Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
There are a many popular ways for mobile devices to connect
wirelessly. This connectiongives users the ability to transfer
data between two or more devices in additionto control a
device remotely. Therefore, the security of such functions is
insufficient for widespread use of these wireless technologies.
However, in the near future,Near Field Communication
(NFC) technology willbecome widespread for users, so its
security weakness which can be dangerous to the privacy of
the users confidential information should be evaluated and
handled accurately. The security issues of NFC are anactive
area of research for the coming years. This paper gives a
detailed comprehensive analysis of security with respect to
NFC, Bluetooth and infrared.Finally, the paper puts the most
important recommendations for future security improvement
that can bedeveloped in NFC and other wireless technologies.
1. Introduction
Wireless communication is the transfer of information
over a distance without the use ofconductors or cables.
The distances of data transfer may be short in range of
centimeters as in NFC applications or long in range of
thousands or millions of kilometers as radio
communications[1]. Also mobile wireless communications
offer organizations and users many benefits such as
portability and flexibility, increased productivity, and
lower installation costs. Wireless technologies cover a
broad range of differing capabilities oriented toward
different uses and needs [2].
In just 25 years wireless technologies have changed the
face of communications and have also changed the
concept of network topology which has been applicable
due to the relentless progress in silicon technology with
higher integration, lower costs, more capabilities and
technical advances in air interfaces i.e. higher efficiency
for voice and data services, lower infrastructure capital
costs [3].
The communications infrastructure necessary for the
wireless environment is quite complex. Wireless
devices are likely to remain at a disadvantage over
their wired counterparts in terms of bandwidth.
Limited bandwidth is a significant problem that
requires organizations to rethink how users interact
through a wireless device with an information
system. An important issue is how to create efficient
applications that can realistically work with current
technology [4].
There are already a variety of mobile wireless
technologies which can be used for mobile secured
applications such as NFC, Bluetooth and others
Page 123
Device B
Description
Active
Active
Passive
Passive
Active
7 Conclusion
This paper presenteda detailed analysis formobile NFC
wireless technology security compared by Bluetooth and
infrared ones. A list of security issues for
eachtechnologywas listed in additional to research
recommendations for each one. Regarding NFC and IrDA
by itself cannot provide protection against eavesdropping
References
[1] MuditRatanaBhalla,
AnandVardhanBhalla
Generations of Mobile Wireless Technology:A
Survey, International Journal of Computer
Applications Volume 5 No.4, August 2010.
[2] Tom Karygiannis, Les Owens Wireless Network
Security, Special Publication , Computer Security
Division
Information
Technology
Laboratory,National Institute of Standards and
Technology, November 2002.
[3] Nandini Deb, TusharSaxena , HimanshuGoyal A
Comparative Study of Security Attacks in Bluetooth,
Wi-fi and Wimax, Amity University, Amity Institute
of Telecom Engineering & Management, 2010.
[4] Peter Tarasewich, Robert C. Nickerson, Merrill
Warkentin
Wireless/Mobile
e-commerce:
Page 128
Page 129