{"title":"NFC中存在的安全问题及攻击对策","authors":"R. V. Khvorostyanyy","doi":"10.31673/2409-7292.2023.010005","DOIUrl":null,"url":null,"abstract":"Near Field Communication (NFC) technology is widely used due to its ease of use. However, NFC is vulnerable to security attacks such as man-in-the-middle; denial of service (DOS), etc. These attacks lead to the leakage of important user data, which can affect any organization that uses NFC applications and technologies. This article discusses NFC vulnerabilities and different types of NFC attacks. The article also discusses possible solutions that could protect NFC from these security threats.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security problems and countermeasures against attacks in NFC\",\"authors\":\"R. V. Khvorostyanyy\",\"doi\":\"10.31673/2409-7292.2023.010005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Near Field Communication (NFC) technology is widely used due to its ease of use. However, NFC is vulnerable to security attacks such as man-in-the-middle; denial of service (DOS), etc. These attacks lead to the leakage of important user data, which can affect any organization that uses NFC applications and technologies. This article discusses NFC vulnerabilities and different types of NFC attacks. The article also discusses possible solutions that could protect NFC from these security threats.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2023.010005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2023.010005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security problems and countermeasures against attacks in NFC
Near Field Communication (NFC) technology is widely used due to its ease of use. However, NFC is vulnerable to security attacks such as man-in-the-middle; denial of service (DOS), etc. These attacks lead to the leakage of important user data, which can affect any organization that uses NFC applications and technologies. This article discusses NFC vulnerabilities and different types of NFC attacks. The article also discusses possible solutions that could protect NFC from these security threats.