SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2905
Accessory authentication on NFC enabled product using three pass AES
algorithm
Sukrutha C Basappa1, Nagaraja G S2
1MTech student at R V College of Engineering, Bengaluru, Karnataka
2Professor and Associate Dean (PG-CSE) at R V College of Engineering, Bengaluru, Karnataka
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays, Near Field Communication (NFC)
market is no more a monopoly. Competition is highamong the
companies with regard to products they manufacture and
their features for consumer attraction. Mutual authentication
between NFC reader and tag ensures safe communication
between them. This paper proposes an accessory
authentication model that guarantees that counterparts of a
product are of same company. AES-128 bits algorithm is used
in two different modes, that is AES-ECB and AES-CBC for
mutual authentication. AES-CBC mode is stronger in terms of
security when compared to AES-ECB mode.
Key Words: AES, Brand protection, Mutual
authentication, NFC, Security.
1. INTRODUCTION
NFC technology was developed in the year 2004 by
Philips Electronics and Sony. It is a short range, wireless
technology with operating area within 10 centimeters,
operating frequency 13.56 MHz and data transmission rate
used here is of 106 kbps. The objective of the paper is to
develop an accessory authentication model for an NFC
enabled product. This ensures that replaceable part of the
product (NFC tag) and the fixed part (active NFC reader) are
paired counterparts and are of the same company. With this
end-user can get high quality product. This kind of product
positively impacts manufacturing and authenticating
companies, thereby ensuring brand protection. Some
examples are authentication in motorized tooth brush,
where brush handle has NFC reader and the brush head has
NFC tag in it. In high end blenders, the base unit will have
NFC reader and the jar/container will have NFC tag.[12] To
achieve this, firstly communication is establishedamongthe
NFC reader and the tag. Then three pass AES (Advanced
Encryption Standard) algorithm is run, before actual data
transfer happens. AES-128 is a symmetric block cipher, that
uses one shared secret key for both encryption and
decryption. Choice for mode of AES is provided. User can
choose authentication to happen either in AES-ECB
(Electronic Code Book) or in AES-CBC (Cipher Block
Chaining) mode, depending on their requirement.
2. LITERATURE SURVEY
In [1], authors have used the fact that NFC has an
operating modecalled read or write. This has the propertyof
one directional transfer of data only. However, they have
tried to bring in a bi-directional model that is half duplex in
nature. Main advantage of this operating modeof NFCisthat,
it allows different data formats and very low protocol
overhead. But one main challenge is regarding the reader
collision problem, completing transactions in a secure way,
within a timeframe. Fingerprint and Kerberos are two factor
authentication used.
In [2], a smart bandage with wireless temperature and
strain sensor, with passive NFC tag is designed. An android
application called SenseAble was built, to display the body
temperatureand other sensor readings.Chestexpansionand
contraction of a Covid-19 patient was rightly monitored by
this smart bandage.
In [3], it proves thatMITMattackscanbedoneduringNFC
communication, when using a passive card. This method of
attack mimics real implementation of EMV protocolenabling
devices, used for payments. Paper demonstrates how a
contactless payment system can be compromised by an
attacker, by using a malicious MITM card.
In [4], study is done on reading range of implanted
sensors, based on NFC Integrated circuit (IC) by using a NFC
enabled smart phone. Challenges noted were low coupling
between loops of various sizes and limited quality imposed
by bandwidthcommunication.Resultsshowthatsystemwith
three coils performs better at longer distance than 2-coil
system.
In [5], a scheme to build a new public transport payment
method with different technologies like NFC, Bluetooth, IC
card is integrated. Advantage is that, passengers can choose
the payment method that suits them, in terms of discount on
ticket fare. This solves the problem that the payment
platforms are not unified and that passengers have many
applications on their mobile, which causes inconvenience
while travelling.
In [6], a model forvehicle network operatorsusingNFCis
proposed. Tourists generally will not use local mobile
operator’s services, as they stay for short time and the
roamingchargesare also high. Asasolution,themodelwhich
allows less mobile traffic cost for tourist and has increased
transaction security is proposed. Here the user’s mobile
traffic is routed to the network of vehicle rental service
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2906
provider. This simplifiesthetourismforatouristandsecurity
of user’s personal data.
In [7], author starts the paper by discussing general
aspects of NFC and its comparison with RFID technology.
Light is thrown on different ISOstandardsNFCcomplieswith
and NFC operating modes. They prove that NFC isvulnerable
to securityattacks, which canleakuser’simportantdata.This
can have negative impact on organization adopting NFC
technology and its applications. Different attacks are listed
