+ Now the attac*er is con#ronted with another ?+? an)in)the) iddle)"ttac* ;F problem+ (ven though he may generate an %F #ield- he is not able to trans#er a message to device ' that would not be recogni@ed by device "- because device " is waiting #or a response #rom device '+ Thus- device " is assigned with the tas*
to chec* i# the received messages really come #rom device '+ &isregarding relay attac*s- NFC provides good protection against a is used and the %F #ield is monitored by device "+ ;A Security "spects : Conclusion In summary- Near Field Communication is an e##icient technology #or communications with short ranges+ It o##ers an intuitive and simple way to trans#er data between electronic devices+ " signi#icant advantages o# this techni,ue is the compatibility with e0isting %FI& in#rastructures+ "dditionally- it would bring bene#its to the setup o# longer)range wireless technologies- such as 'luetooth+ 4ith regard to the security o# NFC- we discussed di##erent attac*s and possible countermeasures to mitigate their impact+ &espite the restriction o# the rangeeavesdropping or data modi#ication attac*s can be carried out+ 'ut- disregarding relay attac*s- NFC provides security against an)in)the) iddle)"ttac*s+ In order to provide protection against these threats- the establishment o# a secure channel is necessary+ For this purpose simply the well *nown &G *ey agreement can be used- because 89 Conclusion 'ibliography C;D ISO/I(C ;A9B8((C ")<>9)! In#ormation technology ) Telecommunications and in#ormation e0change between systems ) Near Field Communication ) Inter#ace and Protocol (NFCIP);)+ First (dition899>)9>)9;+ C8D (cma International! Standard (C ")<>9- Near Field Communication Inter#ace and Protocol (NFCIP);)- &ecember 899>- 6%5! http!//www+ecma)international+org/publications/standards/(cma) <>9+htm+ C<D (TSI TS ;98 ;B9 3;+;+;! Near Field Communication an)in)the) iddle)"ttac*s represent no threat+ 4ith a secure channel NFC provides con#identiality- integrity and authenticity+ an)inthe) iddle attac*+ This applies particularly i# the passive communication mode
(NFC) IP);L Inter#ace and Protocol (NFCIP);) 899<)9<- 6%5! http!//www+etsi+org+ C>D ISO/I(C 8;>A;! In#ormation technology Telecommunications and in#ormation e0change between systems Near Field Communication Inter#ace and Protocol )8 (NFCIP)8)+ 1anuary 899?+ C?D (cma International! Standard (C ")<?8- Near Field Communication Inter#ace and Protocol )8 (NFCIP)8)- &ecember 899<- 6%5! http!//www+ecmainternational+ org/publications/#iles/(C ")ST/(cma)<?8+pd#+ C:D (TSI TS ;98 <;8- 3;+;+;! (lectromagnetic compatibility and %adio spectrum atters ((% )LNormali@ed Site "ttenuation (NS") and validation o# a #ully lined anechoic chamber up to >9 $G@ 899>) 9?- 6%5! http!//www+etsi+org+ CFD ISO/I(C ;>>><! Identi#ication cards ) Contactless integrated circuit cards ) Pro0imity cards+ 899;- 6%5! www+iso+ch+ CAD ISO/I(C ;?:B<! Identi#ication cards ) Contactless integrated circuit cards ) 3icinity cards+ CBD (rnst Gaselsteiner and 7lemens 'reit#uss! Security in near #ield communication (NFC)Philips Semiconductors- Printed handout o# 4or*shop on %FI& Security %FI&Sec 9:- 1uly 899:- 6%5! 88 'ibliography http!//events+iai*+tugra@+at/%FI&Sec9:/Program/papers/998=89) =89Security=89in=89NFC+pd#+ C;9D (rnst Gaselsteiner and 7lemens 'reit#uss! Security in near #ield communication (NFC)- %FI&Sec 9:- 8+ 1uly ;<th- 899:- 6%5! http!//events+iai*+tugra@+at/%FI&Sec9:/Program/slides/998=89) =89Security=89in=89NFC+ppt+ C;;D 4i*ipedia! "mplitude)shi#t)*eying- 6%5! http!//en+wi*ipedia+org/wi*i/"mplitude shi#t *eying+
C;8D (lectronic (ngineering Times "sia! NFC delivers intuitive- connected consumer e0perience- 6%5! http!//www+eetasia+com/"%TIC5(S/899: "M/P&F/((O5 899: "M9; ST(CG %F& T"+pd#NSO6%C(SO&O4N5O"&+ C;<D Oertel- 4Pol*- Gilty- 7Pohler- 7elter- 6llmann4ittmann! Security "spects and Prospective "pplications o# %FI& Systems- 'undesamt #r Sicherheit in der In#ormationstechni*- 'onn- ;;+ 1anuary 899?- 6%5! http!//www+bsi+de/#achthem/r#id/%I7CG" englisch+pd#+ C;>D $erhard P+ Ganc*e! " practical relay attac* on ISO ;>>>< pro0imity cards+ 899?- 6%5! http!//www+cl+cam+ac+u*/Q gh8F?/relay+pd#+