Skip to main navigation Skip to search Skip to main content

On the security issues of NFC enabled mobile phones

Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

Abstract

In this paper, we investigate the possibility that a Near Field Communication (NFC) enabled mobile phone, with an embedded secure element (SE), could be used as a mobile token cloning and skimming platform. We show how an attacker could use an NFC mobile phone as such an attack platform by exploiting the existing security controls of the embedded SE and the available contactless APIs. To illustrate the feasibility of these actions, we also show how to practically skim and emulate certain tokens typically used in payment and access control applications with a NFC mobile phone. We also discuss how to capture and analyse legitimate transaction information from contactless systems. Although such attacks can also be implemented on other contactless platforms, such as custom-built card emulators and modified readers, the NFC enabled mobile phone has a legitimate form factor, which would be accepted by merchants and arouse less suspicion in public. Finally, we propose several security countermeasures for NFC phones that could prevent such misuse. Copyright © 2010 Inderscience Enterprises Ltd.
Original languageEnglish
Pages (from-to)336-356
JournalInternational Journal of Internet Technology and Secured Transactions
Volume2
Issue number3-4
Online published6 Dec 2010
DOIs
Publication statusPublished - 2010
Externally publishedYes

Research Keywords

  • Cloning attack
  • Countermeasures
  • Near Field Communication
  • NFC
  • NFC enabled mobile phones
  • SE
  • Secure element
  • Security threats
  • Skimming attack

Fingerprint

Dive into the research topics of 'On the security issues of NFC enabled mobile phones'. Together they form a unique fingerprint.

Cite this