Skip to Main content Skip to Navigation
Conference papers

An NFC Relay Attack with Off-the-shelf Hardware and Software

Abstract : Passive Near Field Communication (NFC) devices, such as contactless smart cards, use NFC to communicate with other devices without any physical connection or an internal battery source, deriving power inductively via the radio field generated by the NFC reader device. Today, many Point-of-Sale (PoS) terminals, credit cards, and also mobile devices are NFC-capable and facilitate contactless payments. Although the communication range is typically limited to a few centimeters, NFC attacks exist that exploit such contactless communication channels.This paper focuses on NFC relay attacks and shows that a practical relay attack on public transport PoS terminals, using off-the-shelf mobile devices and hardware, is feasible. Finally, countermeasures are discussed with the main finding that currently the best countermeasure against relay attacks is to physically shield an NFC device.
Complete list of metadata

Cited literature [23 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, November 10, 2017 - 3:27:15 PM
Last modification on : Wednesday, January 5, 2022 - 3:02:04 PM
Long-term archiving on: : Sunday, February 11, 2018 - 3:04:54 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller. An NFC Relay Attack with Off-the-shelf Hardware and Software. 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.71-83, ⟨10.1007/978-3-319-39814-3_8⟩. ⟨hal-01632735⟩



Record views


Files downloads