Weiping Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun
{"title":"基于OSI参考模型的近场通信(NFC)安全模型","authors":"Weiping Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun","doi":"10.1109/Trustcom.2015.525","DOIUrl":null,"url":null,"abstract":"As NFC is popularized, its security vulnerabilities and protection methods have been widely addressed. This paper sets up a NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, then the results show a high protection level. And the NFC security model will be perfected continually with the development of the NFC technology.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A Near Field Communication(NFC) Security Model Based on OSI Reference Model\",\"authors\":\"Weiping Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun\",\"doi\":\"10.1109/Trustcom.2015.525\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As NFC is popularized, its security vulnerabilities and protection methods have been widely addressed. This paper sets up a NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, then the results show a high protection level. And the NFC security model will be perfected continually with the development of the NFC technology.\",\"PeriodicalId\":277092,\"journal\":{\"name\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Trustcom.2015.525\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Trustcom/BigDataSE/ISPA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Trustcom.2015.525","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Near Field Communication(NFC) Security Model Based on OSI Reference Model
As NFC is popularized, its security vulnerabilities and protection methods have been widely addressed. This paper sets up a NFC security model based on the OSI model. Security risk and countermeasure of each layer of the security model are described as the foundation of the former works. Evaluation methods are proposed to assess the security model, then the results show a high protection level. And the NFC security model will be perfected continually with the development of the NFC technology.