and a scientific method to increase security is also proposed.
In [8], extended version of different attacks in NFCareais
briefed. Focus on DoS and data corruptions was given as it
was noted from studying risk assessment models, these two
attacks were most commonly witnessed. They were studied
by Analytical Hierarchy Process (AHP). A solution was
proposed whichwasatouchandgoapplicationcalledMIDAS.
It is concluded that AES and ECC (Elliptic Curve
Cryptography) are best known algorithms to build a secure
channel and to avoid data corruption.
In [9], Authors propose an application of NFC in the IoT
domain. Textile industry is far behind in terms of IoT. Hence,
to enhance the textile business, a system called ‘Interactive
clothes’ is designed. Every cloth has an NFC chip with unique
number embedded in it. An application to scan the NFC is
developed, which gives a URL to the database. This system
modernises manufacturing, managing, selling and buying
goods.
In [10], author proves that tags used in NFC system are
limited in terms of chip size and power consumption. These
limitations make it difficult tointegrate strongcryptographic
security onto the tags. Author suggests that there is need to
implement secure algorithmthat is secureagainstattacklike
Side-Channel Analysis (SCA). As a case study, a tag with
cryptographic algorithms (AES and ECDSA) implemented is
taken.
Few of the research gaps observed are as follows:
1. NFCisashort-rangecommunicationtechnology,and
hence believed that security risks are low as the
interaction is within close proximity. But security
vulnerabilities do exist and few attacks are only
discovered.
2. NFC is mostly used in the area of access control and
paymentmethod.Otherapplicationslikefiletransfer
and in IoT can be researched more.
3. The economic performance of NFC developments
can be evaluatedandimpactsofNFCtechnologieson
companies, organizations and business models can
be explored.
3. DESIGN
Project design gives an outline of project development
process. It helps to identify the modules and the tools
required to implement them. Figure 1 shows the system
architecture which includes a user application built on NFC
reader library for authentication process [11]. The reader
library stack has fourlayers.Applicationlayeristhetoplayer,
which implements the commands to work with contactless
technologies.ProtocolabstractionlayerhasfunctionsforNFC
card activation. The hardware specific elements of reader
implemented in the hardware abstraction layer. It also helps
execute native commands of the chip. The lowest bus
abstraction layer, implements the communication between
the reader and tag. Both reader and taghaveakeystore,from
which they decide upon a secret key for authentication.
Figure 1: System architecture
Data flow diagrams help to understand thesystem better
as it brings in modularity. Figure 2 shows DFD Level 0.
Authentication procedure starts when user application
makes reader to pass ReqA (Request A) command to the
detected cards. Authentication result is decisive, if
counterparts are authenticated then communication
between them starts, else aborts.
Figure 2: DFD Level 0
DFD Level 1 in figure 3 shows the two modules involved
in accessory authentication. First is communication
establishmemt between reader andtag, whichisachieved by
using available command set of tags. If more thanonecard is
present in proximity, collisionresolutionisdone bystandard
anticollision procedure and one card is selected. Then three
pass AES algorithm is used for mutual authentication.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2907
Figure 3: DFD Level 1
4. METHODOLOGY
NFC reader will emit radio waves in a periodic manner
and checks if any card is present in its proximity. If no card is
detected, reader continues the loop until a card is detected.If
more than one card is detected, anticollision procedure
resolves the conflict and chooses one card as counterpart for
reader. After card selection and activation, authentication
procedure happens. If reader and tag successfully
authenticate to each other, a sample text is written into the
card and then read back to check data integrity. Figure 4
shows entire methodology adopted in the form of flowchart.
Figure 4: Flowchart of accessory authentication
AES three pass mutual authentication is a procedure
which uses key of length 128 bits [12]. In the first pass of
algorithm, NFC reader encrypts its data (RndX) with agreed
secret key (K) and sends the cipher to NFC tag. In return, tag
responds by sending the deciphered data. In second pass,tag
encrypts its data (RndY) and sends the cipher generated to
reader. Reader deciphers andsends the responseback.Third
pass includes each party verifying if data received is same as
what they had generated originally. That is reader checks if
tag had sent RndX correctly, and tag checks if reader’s
response had RndY. If any one party fails to authenticate
themselves to other, the accessory authentication procedure
is aborted. User can choose either AES-ECB mode for
authentication or AES-CBC mode. If databeingencipheredby
each party is not sensitive, ECB is best option as it is fast.
However, if security of data is prime concern, then CBC is
preferred because of its complexity. Figure 5 shows pictorial
