Practical provably secure key sharing for near field communication devices

We present a novel practical and provably secure key sharing scheme for Near Field Communication (NFC) devices. The scheme is based on sharing secret keys using the noisy wireless channel. We present two schemes based on the different modes of operation of typical NFC devices. Our numerical results establish the achievability of vanishing secrecy rates using the proposed techniques. Implementation of our proposed schemes on NFC-enabled Android and Nokia phones verifies our theoretical analysis and demonstrates the efficiency of our techniques in mitigating attacks at the expense of a minimal increase in the link setup time and a small loss in goodput. In addition, the proposed techniques have the advantage of both increased secrecy and goodput as the data packet length increases. This highlights their suitability for a wide range of NFC applications.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Henning Siitonen Kortvedt Securing Near Field Communication , 2009 .

[4]  Moustafa Youssef,et al.  Practical Provably Secure Communication for Half-Duplex Radios , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  Claude Castelluccia,et al.  Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.

[6]  Gerhard P. Hancke,et al.  Eavesdropping Attacks on High-Frequency RFID Tokens , 2008 .

[7]  Moustafa Youssef,et al.  Randomization for Security in Half-Duplex Two-Way Gaussian Channels , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[8]  Ernst Haselsteiner Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .

[9]  Collin Mulliner,et al.  Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones , 2009, 2009 International Conference on Availability, Reliability and Security.

[10]  Moustafa Youssef,et al.  Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.

[11]  Moustafa Youssef,et al.  On the delay limited secrecy capacity of fading channels , 2009, 2009 IEEE International Symposium on Information Theory.

[12]  Moustafa Youssef,et al.  ARQ security in Wi-Fi and RFID networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).