Skip to Main content Skip to Navigation
Conference papers

An NFC Relay Attack with Off-the-shelf Hardware and Software

Abstract : Passive Near Field Communication (NFC) devices, such as contactless smart cards, use NFC to communicate with other devices without any physical connection or an internal battery source, deriving power inductively via the radio field generated by the NFC reader device. Today, many Point-of-Sale (PoS) terminals, credit cards, and also mobile devices are NFC-capable and facilitate contactless payments. Although the communication range is typically limited to a few centimeters, NFC attacks exist that exploit such contactless communication channels.This paper focuses on NFC relay attacks and shows that a practical relay attack on public transport PoS terminals, using off-the-shelf mobile devices and hardware, is feasible. Finally, countermeasures are discussed with the main finding that currently the best countermeasure against relay attacks is to physically shield an NFC device.
Complete list of metadatas

Cited literature [23 references]  Display  Hide  Download

https://hal.inria.fr/hal-01632735
Contributor : Hal Ifip <>
Submitted on : Friday, November 10, 2017 - 3:27:15 PM
Last modification on : Friday, November 10, 2017 - 3:31:22 PM
Long-term archiving on: : Sunday, February 11, 2018 - 3:04:54 PM

File

385745_1_En_8_Chapter.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller. An NFC Relay Attack with Off-the-shelf Hardware and Software. 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.71-83, ⟨10.1007/978-3-319-39814-3_8⟩. ⟨hal-01632735⟩

Share

Metrics