representation of authentication procedurediscussedabove.
Figure 5: Three pass mutual authentication
5. RESULT AND ANALYSIS
Anticollision procedure selects a tag based on its uid
(unique identification number) which is followed by card
activation. The console display is as shown in figure 6.
Technology of the detected card is displayed along with its
uid.
Figure 6: Card activation
Card activation is followed by choice entry by user for
mode selection. The output after running accessory
authentication in AES-CBC mode is shown in figure 7. Both
reader and tag have authenticated to each other. Sample text
was written into tag and readsuccessfully without any error.
Figure 7: Accessory authentication by AES-CBC mode
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2908
AES-ECB mode is simple and fast approach. Drawback is
that duplicate data in plain text will be reflected in the cipher
text. Hence, it is not recommended in the areas where
security is a priority. Whereas, AES-CBC mode will encrypt
every occurrence of same plain text into differentciphertext.
But it is slow and complex compared to ECB mode. Yet CBCis
stronger in terms of security and is preferred for
authentication.
6. CONCLUSION
A survey shows that NFC market is likely to raise from
18 billion USD in 2020 to 34.9 billion USD by 2025.Themain
use cases are in mobile commerce and usage of wearable
technology. This paper serves the need for accessory
authentication by AES algorithm, to ensure that genuine
parts of same company are used. This enhances consumer
experience, convenience and ensures product safety. If
product requires more secure form of authentication, ECCis
suggested from public key cryptographic algorithms. Here,
user application just checks read and write ontothetagafter
successful authentication. This feature can be enhanced
according to user needs. Example in case of NFC enabled
product like motorized toothbrush, authentication can be
followed by tapping mobile phone to tag can display URL to
webpage that keeps track of oral health and brush head
replacement date.
REFERENCES
[1] M. S. Chishti, C. T. King and A. Banerjee, “Exploring Half-
Duplex Communication of NFC Read/Write Mode for
Secure Multi-Factor Authentication”, 2021 in IEEE
Access, vol. 9, pp. 6344-6357, doi:
10.1109/ACCESS.2020.3048711.
[2] P. Escobedo, M. Bhattacharjee,F.Nikbakhtnasrabadiand
R. Dahiya, “Smart Bandage With Wireless Strain and
TemperatureSensorsand BatterylessNFCTag”,2021,in
IEEE Internet of Things Journal, vol. 8, no. 6, pp. 5093-
5100, 15 March, doi: 10.1109/JIOT.2020.3048282.
[3] S. Akter, S. Chellappan, T. Chakraborty, T. A. Khan, A.
Rahman and A. B. M. Alim Al Islam, “Man-in-the-Middle
Attack on Contactless Payment over NFC
Communications: Design, Implementation, Experiments
and Detection”, 2021, in IEEE Transactions on
Dependable and Secure Computing, vol. 18, no. 6, pp.
3012-3023, 1 Nov-Dec, doi:
10.1109/TDSC.2020.3030213.
[4] A. Lazaro, M. Boada, R. Villarino and D. Girbau, “Study on
the Reading of Energy-Harvested Implanted NFC Tags
Using Mobile Phones”, 2020 in IEEE Access, vol. 8, pp.
2200-2221, doi: 10.1109/ACCESS.2019.2962570.
[5] C. Shuran and Y. Xiaoling, “A New Public Transport
Payment Method BasedonNFCandQRCode”,2020IEEE
5th International Conference on Intelligent
Transportation Engineering (ICITE), pp. 240-244, doi:
10.1109/ICITE50838.2020.9231356.
[6] V. Oliinyk and O. Rubel, “Improving Safety and Ease of
Use in Automatic Electric Vehicle Rental Systems”, 2020
IEEE 15th International ConferenceonAdvancedTrends
in Radioelectronics, Telecommunications andComputer
Engineering (TCSET), pp. 800-803, doi:
10.1109/TCSET49122.2020.235545.
[7] A. Albattah, Y. Alghofaili and S. Elkhediri, “NFC
Technology: Assessment Effective of Security towards
Protecting NFC Devices & Services”, 2020 International
Conference on Computing and Information Technology
(ICCIT-1441), 2020, pp. 1-5, doi: 10.1109/ICCIT-
144147971.2020.9213758.
[8] M. M. Singh, K. A. A. K. Adzman and R.Hassan,“NearField
Communication (NFC) Technology Security
Vulnerabilities and Countermeasures”,2018,
InternationalJournalofEngineering&Technology,vol.7,
no. 4.31, pp. 298-305.
[9] Kishore Kumar Reddy N. G. and Rajeshwari K.,
“Interactive clothes based on IOT using NFC and Mobile
Application”, 2017 IEEE 7th Annual Computing and
Communication Workshop and Conference (CCWC),
2017, pp. 1-4, doi: 10.1109/CCWC.2017.7868339
[10] Korak T, “Evaluation of a security-enabledNFCTagwith
AES and ECDSA”, 2011, Master’s thesis, Institute
for appliedInformationProcessingandCommunications
(IAIK), Austria.
[11] NFC Reader Library:
https://community.nxp.com/pwmxy87654/attachme
nts/pwmxy87654/nfc/707/1/UM10802_NXP-NFC-
Reader-Library-v3.010-API.pdf
[12] Mutual authentication procedure:
https://community.nxp.com/pwmxy87654/attachme
nts/pwmxy87654/tech-days/179/1/AMF-SMC-
T3036.pdf
BIOGRAPHIES
Sukrutha C Basappa, is a MTech
student at Department of Computer
Science and Engineering, R V College
of Engineering, Bengaluru, Karnataka,
India.(sukruthacb.scn20@rvce.edu.in)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2909
Dr. Nagaraja G S, is working as
Professor and Associate Dean (PG-
CSE) at Department of Computer
Science and Engineering, R V College
of Engineering, Bengaluru, Karnataka,
India. (nagarajags@rvce.edu.in)

