Exploring Half-Duplex Communication of NFC Read/Write Mode for Secure Multi-Factor Authentication

Near Field Communication (NFC) is a prominent short-range, contact-less communication technology, which is rapidly getting popular in modern smart devices. For communication between two active devices via NFC, applications generally choose the peer-to-peer operation mode. In this paper, we exploit the possibility of using the NFC read/write mode, designed primarily for unidirectional data transfer from an active NFC reader to a passive NFC tag, for bi-directional half-duplex communication between two active NFC devices. The advantages of using the NFC read/write mode include low protocol overhead and permitting different data formats. However, the challenges are avoiding the reader collision problem, maintaining a secure session, and completing all transactions in an acceptable time frame. In this paper, we address the above challenges and propose a methodology for efficient communication between active NFC devices using NFC read/write mode. To evaluate the scheme, we design a secure Multi-Factor Authentication (MFA) system that requires bi-directional communication for mutually authenticating two NFC devices. The proposed methodology is experimentally verified using NFC-enabled Android smartphones and a Kerberos server as the third-party authenticator.

[1]  J. Potts,et al.  Exploiting Bluetooth on Android mobile devices for home security application , 2012, 2012 Proceedings of IEEE Southeastcon.

[2]  Amit Banerjee,et al.  On exploring NFC for half-duplex communication in read/write mode , 2017, 2017 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).

[3]  Busra Ozdenizci,et al.  A Survey on Near Field Communication (NFC) Technology , 2012, Wireless Personal Communications.

[4]  Pascal Urien LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[5]  David M'Raïhi,et al.  TOTP: Time-Based One-Time Password Algorithm , 2011 .

[6]  Han-Jin Cho,et al.  Enhanced secure device authentication algorithm in P2P-based smart farm system , 2018, Peer-to-Peer Networking and Applications.

[7]  Shashikala Tapaswi,et al.  Robust Smart Card Authentication Scheme for Multi-server Architecture , 2013, Wireless Personal Communications.

[8]  Kim-Kwang Raymond Choo,et al.  Towards Lightweight Anonymous Entity Authentication for IoT Applications , 2016, ACISP.

[9]  Massimo Vecchio,et al.  Blockchain-based traceability in Agri-Food supply chain management: A practical implementation , 2018, 2018 IoT Vertical and Topical Summit on Agriculture - Tuscany (IOT Tuscany).

[10]  Kakali Chatterjee,et al.  An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment , 2017, Wireless Personal Communications.

[11]  Rita Wan-Chik,et al.  Electronic Door Access Control using MyAccess Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface-based Face Recognition using Principal Component Analysis , 2016, IMCOM.

[12]  Jyoteesh Malhotra,et al.  Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[13]  Peter H. Cole,et al.  Synchronization of RFID readers for dense RFID reader environments , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[14]  Saraju P. Mohanty,et al.  Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment , 2017, IEEE Consumer Electronics Magazine.

[15]  Yuesheng Zhu,et al.  TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks , 2014, Wirel. Pers. Commun..

[16]  Kijoon Chae,et al.  A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service , 2017, Wireless Personal Communications.

[17]  E. M. Husni,et al.  Prototype of train ticketing application using Near Field Communication (NFC) technology on Android device , 2012, 2012 International Conference on System Engineering and Technology (ICSET).

[18]  Benitta Varghese,et al.  A MODERN HEALTH CARE SYSTEM USING IOT AND ANDROID , 2016 .

[19]  Nitin H. Vaidya,et al.  RFID reader collision problem: performance analysis and medium access , 2012, Wirel. Commun. Mob. Comput..

[20]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[21]  Manas Pulipati,et al.  Comparison of Various Short Range Wireless Communication Technologies with NFC , 2013 .

[22]  Mukhtiar Memon,et al.  An Open Platform for Seamless Sensor Support in Healthcare for the Internet of Things , 2016, Sensors.

[23]  Ankit Kumar Jain,et al.  Overview of Smartphone Security: Attack and Defense Techniques , 2018 .

[24]  Dur-e-Shawar Agha,et al.  A Secure Crypto Base Authentication and Communication Suite in Wireless Body Area Network (WBAN) for IoT Applications , 2018, Wirel. Pers. Commun..

