z-logo
Premium
Evaluating Near‐Field Communication tag security for identity theft prevention
Author(s) -
Saeed Dawer,
Iqbal Razi,
Sherazi Hafiz Husnain Raza,
Khan Usman Ghani
Publication year - 2019
Publication title -
internet technology letters
Language(s) - English
Resource type - Journals
ISSN - 2476-1508
DOI - 10.1002/itl2.123
Subject(s) - near field communication , computer science , identity (music) , computer security , pace , identity theft , erasure , field (mathematics) , set (abstract data type) , internet privacy , telecommunications , physics , mathematics , geodesy , ultra high frequency , acoustics , pure mathematics , programming language , geography
Near‐Field Communication (NFC) applications are growing at a rapid pace due to their user‐friendly nature and cost effectiveness. The growth of NFC applications has caught the attention of attackers who can target NFC entities (eg, tags and readers) to gain access to any stored information. NFC is a nascent technology that offers ease of use and secure communication. However, this technology can act as a doorway for major hacks, such as skimming and other identity theft problems. This article presents a technique that can still read the erased data from an NFC tag even if the tag has been erased employing conventional techniques. Furthermore, a set of recommendations is provided for the proper erasure of NFC tags to avoid leaving any traces of the erased data.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here