More Related Content

Similar to Accessory authentication on NFC enabled product using three pass AES algorithm (20)

PDF
Near Field Communication : Tap and Know
IRJET Journal
 
PDF
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
IJCI JOURNAL
 
PDF
NFC Everywhere Brochure 2016_WEB
Richard Schmidmaier
 
PDF
NFC Everywhere Brochure 2016
Laurent Dardé
 
PPTX
LALIT NFC
LALIT SEHRAWAT
 
PDF
Nfc technology
manasvi sarkar
 
PPTX
Near field communication
Bindu U
 
PPTX
Near Field Communication (NFC Architecture and Operating Modes)
Deepak Kl
 
PPTX
NFC
Konica Arora
 
PPTX
Near field communication
Vaibhav Chandak
 
PDF
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
 
PPTX
Near field communication
divyasolanki101
 
PPT
NFC TECHNOLOGY
manasvi sarkar
 
PDF
SMART BUS TICKET RESERVATION SYSTEM
IRJET Journal
 
PDF
Iaetsd near field
Iaetsd Iaetsd
 
PDF
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET Journal
 
PPT
Nfc kdr
Shahul Hameed
 
PDF
Electronic Access Control Security / Безопасность электронных систем контроля...
Positive Hack Days
 
PDF
Electronic Access Control Security
Opposing Force S.r.l.
 
