Accessory authentication on NFC enabled product using three pass AES algorithm

Page 1

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p ISSN: 2395 0072

Accessory authentication on NFC enabled product using three pass AES algorithm

1MTech student at R V College of Engineering, Bengaluru, Karnataka

2Professor and Associate Dean (PG CSE) at R V College of Engineering, Bengaluru, Karnataka ***

Abstract - Nowadays, Near Field Communication (NFC) market is no more a monopoly. Competition is highamongthe companies with regard to products they manufacture and their features for consumer attraction. Mutualauthentication between NFC reader and tag ensures safe communication between them. This paper proposes an accessory authentication model that guarantees that counterparts of a product are of same company. AES 128 bits algorithm is used in two different modes, that is AES ECB and AES CBC for mutual authentication. AES CBC mode is stronger in terms of security when compared to AES ECB mode.

Key Words: AES, Brand protection, Mutual authentication,NFC,Security.

1. INTRODUCTION

NFC technology was developed in the year 2004 by Philips Electronics and Sony. It is a short range, wireless technology with operating area within 10 centimeters, operatingfrequency13.56MHzanddatatransmissionrate used here is of 106 kbps. The objective of the paper is to develop an accessory authentication model for an NFC enabledproduct.Thisensuresthatreplaceablepartofthe product(NFCtag)andthefixedpart(activeNFCreader)are pairedcounterpartsandareofthesamecompany.Withthis end usercangethighqualityproduct.Thiskindofproduct positively impacts manufacturing and authenticating companies, thereby ensuring brand protection. Some examples are authentication in motorized tooth brush, wherebrushhandlehasNFCreaderandthebrushheadhas NFCtaginit.Inhighendblenders,thebaseunitwillhave NFCreaderandthejar/containerwillhaveNFCtag.[12]To achievethis,firstlycommunicationisestablishedamongthe NFC reader and the tag. Then three pass AES (Advanced Encryption Standard) algorithm is run, before actual data transferhappens.AES 128isasymmetricblockcipher,that uses one shared secret key for both encryption and decryption. Choice for mode of AES is provided. User can choose authentication to happen either in AES ECB (Electronic Code Book) or in AES CBC (Cipher Block Chaining)mode,dependingontheirrequirement.

2. LITERATURE SURVEY

In [1], authors have used the fact that NFC has an operatingmodecalledreadorwrite.Thishasthepropertyof

one directional transfer of data only. However, they have triedtobringinabi directionalmodelthatishalfduplexin nature.MainadvantageofthisoperatingmodeofNFCisthat, it allows different data formats and very low protocol overhead. But one main challenge is regarding the reader collisionproblem,completingtransactionsinasecureway, withinatimeframe.FingerprintandKerberosaretwofactor authenticationused.

In [2],a smart bandage with wireless temperatureand strainsensor,withpassiveNFCtagisdesigned.Anandroid applicationcalledSenseAblewasbuilt,todisplaythebody temperatureandothersensorreadings.Chestexpansionand contractionofaCovid 19patientwasrightlymonitoredby thissmartbandage.

In[3],itprovesthatMITMattackscanbedoneduringNFC communication,whenusingapassivecard.Thismethodof attackmimicsrealimplementationofEMVprotocolenabling devices, used for payments. Paper demonstrates how a contactless payment system can be compromised by an attacker,byusingamaliciousMITMcard.

In [4], study is done on reading range of implanted sensors,basedonNFCIntegratedcircuit(IC)byusingaNFC enabledsmartphone.Challengesnotedwerelowcoupling betweenloopsofvarioussizesandlimitedqualityimposed bybandwidthcommunication.Resultsshowthatsystemwith three coils performs better at longer distance than 2 coil system.

In[5],aschemetobuildanewpublictransportpayment method with different technologies likeNFC, Bluetooth, IC cardisintegrated.Advantageisthat,passengerscanchoose thepaymentmethodthatsuitsthem,intermsofdiscounton ticket fare. This solves the problem that the payment platforms are not unified and that passengers have many applications on their mobile, which causes inconvenience whiletravelling.

