Skip to main content
. 2015 Jun 5;15(6):13348–13405. doi: 10.3390/s150613348

Table 1.

Vulnerabilities, attacks and countermeasures.

Vulnerabilities and Attacks Countermeasures
NFC Tags Tag Manipulation (i.e., NFC Worms, Phishing, DoS Attacks)
  • Digitally Signing Tags

  • Using Tag Authentication

Tag Cloning and Tag Impersonation
  • Digitally Signing Tags

Tag Replacement and Tag Hiding
  • Protecting Tags with a Physical Shield

RF Communication Eavesdropping
  • Using Secure Communication Channel

MIM Attack
  • Attack is nearly impossible

  • Using active-passive communication mode (RF field is continuously generated by one of the valid parties)

  • Listening RF field when sending data

Relay Attack
  • Using nonce

  • Using physical proximity based information (e.g., temperature)

Data Corruption
  • Checking the power of RF Field

Data Modification
  • Changing Baud rate

  • Monitoring RF Field

  • Using Secure Communication Channel

Data Insertion
  • Response with no delay from answering device

  • Listening the channel by answering device

  • Using Secure Communication Channel

SE DoS Attack
  • Solutions needed

Relay attack
  • Disabling internal mode communication

By passing the applet PINs those controlled by Smartphone applications
  • Two-factor authentications

  • New solutions needed

Vulnerabilities in applets caused by erroneous codes
  • Genetic algorithms to search for vulnerabilities in applets

  • Formal security analyses

Cloning an asset (e.g., ticket, coupon)
  • Online verification before usage