Near Field Communication : Tap and Know
IRJET Journal
 
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
IJCI JOURNAL
 
NFC Everywhere Brochure 2016_WEB
Richard Schmidmaier
 
NFC Everywhere Brochure 2016
Laurent Dardé
 
LALIT NFC
LALIT SEHRAWAT
 
Nfc technology
manasvi sarkar
 
Near field communication
Bindu U
 
Near Field Communication (NFC Architecture and Operating Modes)
Deepak Kl
 
Near field communication
Vaibhav Chandak
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
 
Near field communication
divyasolanki101
 
NFC TECHNOLOGY
manasvi sarkar
 
SMART BUS TICKET RESERVATION SYSTEM
IRJET Journal
 
Iaetsd near field
Iaetsd Iaetsd
 
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET Journal
 
Nfc kdr
Shahul Hameed
 
Electronic Access Control Security / Безопасность электронных систем контроля...
Positive Hack Days
 
Electronic Access Control Security
Opposing Force S.r.l.
 

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
PDF
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
PPTX
REINFORCEMENT AS CONSTRUCTION MATERIALS.pptx
mohaiminulhaquesami
 
PPTX
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
PPT
inherently safer design for engineering.ppt
DhavalShah616893
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
drones for disaster prevention response.pptx
NawrasShatnawi1
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
Electron Beam Machining for Production Process
Rajshahi University of Engineering & Technology(RUET), Bangladesh
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
Thermal runway and thermal stability.pptx
godow93766
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
REINFORCEMENT AS CONSTRUCTION MATERIALS.pptx
mohaiminulhaquesami
 
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
inherently safer design for engineering.ppt
DhavalShah616893
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
drones for disaster prevention response.pptx
NawrasShatnawi1
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
Ad

