Abstract
Most of the universities or colleges, the lecturer has to take the attendance of the students manually by circulating a paper for them to register their names or calling the names. To date, there are various types of attendance systems that are applying different technologies such as biometrics, tokens and sensors such as RFID. The latest is by applying near-field communication (NFC), a sensor within the smartphone has been used as a mean for recording attendances. The aim of this paper is to list out the possible security attacks against NFC (Near Field Communication) enabled systems by focusing on a student-based attendance system. A brief overview over NFC technology and discussion on various security attacks against NFC in different media is presented. Overall, an attendance system is compromised mainly by tag swapping, tag cloning and manipulation of data occurring on the NFC device and operational server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Özdenizci, B., Aydin, M., Coskun, V., Kerem, O.K.: NFC Research Framework: A Literature Review and Future Research Directions. Information Technologies Department, ISIK University, Istanbul
Madlmayr, G., Langer, J., Scharinger, J., Kantner, C.: NFC Devices: Security and Privacy. The Third International Conference on Availability, Reliability and Security
Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35–49. Springer, Heidelberg (2010)
Roland, M.: Practical Attack Scenarios on Secure Element-enabled Mobile Devices. 4th International Workshop on Near Field Communication, Helsinki, Finland, March 13, 2012
Porter Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A Survey of Mobile Malware in the Wild. University of California, Berkeley
Breitinger, F., Nickel, C.: User Survey on Phone Security and Usage
Mitrokotsa, A., Beye, M.R.T., Lopez, P.: Classification of RFID Threats based on Security Principles. Security Lab, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology (TU Delft), Mekelweg 4, 2628 CD
Aigner, M., Dominikus, S., Feldhofer, M.: A System of Secure Virtual Coupons Using NFC Technology. In: Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops © (2007)
Kilas, M.: Digital Signatures on NFC Tags. Master of Science Thesis, March 18, 2009
Church, L., Moloney, M.: State of the Art for Near Field Communication: security and privacy within the field. Escher Group Ltd, Ireland, 3rd draft: May 10, 2012
Reveilhac, M., Pasquet, M.: Promising Secure Element Alternatives for NFCTechnology. 2009 First International Workshop on Near Field Communication
Yan, Q., Li, Y., Li, T., Deng, R.: Insights into Malware Detection and Preventionon Mobile Phones
Balitanas, O.M., Kim, T.: Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol. Hannam University, Department of Multimedia Engineering, Postfach
Greeshma, M.: Global Smartphone Users to Touch 1.75 billion in 2014, January 20, 2014 (accessed on January 2, 2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chew, C.B., Wei, K.C., Sheng, T.W., Mahinderjit-Singh, M., Malim, N.H.A.H., Husin, M.H. (2015). Security Challenges and Mitigations of NFC-Enabled Attendance System. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-20472-7_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20471-0
Online ISBN: 978-3-319-20472-7
eBook Packages: Computer ScienceComputer Science (R0)