NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack
Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a newspaper or a smart poster and redeemed afterwar...
Main Author: | |
---|---|
Other Authors: | |
Published: |
University of Surrey
2015
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.640879 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-640879 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-6408792016-08-04T03:52:51ZNFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attackAlshehri, Ali A.Schneider, Steve A.2015Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a newspaper or a smart poster and redeemed afterwards. The NFC-based mobile coupon (M-coupon) is a cryptographically secured electronic message with some value stored at user's mobile. The M-coupon requires secure issuing and cashing (redeeming). Uncontrolled copies of the M-coupons would cause losses for a company and damage its reputation. The main goal of this thesis is to enhance the security of NFC mobile coupon protocols. In order to address the NFC M-coupon threats, there are specific and general security requirements. For the specific NFC M-coupon requirements, a number of protocols have been proposed in the literature. We perform a formal security analysis of NFC M-coupon protocols, using formal methods (CasperFDR), in an effort to check the the security of these protocols and whether they address their requirements. We develop a general framework of capturing the NFC M-coupon requirements and apply it to four existing protocols in the literature, and two new protocols that we have developed. The general security requirement that affects all NFC protocols is the issue of relay attacks. A relay attack happens when an intruder extends the distance between two NFC devices while both devices are under the impression they are close to each other. We propose three NFC User Key Confirmation Protocols (UKC) to address the NFC relay attack. The UKC protocols are a collaboration between the cryptographic protocols, the user and the NFC mobile in an effort to prove the proximity. We formally verify the three protocols using CasperFDR.004University of Surreyhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.640879http://epubs.surrey.ac.uk/807135/Electronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
topic |
004 |
spellingShingle |
004 Alshehri, Ali A. NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack |
description |
Near Field Communication} (NFC) is a Radio Frequency (RF) technology that allows data to be exchanged between devices that are in close proximity. An NFC-based mobile coupon (M-coupon) is a coupon that is retrieved by the user from a source such as a newspaper or a smart poster and redeemed afterwards. The NFC-based mobile coupon (M-coupon) is a cryptographically secured electronic message with some value stored at user's mobile. The M-coupon requires secure issuing and cashing (redeeming). Uncontrolled copies of the M-coupons would cause losses for a company and damage its reputation. The main goal of this thesis is to enhance the security of NFC mobile coupon protocols. In order to address the NFC M-coupon threats, there are specific and general security requirements. For the specific NFC M-coupon requirements, a number of protocols have been proposed in the literature. We perform a formal security analysis of NFC M-coupon protocols, using formal methods (CasperFDR), in an effort to check the the security of these protocols and whether they address their requirements. We develop a general framework of capturing the NFC M-coupon requirements and apply it to four existing protocols in the literature, and two new protocols that we have developed. The general security requirement that affects all NFC protocols is the issue of relay attacks. A relay attack happens when an intruder extends the distance between two NFC devices while both devices are under the impression they are close to each other. We propose three NFC User Key Confirmation Protocols (UKC) to address the NFC relay attack. The UKC protocols are a collaboration between the cryptographic protocols, the user and the NFC mobile in an effort to prove the proximity. We formally verify the three protocols using CasperFDR. |
author2 |
Schneider, Steve A. |
author_facet |
Schneider, Steve A. Alshehri, Ali A. |
author |
Alshehri, Ali A. |
author_sort |
Alshehri, Ali A. |
title |
NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack |
title_short |
NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack |
title_full |
NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack |
title_fullStr |
NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack |
title_full_unstemmed |
NFC mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack |
title_sort |
nfc mobile coupon protocols : developing, formal security modelling and analysis, and addressing relay attack |
publisher |
University of Surrey |
publishDate |
2015 |
url |
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.640879 |
work_keys_str_mv |
AT alshehrialia nfcmobilecouponprotocolsdevelopingformalsecuritymodellingandanalysisandaddressingrelayattack |
_version_ |
1718371873209712640 |