Accessory authentication on NFC enabled product using three pass AES algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2905 Accessory authentication on NFC enabled product using three pass AES algorithm Sukrutha C Basappa1, Nagaraja G S2 1MTech student at R V College of Engineering, Bengaluru, Karnataka 2Professor and Associate Dean (PG-CSE) at R V College of Engineering, Bengaluru, Karnataka ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays, Near Field Communication (NFC) market is no more a monopoly. Competition is highamong the companies with regard to products they manufacture and their features for consumer attraction. Mutual authentication between NFC reader and tag ensures safe communication between them. This paper proposes an accessory authentication model that guarantees that counterparts of a product are of same company. AES-128 bits algorithm is used in two different modes, that is AES-ECB and AES-CBC for mutual authentication. AES-CBC mode is stronger in terms of security when compared to AES-ECB mode. Key Words: AES, Brand protection, Mutual authentication, NFC, Security. 1. INTRODUCTION NFC technology was developed in the year 2004 by Philips Electronics and Sony. It is a short range, wireless technology with operating area within 10 centimeters, operating frequency 13.56 MHz and data transmission rate used here is of 106 kbps. The objective of the paper is to develop an accessory authentication model for an NFC enabled product. This ensures that replaceable part of the product (NFC tag) and the fixed part (active NFC reader) are paired counterparts and are of the same company. With this end-user can get high quality product. This kind of product positively impacts manufacturing and authenticating companies, thereby ensuring brand protection. Some examples are authentication in motorized tooth brush, where brush handle has NFC reader and the brush head has NFC tag in it. In high end blenders, the base unit will have NFC reader and the jar/container will have NFC tag.[12] To achieve this, firstly communication is establishedamongthe NFC reader and the tag. Then three pass AES (Advanced Encryption Standard) algorithm is run, before actual data transfer happens. AES-128 is a symmetric block cipher, that uses one shared secret key for both encryption and decryption. Choice for mode of AES is provided. User can choose authentication to happen either in AES-ECB (Electronic Code Book) or in AES-CBC (Cipher Block Chaining) mode, depending on their requirement. 2. LITERATURE SURVEY In [1], authors have used the fact that NFC has an operating modecalled read or write. This has the propertyof one directional transfer of data only. However, they have tried to bring in a bi-directional model that is half duplex in nature. Main advantage of this operating modeof NFCisthat, it allows different data formats and very low protocol overhead. But one main challenge is regarding the reader collision problem, completing transactions in a secure way, within a timeframe. Fingerprint and Kerberos are two factor authentication used. In [2], a smart bandage with wireless temperature and strain sensor, with passive NFC tag is designed. An android application called SenseAble was built, to display the body temperatureand other sensor readings.Chestexpansionand contraction of a Covid-19 patient was rightly monitored by this smart bandage. In [3], it proves thatMITMattackscanbedoneduringNFC communication, when using a passive card. This method of attack mimics real implementation of EMV protocolenabling devices, used for payments. Paper demonstrates how a contactless payment system can be compromised by an attacker, by using a malicious MITM card. In [4], study is done on reading range of implanted sensors, based on NFC Integrated circuit (IC) by using a NFC enabled smart phone. Challenges noted were low coupling between loops of various sizes and limited quality imposed by bandwidthcommunication.Resultsshowthatsystemwith three coils performs better at longer distance than 2-coil system. In [5], a scheme to build a new public transport payment method with different technologies like NFC, Bluetooth, IC card is integrated. Advantage is that, passengers can choose the payment method that suits them, in terms of discount on ticket fare. This solves the problem that the payment platforms are not unified and that passengers have many applications on their mobile, which causes inconvenience while travelling. In [6], a model forvehicle network operatorsusingNFCis proposed. Tourists generally will not use local mobile operator’s services, as they stay for short time and the roamingchargesare also high. Asasolution,themodelwhich allows less mobile traffic cost for tourist and has increased transaction security is proposed. Here the user’s mobile traffic is routed to the network of vehicle rental service
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2906 provider. This simplifiesthetourismforatouristandsecurity of user’s personal data. In [7], author starts the paper by discussing general aspects of NFC and its comparison with RFID technology. Light is thrown on different ISOstandardsNFCcomplieswith and NFC operating modes. They prove that NFC isvulnerable to securityattacks, which canleakuser’simportantdata.This can have negative impact on organization adopting NFC technology and its applications. Different attacks are listed and a scientific method to increase security is also proposed. In [8], extended version of different attacks in NFCareais briefed. Focus on DoS and data corruptions was given as it was noted from studying risk assessment models, these two attacks were most commonly witnessed. They were studied by Analytical Hierarchy Process (AHP). A solution was proposed whichwasatouchandgoapplicationcalledMIDAS. It is concluded that AES and ECC (Elliptic Curve Cryptography) are best known algorithms to build a secure channel and to avoid data corruption. In [9], Authors propose an application of NFC in the IoT domain. Textile industry is far behind in terms of IoT. Hence, to enhance the textile business, a system called ‘Interactive clothes’ is designed. Every cloth has an NFC chip with unique number embedded in it. An application to scan the NFC is developed, which gives a URL to the database. This system modernises manufacturing, managing, selling and buying goods. In [10], author proves that tags used in NFC system are limited in terms of chip size and power consumption. These limitations make it difficult tointegrate strongcryptographic security onto the tags. Author suggests that there is need to implement secure algorithmthat is secureagainstattacklike Side-Channel Analysis (SCA). As a case study, a tag with cryptographic algorithms (AES and ECDSA) implemented is taken. Few of the research gaps observed are as follows: 1. NFCisashort-rangecommunicationtechnology,and hence believed that security risks are low as the interaction is within close proximity. But security vulnerabilities do exist and few attacks are only discovered. 2. NFC is mostly used in the area of access control and paymentmethod.Otherapplicationslikefiletransfer and in IoT can be researched more. 3. The economic performance of NFC developments can be evaluatedandimpactsofNFCtechnologieson companies, organizations and business models can be explored. 3. DESIGN Project design gives an outline of project development process. It helps to identify the modules and the tools required to implement them. Figure 1 shows the system architecture which includes a user application built on NFC reader library for authentication process [11]. The reader library stack has fourlayers.Applicationlayeristhetoplayer, which implements the commands to work with contactless technologies.ProtocolabstractionlayerhasfunctionsforNFC card activation. The hardware specific elements of reader implemented in the hardware abstraction layer. It also helps execute native commands of the chip. The lowest bus abstraction layer, implements the communication between the reader and tag. Both reader and taghaveakeystore,from which they decide upon a secret key for authentication. Figure 1: System architecture Data flow diagrams help to understand thesystem better as it brings in modularity. Figure 2 shows DFD Level 0. Authentication procedure starts when user application makes reader to pass ReqA (Request A) command to the detected cards. Authentication result is decisive, if counterparts are authenticated then communication between them starts, else aborts. Figure 2: DFD Level 0 DFD Level 1 in figure 3 shows the two modules involved in accessory authentication. First is communication establishmemt between reader andtag, whichisachieved by using available command set of tags. If more thanonecard is present in proximity, collisionresolutionisdone bystandard anticollision procedure and one card is selected. Then three pass AES algorithm is used for mutual authentication.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2907 Figure 3: DFD Level 1 4. METHODOLOGY NFC reader will emit radio waves in a periodic manner and checks if any card is present in its proximity. If no card is detected, reader continues the loop until a card is detected.If more than one card is detected, anticollision procedure resolves the conflict and chooses one card as counterpart for reader. After card selection and activation, authentication procedure happens. If reader and tag successfully authenticate to each other, a sample text is written into the card and then read back to check data integrity. Figure 4 shows entire methodology adopted in the form of flowchart. Figure 4: Flowchart of accessory authentication AES three pass mutual authentication is a procedure which uses key of length 128 bits [12]. In the first pass of algorithm, NFC reader encrypts its data (RndX) with agreed secret key (K) and sends the cipher to NFC tag. In return, tag responds by sending the deciphered data. In second pass,tag encrypts its data (RndY) and sends the cipher generated to reader. Reader deciphers andsends the responseback.Third pass includes each party verifying if data received is same as what they had generated originally. That is reader checks if tag had sent RndX correctly, and tag checks if reader’s response had RndY. If any one party fails to authenticate themselves to other, the accessory authentication procedure is aborted. User can choose either AES-ECB mode for authentication or AES-CBC mode. If databeingencipheredby each party is not sensitive, ECB is best option