Skip to main content

Security Challenges and Mitigations of NFC-Enabled Attendance System

  • Conference paper
  • First Online:
Advances in Swarm and Computational Intelligence (ICSI 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9141))

Included in the following conference series:

  • 1535 Accesses

Abstract

Most of the universities or colleges, the lecturer has to take the attendance of the students manually by circulating a paper for them to register their names or calling the names. To date, there are various types of attendance systems that are applying different technologies such as biometrics, tokens and sensors such as RFID. The latest is by applying near-field communication (NFC), a sensor within the smartphone has been used as a mean for recording attendances. The aim of this paper is to list out the possible security attacks against NFC (Near Field Communication) enabled systems by focusing on a student-based attendance system. A brief overview over NFC technology and discussion on various security attacks against NFC in different media is presented. Overall, an attendance system is compromised mainly by tag swapping, tag cloning and manipulation of data occurring on the NFC device and operational server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Özdenizci, B., Aydin, M., Coskun, V., Kerem, O.K.: NFC Research Framework: A Literature Review and Future Research Directions. Information Technologies Department, ISIK University, Istanbul

    Google Scholar 

  2. Madlmayr, G., Langer, J., Scharinger, J., Kantner, C.: NFC Devices: Security and Privacy. The Third International Conference on Availability, Reliability and Security

    Google Scholar 

  3. Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35–49. Springer, Heidelberg (2010)

    Google Scholar 

  4. Roland, M.: Practical Attack Scenarios on Secure Element-enabled Mobile Devices. 4th International Workshop on Near Field Communication, Helsinki, Finland, March 13, 2012

    Google Scholar 

  5. Porter Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A Survey of Mobile Malware in the Wild. University of California, Berkeley

    Google Scholar 

  6. Breitinger, F., Nickel, C.: User Survey on Phone Security and Usage

    Google Scholar 

  7. Mitrokotsa, A., Beye, M.R.T., Lopez, P.: Classification of RFID Threats based on Security Principles. Security Lab, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology (TU Delft), Mekelweg 4, 2628 CD

    Google Scholar 

  8. Aigner, M., Dominikus, S., Feldhofer, M.: A System of Secure Virtual Coupons Using NFC Technology. In: Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops © (2007)

    Google Scholar 

  9. Kilas, M.: Digital Signatures on NFC Tags. Master of Science Thesis, March 18, 2009

    Google Scholar 

  10. Church, L., Moloney, M.: State of the Art for Near Field Communication: security and privacy within the field. Escher Group Ltd, Ireland, 3rd draft: May 10, 2012

    Google Scholar 

  11. Reveilhac, M., Pasquet, M.: Promising Secure Element Alternatives for NFCTechnology. 2009 First International Workshop on Near Field Communication

    Google Scholar 

  12. Yan, Q., Li, Y., Li, T., Deng, R.: Insights into Malware Detection and Preventionon Mobile Phones

    Google Scholar 

  13. Balitanas, O.M., Kim, T.: Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol. Hannam University, Department of Multimedia Engineering, Postfach

    Google Scholar 

  14. Greeshma, M.: Global Smartphone Users to Touch 1.75 billion in 2014, January 20, 2014 (accessed on January 2, 2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manmeet Mahinderjit-Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chew, C.B., Wei, K.C., Sheng, T.W., Mahinderjit-Singh, M., Malim, N.H.A.H., Husin, M.H. (2015). Security Challenges and Mitigations of NFC-Enabled Attendance System. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20472-7_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20471-0

  • Online ISBN: 978-3-319-20472-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics