NFC技术的信息安全漏洞及改进方案

Zining Wang
{"title":"NFC技术的信息安全漏洞及改进方案","authors":"Zining Wang","doi":"10.1145/3209914.3226165","DOIUrl":null,"url":null,"abstract":"NFC is a new development of Radio-Frequency Identification technique. In recent years, it got extremely fast popularization due to its portability and practicability. At the same time, however, criminals also began to seek the new information technology's security leak. For avoiding the secure attacks, people should know the mechanism of threats and embark on protection work based on the fundamentality. This paper presents some common threats occurring in NFC transmission processes, including eavesdropping, transmission interference and data distortion. According to the commonality of each information theories, it is a tricky way to use the relevant techniques and applications that were already promoted to solve the NFC information security problems. Hence, I proposed to use the encryption technique to solve illegal access private information. And then this paper also discusses the feasibility of applying the Quality-of-service-based transmit beamforming and the Faraday Cage on defending signal disturbance. Following discussion, it was proved that, based on the mechanisms of the different transmission stages, those methods could perform different roles to solve specific problems.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Information Security Vulnerabilities of NFC Technology and Improvement Programs\",\"authors\":\"Zining Wang\",\"doi\":\"10.1145/3209914.3226165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"NFC is a new development of Radio-Frequency Identification technique. In recent years, it got extremely fast popularization due to its portability and practicability. At the same time, however, criminals also began to seek the new information technology's security leak. For avoiding the secure attacks, people should know the mechanism of threats and embark on protection work based on the fundamentality. This paper presents some common threats occurring in NFC transmission processes, including eavesdropping, transmission interference and data distortion. According to the commonality of each information theories, it is a tricky way to use the relevant techniques and applications that were already promoted to solve the NFC information security problems. Hence, I proposed to use the encryption technique to solve illegal access private information. And then this paper also discusses the feasibility of applying the Quality-of-service-based transmit beamforming and the Faraday Cage on defending signal disturbance. Following discussion, it was proved that, based on the mechanisms of the different transmission stages, those methods could perform different roles to solve specific problems.\",\"PeriodicalId\":174382,\"journal\":{\"name\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3209914.3226165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Information Science and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3209914.3226165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

近场通信(NFC)是射频识别技术的新发展。近年来,由于其便携性和实用性,它得到了极其迅速的普及。然而,与此同时,犯罪分子也开始寻求新的信息技术的安全漏洞。为了避免安全攻击,人们应该了解威胁的机制,从根本上着手进行防护工作。本文介绍了NFC传输过程中常见的一些威胁,包括窃听、传输干扰和数据失真。根据各种信息理论的通用性,利用已经推广的相关技术和应用来解决NFC信息安全问题是一个棘手的问题。因此,我提出使用加密技术来解决非法访问私人信息的问题。然后讨论了应用基于服务质量的发射波束形成和法拉第笼防御信号干扰的可行性。经过讨论,证明了基于不同传输阶段的机制,这些方法可以发挥不同的作用来解决具体问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Information Security Vulnerabilities of NFC Technology and Improvement Programs
NFC is a new development of Radio-Frequency Identification technique. In recent years, it got extremely fast popularization due to its portability and practicability. At the same time, however, criminals also began to seek the new information technology's security leak. For avoiding the secure attacks, people should know the mechanism of threats and embark on protection work based on the fundamentality. This paper presents some common threats occurring in NFC transmission processes, including eavesdropping, transmission interference and data distortion. According to the commonality of each information theories, it is a tricky way to use the relevant techniques and applications that were already promoted to solve the NFC information security problems. Hence, I proposed to use the encryption technique to solve illegal access private information. And then this paper also discusses the feasibility of applying the Quality-of-service-based transmit beamforming and the Faraday Cage on defending signal disturbance. Following discussion, it was proved that, based on the mechanisms of the different transmission stages, those methods could perform different roles to solve specific problems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design and Implementation of Student Information Management System Based On Java Improving RealSense by Fusing Color Stereo Vision and Infrared Stereo Vision for the Visually Impaired Expert Recommendation Based on Collaborative Filtering in Subject Research An Approach for Information Discovery Using Ontology In Semantic Web Content Detecting Phone Theft Using Machine Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1