as it is fast. However, if security of data is prime concern, then CBC is preferred because of its complexity. Figure 5 shows pictorial representation of authentication procedurediscussedabove. Figure 5: Three pass mutual authentication 5. RESULT AND ANALYSIS Anticollision procedure selects a tag based on its uid (unique identification number) which is followed by card activation. The console display is as shown in figure 6. Technology of the detected card is displayed along with its uid. Figure 6: Card activation Card activation is followed by choice entry by user for mode selection. The output after running accessory authentication in AES-CBC mode is shown in figure 7. Both reader and tag have authenticated to each other. Sample text was written into tag and readsuccessfully without any error. Figure 7: Accessory authentication by AES-CBC mode
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2908 AES-ECB mode is simple and fast approach. Drawback is that duplicate data in plain text will be reflected in the cipher text. Hence, it is not recommended in the areas where security is a priority. Whereas, AES-CBC mode will encrypt every occurrence of same plain text into differentciphertext. But it is slow and complex compared to ECB mode. Yet CBCis stronger in terms of security and is preferred for authentication. 6. CONCLUSION A survey shows that NFC market is likely to raise from 18 billion USD in 2020 to 34.9 billion USD by 2025.Themain use cases are in mobile commerce and usage of wearable technology. This paper serves the need for accessory authentication by AES algorithm, to ensure that genuine parts of same company are used. This enhances consumer experience, convenience and ensures product safety. If product requires more secure form of authentication, ECCis suggested from public key cryptographic algorithms. Here, user application just checks read and write ontothetagafter successful authentication. This feature can be enhanced according to user needs. Example in case of NFC enabled product like motorized toothbrush, authentication can be followed by tapping mobile phone to tag can display URL to webpage that keeps track of oral health and brush head replacement date. REFERENCES [1] M. S. Chishti, C. T. King and A. Banerjee, “Exploring Half- Duplex Communication of NFC Read/Write Mode for Secure Multi-Factor Authentication”, 2021 in IEEE Access, vol. 9, pp. 6344-6357, doi: 10.1109/ACCESS.2020.3048711. [2] P. Escobedo, M. Bhattacharjee,F.Nikbakhtnasrabadiand R. Dahiya, “Smart Bandage With Wireless Strain and TemperatureSensorsand BatterylessNFCTag”,2021,in IEEE Internet of Things Journal, vol. 8, no. 6, pp. 5093- 5100, 15 March, doi: 10.1109/JIOT.2020.3048282. [3] S. Akter, S. Chellappan, T. Chakraborty, T. A. Khan, A. Rahman and A. B. M. Alim Al Islam, “Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection”, 2021, in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 3012-3023, 1 Nov-Dec, doi: 10.1109/TDSC.2020.3030213. [4] A. Lazaro, M. Boada, R. Villarino and D. Girbau, “Study on the Reading of Energy-Harvested Implanted NFC Tags Using Mobile Phones”, 2020 in IEEE Access, vol. 8, pp. 2200-2221, doi: 10.1109/ACCESS.2019.2962570. [5] C. Shuran and Y. Xiaoling, “A New Public Transport Payment Method BasedonNFCandQRCode”,2020IEEE 5th International Conference on Intelligent Transportation Engineering (ICITE), pp. 240-244, doi: 10.1109/ICITE50838.2020.9231356. [6] V. Oliinyk and O. Rubel, “Improving Safety and Ease of Use in Automatic Electric Vehicle Rental Systems”, 2020 IEEE 15th International ConferenceonAdvancedTrends in Radioelectronics, Telecommunications andComputer Engineering (TCSET), pp. 800-803, doi: 10.1109/TCSET49122.2020.235545. [7] A. Albattah, Y. Alghofaili and S. Elkhediri, “NFC Technology: Assessment Effective of Security towards Protecting NFC Devices & Services”, 2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020, pp. 1-5, doi: 10.1109/ICCIT- 144147971.2020.9213758. [8] M. M. Singh, K. A. A. K. Adzman and R.Hassan,“NearField Communication (NFC) Technology Security Vulnerabilities and Countermeasures”,2018, InternationalJournalofEngineering&Technology,vol.7, no. 4.31, pp. 298-305. [9] Kishore Kumar Reddy N. G. and Rajeshwari K., “Interactive clothes based on IOT using NFC and Mobile Application”, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 2017, pp. 1-4, doi: 10.1109/CCWC.2017.7868339 [10] Korak T, “Evaluation of a security-enabledNFCTagwith AES and ECDSA”, 2011, Master’s thesis, Institute for appliedInformationProcessingandCommunications (IAIK), Austria. [11] NFC Reader Library: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/nfc/707/1/UM10802_NXP-NFC- Reader-Library-v3.010-API.pdf [12] Mutual authentication procedure: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/tech-days/179/1/AMF-SMC- T3036.pdf BIOGRAPHIES Sukrutha C Basappa, is a MTech student at Department of Computer Science and Engineering, R V College of Engineering, Bengaluru, Karnataka, India.([email protected])
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2909 Dr. Nagaraja G S, is working as Professor and Associate Dean (PG- CSE) at Department of Computer Science and Engineering, R V College of Engineering, Bengaluru, Karnataka, India. ([email protected])