[25]  Jaime Lloret,et al.  A secure NFC application for credit transfer among mobile phones , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[26]  Luca Mainetti,et al.  IDA-Pay: a secure and efficient micro-payment system based on Peer-to-Peer NFC technology for Android mobile devices , 2012 .

[27]  Jia-Shing Sheu,et al.  The Realization of Healthcare Combined with Bluetooth and NFC Technology , 2016 .

[28]  Lixiang Li,et al.  A secure and efficient mutual authentication scheme for session initiation protocol , 2016, Peer Peer Netw. Appl..

[29]  Imran Memon,et al.  Efficient User Based Authentication Protocol for Location Based Services Discovery Over Road Networks , 2017, Wirel. Pers. Commun..

[30]  Sanjar Ibrokhimov,et al.  Multi-Factor Authentication in Cyber Physical System: A State of Art Survey , 2019, 2019 21st International Conference on Advanced Communication Technology (ICACT).

[31]  Mohamad Badra,et al.  A Lightweight Security Protocol for NFC-based Mobile Payments , 2016, ANT/SEIT.

[32]  Shuang Li,et al.  Passive and wireless near field communication tag sensors for biochemical sensing with smartphone , 2017 .

[33]  Gyanendra K. Verma,et al.  A Digital Security System with Door Lock System Using RFID Technology , 2010 .

[34]  VelsquezIgnacio,et al.  Authentication schemes and methods , 2018 .

[35]  Elie Saad,et al.  A smart lock system using Wi-Fi security , 2016, 2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA).

[36]  Vanga Odelu,et al.  SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms , 2016, IEEE Transactions on Consumer Electronics.

[37]  Sang Woo Kim,et al.  An Adaptive RFID Anti-Collision Algorithm Based on Dynamic Framed ALOHA , 2008, IEICE Trans. Commun..

[38]  Xiong Li,et al.  A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city , 2017, Future Gener. Comput. Syst..

[39]  Smail Tedjini,et al.  Attacks on the HF Physical Layer of Contactless and RFID Systems , 2011 .

[40]  Peilin Hong,et al.  PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications , 2018, IEEE Transactions on Consumer Electronics.

[41]  Emilia Biffi,et al.  Exploring the learnability and usability of a near field communication-based application for semantic enrichment in children with language disorders , 2018, Assistive technology : the official journal of RESNA.

[42]  Zhou Xuan,et al.  Research and simulate of the optimization anti-collision technology in UHF RFID system , 2011, 2011 International Conference on Electric Information and Control Engineering.

[43]  Ruhul Amin,et al.  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..

[44]  K. Govinda,et al.  Automation of Patient Information in Healthcare System , 2018 .

[45]  Ernst Haselsteiner Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .

[46]  Busra Ozdenizci,et al.  NFC Loyal for Enhancing Loyalty Services Through Near Field Communication , 2013, Wirel. Pers. Commun..

[47]  Mohammad Sabzinejad Farash An improved password-based authentication scheme for session initiation protocol using smart cards without verification table , 2017, Int. J. Commun. Syst..

[48]  Niels Boye,et al.  User Driven Innovation—Involving the Users of the Global Information Multimedia Communication Village in the Creation of a Device for Personal Healthcare: maXi , 2009, Wirel. Pers. Commun..

[49]  Massimo Conti,et al.  NFC-Based Traceability in the Food Chain , 2017 .

[50]  Muhammad Khurram Khan,et al.  User authentication schemes for wireless sensor networks: A review , 2015, Ad Hoc Networks.

[51]  Sghaier Guizani Relay attacks concerns in wireless ad hoc, sensors, and RFID networks , 2016, Wirel. Commun. Mob. Comput..

[52]  CoskunVedat,et al.  A Survey on Near Field Communication (NFC) Technology , 2013 .

[53]  Amin Babazadeh Sangar,et al.  The Use of NFC Technology to Record Medical Information in Order to Improve the Quality of Medical and Treatment Services , 2016 .

[54]  Heekuck Oh,et al.  Conditional privacy preserving security protocol for NFC applications , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).

[55]  Prosanta Gope,et al.  Anonymous mutual authentication with location privacy support for secure communication in M2M home network services , 2019, J. Ambient Intell. Humaniz. Comput..

[56]  A. Palma,et al.  Flexible Passive near Field Communication Tag for Multigas Sensing. , 2017, Analytical chemistry.