{"title":"A secure cloud of electronic keys for NFC locks securely controlled by NFC smartphones","authors":"P. Urien","doi":"10.1109/CCNC.2014.6994415","DOIUrl":null,"url":null,"abstract":"This demonstration shows an innovative and secure framework targeting access control in the internet of things, with NFC (Near Field Communication) enabled smartphones. NFC peer to peer communications are protected by the well known TLS protocol; services working over this stack are identified, according to NFC standards, by a name. Two use cases are presented in order to control an electronic lock. In the first one a password, is securely pushed from the mobile to the lock according to legacy NFC protocol. In the second one the key is stored in an EMV bank card plugged to a server, and is remotely checked. Parts of this framework are detailed by IETF drafts.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2014.6994415","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
This demonstration shows an innovative and secure framework targeting access control in the internet of things, with NFC (Near Field Communication) enabled smartphones. NFC peer to peer communications are protected by the well known TLS protocol; services working over this stack are identified, according to NFC standards, by a name. Two use cases are presented in order to control an electronic lock. In the first one a password, is securely pushed from the mobile to the lock according to legacy NFC protocol. In the second one the key is stored in an EMV bank card plugged to a server, and is remotely checked. Parts of this framework are detailed by IETF drafts.