DocumentCode :
3280420
Title :
Utilizing NFC to secure identification
Author :
Gripentog, Robert ; Yoohwan Kim
Author_Institution :
Univ. Card Services, Univ. of Nevada, Las Vegas, Las Vegas, NV, USA
fYear :
2015
fDate :
June 28 2015-July 1 2015
Firstpage :
101
Lastpage :
105
Abstract :
He Near Field Communication(NFC) protocol was standardized by the International Organization for Standards in 2003. As a result the use of NFC as a communication conduit has grown, is popular with several applications and becoming the standard in many cases. However, the protocol for NFC does not include security measures and can result in data being compromised. Consequently, different methods of securing NFC data have been developed when applied to door security, and payment transaction systems. This paper focuses on assessment of NFC security methods of passive “smart” chip cards and will include pros/cons for each, as well as a best practices suggestion.
Keywords :
protocols; security of data; NFC security methods; near field communication protocol; passive smart chip cards; the International Organization for Standards; Cryptography; Object recognition; Protocols; Servers; Smart cards; Standards; Frequency Identification; NFC; NFC Identification; NFC security; Near Field Communication; Physical Access Control; University Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Information Science (ICIS), 2015 IEEE/ACIS 14th International Conference on
Conference_Location :
Las Vegas, NV
Type :
conf
DOI :
10.1109/ICIS.2015.7166577
Filename :
7166577
Link To Document :
بازگشت