{"title":"NFC技术的信息安全漏洞及改进方案","authors":"Zining Wang","doi":"10.1145/3209914.3226165","DOIUrl":null,"url":null,"abstract":"NFC is a new development of Radio-Frequency Identification technique. In recent years, it got extremely fast popularization due to its portability and practicability. At the same time, however, criminals also began to seek the new information technology's security leak. For avoiding the secure attacks, people should know the mechanism of threats and embark on protection work based on the fundamentality. This paper presents some common threats occurring in NFC transmission processes, including eavesdropping, transmission interference and data distortion. According to the commonality of each information theories, it is a tricky way to use the relevant techniques and applications that were already promoted to solve the NFC information security problems. Hence, I proposed to use the encryption technique to solve illegal access private information. And then this paper also discusses the feasibility of applying the Quality-of-service-based transmit beamforming and the Faraday Cage on defending signal disturbance. Following discussion, it was proved that, based on the mechanisms of the different transmission stages, those methods could perform different roles to solve specific problems.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Information Security Vulnerabilities of NFC Technology and Improvement Programs\",\"authors\":\"Zining Wang\",\"doi\":\"10.1145/3209914.3226165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"NFC is a new development of Radio-Frequency Identification technique. In recent years, it got extremely fast popularization due to its portability and practicability. At the same time, however, criminals also began to seek the new information technology's security leak. For avoiding the secure attacks, people should know the mechanism of threats and embark on protection work based on the fundamentality. This paper presents some common threats occurring in NFC transmission processes, including eavesdropping, transmission interference and data distortion. According to the commonality of each information theories, it is a tricky way to use the relevant techniques and applications that were already promoted to solve the NFC information security problems. Hence, I proposed to use the encryption technique to solve illegal access private information. And then this paper also discusses the feasibility of applying the Quality-of-service-based transmit beamforming and the Faraday Cage on defending signal disturbance. Following discussion, it was proved that, based on the mechanisms of the different transmission stages, those methods could perform different roles to solve specific problems.\",\"PeriodicalId\":174382,\"journal\":{\"name\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3209914.3226165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Information Science and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3209914.3226165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Security Vulnerabilities of NFC Technology and Improvement Programs
NFC is a new development of Radio-Frequency Identification technique. In recent years, it got extremely fast popularization due to its portability and practicability. At the same time, however, criminals also began to seek the new information technology's security leak. For avoiding the secure attacks, people should know the mechanism of threats and embark on protection work based on the fundamentality. This paper presents some common threats occurring in NFC transmission processes, including eavesdropping, transmission interference and data distortion. According to the commonality of each information theories, it is a tricky way to use the relevant techniques and applications that were already promoted to solve the NFC information security problems. Hence, I proposed to use the encryption technique to solve illegal access private information. And then this paper also discusses the feasibility of applying the Quality-of-service-based transmit beamforming and the Faraday Cage on defending signal disturbance. Following discussion, it was proved that, based on the mechanisms of the different transmission stages, those methods could perform different roles to solve specific problems.