NFC Tags |
Tag Manipulation (i.e., NFC Worms, Phishing, DoS Attacks) |
Digitally Signing Tags
Using Tag Authentication
|
Tag Cloning and Tag Impersonation |
|
Tag Replacement and Tag Hiding |
|
RF Communication |
Eavesdropping |
|
MIM Attack |
Attack is nearly impossible
Using active-passive communication mode (RF field is continuously generated by one of the valid parties)
Listening RF field when sending data
|
Relay Attack |
|
Data Corruption |
|
Data Modification |
|
Data Insertion |
Response with no delay from answering device
Listening the channel by answering device
Using Secure Communication Channel
|
SE |
DoS Attack |
|
Relay attack |
|
By passing the applet PINs those controlled by Smartphone applications |
|
Vulnerabilities in applets caused by erroneous codes |
|
Cloning an asset (e.g., ticket, coupon) |
|