Practical provably secure key sharing for near field communication devices
- 1 January 2013
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2013 International Conference on Computing, Networking and Communications (ICNC)
Abstract
We present a novel practical and provably secure key sharing scheme for Near Field Communication (NFC) devices. The scheme is based on sharing secret keys using the noisy wireless channel. We present two schemes based on the different modes of operation of typical NFC devices. Our numerical results establish the achievability of vanishing secrecy rates using the proposed techniques. Implementation of our proposed schemes on NFC-enabled Android and Nokia phones verifies our theoretical analysis and demonstrates the efficiency of our techniques in mitigating attacks at the expense of a minimal increase in the link setup time and a small loss in goodput. In addition, the proposed techniques have the advantage of both increased secrecy and goodput as the data packet length increases. This highlights their suitability for a wide range of NFC applications.Keywords
This publication has 8 references indexed in Scilit:
- Practical Provably Secure Communication for Half-Duplex RadiosPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Keys Through ARQ: Theory and PracticeIEEE Transactions on Information Forensics and Security, 2011
- ARQ security in Wi-Fi and RFID networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- On the delay limited secrecy capacity of fading channelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Vulnerability Analysis and Attacks on NFC-Enabled Mobile PhonesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID TagsLecture Notes in Computer Science, 2006
- The Wire-Tap ChannelBell System Technical Journal, 1975
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949