An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field Communication

Near Field Communication (NFC) has become prevalent in access control and contactless payment systems, however, there is evidence in the literature to suggest that the technology possesses numerous vulnerabilities. Contactless bank cards are becoming commonplace in society; while there are many bene...

Full description

Bibliographic Details
Main Authors: Christina Thorpe, John Tobin, Liam Murphy
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9229124/
id doaj-a8b48ab4ee5d480aad39f767a4d009a1
record_format Article
spelling doaj-a8b48ab4ee5d480aad39f767a4d009a12021-03-30T03:38:10ZengIEEEIEEE Access2169-35362020-01-01819010819011710.1109/ACCESS.2020.30319799229124An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field CommunicationChristina Thorpe0https://orcid.org/0000-0002-2359-883XJohn Tobin1Liam Murphy2https://orcid.org/0000-0001-9777-005XSchool of Informatics and Engineering, Technological University Dublin, Blanchardstown Campus, Dublin 15, IrelandSchool of Computer Science, University College Dublin, Dublin 4, IrelandSchool of Computer Science, University College Dublin, Dublin 4, IrelandNear Field Communication (NFC) has become prevalent in access control and contactless payment systems, however, there is evidence in the literature to suggest that the technology possesses numerous vulnerabilities. Contactless bank cards are becoming commonplace in society; while there are many benefits from the use of contactless payments, there are also security issues present that could be exploited by a malicious third party. The inherently short operating distance of NFC (typically about 4 cm) is often relied upon as a means of ensuring intentional interaction on the user's part and limiting attack vectors. However, NFC is particularly sensitive to relay attacks, which entirely negate the security usefulness of the short-range aspect of technology. The aim of this article is to demonstrate how standard hardware can be used to exploit the technology to carry out a relay attack. Considering the risk that relay attacks pose, a countermeasure is proposed to mitigate this threat. Our countermeasure yields a 100% detection rate in experiments undertaken - in which over 10,000 contactless transactions were carried out on a range of different contactless cards and devices. In these experiments, there was a false positive rate of 0.38% - 0.86%. As little as 1 in every 250 transactions were falsely classified as being the subject of a relay attack and so the user experience was not significantly impacted. With our countermeasure implemented, transaction time was lengthened by only 0.22 seconds.https://ieeexplore.ieee.org/document/9229124/Near field communicationrelay attacksecurity
collection DOAJ
language English
format Article
sources DOAJ
author Christina Thorpe
John Tobin
Liam Murphy
spellingShingle Christina Thorpe
John Tobin
Liam Murphy
An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field Communication
IEEE Access
Near field communication
relay attack
security
author_facet Christina Thorpe
John Tobin
Liam Murphy
author_sort Christina Thorpe
title An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field Communication
title_short An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field Communication
title_full An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field Communication
title_fullStr An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field Communication
title_full_unstemmed An ISO/IEC 7816-4 Application Layer Approach to Mitigate Relay Attacks on Near Field Communication
title_sort iso/iec 7816-4 application layer approach to mitigate relay attacks on near field communication
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description Near Field Communication (NFC) has become prevalent in access control and contactless payment systems, however, there is evidence in the literature to suggest that the technology possesses numerous vulnerabilities. Contactless bank cards are becoming commonplace in society; while there are many benefits from the use of contactless payments, there are also security issues present that could be exploited by a malicious third party. The inherently short operating distance of NFC (typically about 4 cm) is often relied upon as a means of ensuring intentional interaction on the user's part and limiting attack vectors. However, NFC is particularly sensitive to relay attacks, which entirely negate the security usefulness of the short-range aspect of technology. The aim of this article is to demonstrate how standard hardware can be used to exploit the technology to carry out a relay attack. Considering the risk that relay attacks pose, a countermeasure is proposed to mitigate this threat. Our countermeasure yields a 100% detection rate in experiments undertaken - in which over 10,000 contactless transactions were carried out on a range of different contactless cards and devices. In these experiments, there was a false positive rate of 0.38% - 0.86%. As little as 1 in every 250 transactions were falsely classified as being the subject of a relay attack and so the user experience was not significantly impacted. With our countermeasure implemented, transaction time was lengthened by only 0.22 seconds.
topic Near field communication
relay attack
security
url https://ieeexplore.ieee.org/document/9229124/
work_keys_str_mv AT christinathorpe anisoiec78164applicationlayerapproachtomitigaterelayattacksonnearfieldcommunication
AT johntobin anisoiec78164applicationlayerapproachtomitigaterelayattacksonnearfieldcommunication
AT liammurphy anisoiec78164applicationlayerapproachtomitigaterelayattacksonnearfieldcommunication
AT christinathorpe isoiec78164applicationlayerapproachtomitigaterelayattacksonnearfieldcommunication
AT johntobin isoiec78164applicationlayerapproachtomitigaterelayattacksonnearfieldcommunication
AT liammurphy isoiec78164applicationlayerapproachtomitigaterelayattacksonnearfieldcommunication
_version_ 1724183100341092352