DocumentCode :
248738
Title :
Security analysis of NFC relay attacks using probabilistic model checking
Author :
Alexiou, Nikolaos ; Basagiannis, Stylianos ; Petridou, Sophia
Author_Institution :
Sch. of Electr. Eng., KTH R. Inst. of Technol., Stockholm, Sweden
fYear :
2014
fDate :
4-8 Aug. 2014
Firstpage :
524
Lastpage :
529
Abstract :
Near Field Communication (NFC) is a short-ranged wireless communication technology envisioned to support a large gamut of smart-device applications, such as payment and ticketing applications. Two NFC-enabled devices need to be in close proximity, typically less than 10 cm apart, in order to communicate. However, adversaries can use a secret and fast communication channel to relay data between two distant victim NFC-enabled devices and thus, force NFC link between them. Relay attacks may have tremendous consequences for security as they can bypass the NFC requirement for short range communications and even worse, they are cheap and easy to launch. Therefore, it is important to evaluate security of NFC applications and countermeasures to support the emergence of this new technology. In this work we present a probabilistic model checking approach to verify resiliency of NFC protocol against relay attacks based on protocol, channel and application specific parameters that affect the successfulness of the attack. We perform our formal analysis within the probabilistic model checking environment PRISM to support automated security analysis of NFC applications. Finally, we demonstrate how the attack can be thwarted and we discuss the successfulness of potential countermeasures.
Keywords :
access protocols; formal verification; near-field communication; telecommunication security; wireless channels; NFC protocol; NFC relay attacks; automated security analysis; fast communication channel; formal analysis; near field communication; probabilistic model checking environment PRISM; secret communication channel; short range communications; short-ranged wireless communication technology; smart device applications; Delays; Model checking; Probabilistic logic; Relays; Security; Transport protocols; Near Field Communication; probabilistic model checking; relay attack; security analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International
Conference_Location :
Nicosia
Print_ISBN :
978-1-4799-7324-8
Type :
conf
DOI :
10.1109/IWCMC.2014.6906411
Filename :
6906411
Link To Document :
بازگشت