In[6],amodelforvehiclenetworkoperatorsusingNFCis proposed. Tourists generally will not use local mobile operator’s services, as they stay for short time and the roamingchargesarealsohigh.Asasolution,themodelwhich allowslessmobiletrafficcostfortouristandhasincreased transaction security is proposed. Here the user’s mobile traffic is routed to the network of vehicle rental service

© 2022,
|
|
Certified Journal | Page2905
IRJET
Impact Factor value: 7.529
ISO 9001:2008

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p ISSN: 2395 0072

provider.Thissimplifiesthetourismforatouristandsecurity ofuser’spersonaldata.

In [7], author starts the paper by discussing general aspects of NFC and its comparison with RFID technology. LightisthrownondifferentISOstandardsNFCcomplieswith andNFCoperatingmodes.TheyprovethatNFCisvulnerable tosecurityattacks,whichcanleakuser’simportantdata.This can have negative impact on organization adopting NFC technologyanditsapplications.Differentattacksarelisted andascientificmethodtoincreasesecurityisalsoproposed.

In[8],extendedversionofdifferentattacksinNFCareais briefed.FocusonDoSanddatacorruptionswasgivenasit wasnotedfromstudyingriskassessmentmodels,thesetwo attacksweremostcommonlywitnessed.Theywerestudied by Analytical Hierarchy Process (AHP). A solution was proposedwhichwasatouchandgoapplicationcalledMIDAS. It is concluded that AES and ECC (Elliptic Curve Cryptography)arebestknownalgorithmstobuildasecure channelandtoavoiddatacorruption.

In [9], Authors propose an application of NFC in the IoT domain.TextileindustryisfarbehindintermsofIoT.Hence, toenhancethetextilebusiness,asystemcalled‘Interactive clothes’isdesigned.EveryclothhasanNFCchipwithunique number embedded in it. An application to scan the NFC is developed,whichgivesaURLtothedatabase.Thissystem modernises manufacturing, managing, selling and buying goods.

In[10],authorprovesthattagsusedinNFCsystemare limitedintermsofchipsizeandpowerconsumption.These limitationsmakeitdifficulttointegratestrongcryptographic securityontothetags.Authorsuggeststhatthereisneedto implementsecurealgorithmthatissecureagainstattacklike Side Channel Analysis (SCA). As a case study, a tag with cryptographicalgorithms(AESandECDSA)implementedis taken.

Fewoftheresearchgapsobservedareasfollows:

1. NFCisashort rangecommunicationtechnology,and hence believed that security risks are low as the interaction is within close proximity. But security vulnerabilities do exist and few attacks are only discovered.

2. NFCismostlyusedintheareaofaccesscontroland paymentmethod.Otherapplicationslikefiletransfer andinIoTcanberesearchedmore.

3. The economic performance of NFC developments canbeevaluatedandimpactsofNFCtechnologieson companies,organizationsandbusinessmodelscan beexplored.

3. DESIGN

Project design gives an outline of project development process. It helps to identify the modules and the tools required to implement them. Figure 1 shows the system architecturewhichincludesauserapplicationbuiltonNFC reader library for authentication process [11]. The reader librarystackhasfourlayers.Applicationlayeristhetoplayer, whichimplementsthecommandstoworkwithcontactless technologies.ProtocolabstractionlayerhasfunctionsforNFC card activation. The hardware specific elements of reader implementedinthehardwareabstractionlayer.Italsohelps execute native commands of the chip. The lowest bus abstractionlayer,implementsthecommunicationbetween thereaderandtag.Bothreaderandtaghaveakeystore,from whichtheydecideuponasecretkeyforauthentication.

Figure 1: Systemarchitecture

Dataflowdiagramshelptounderstandthesystembetter as it brings in modularity. Figure 2 shows DFD Level 0. Authentication procedure starts when user application makes reader to pass ReqA (Request A) command to the detected cards. Authentication result is decisive, if counterparts are authenticated then communication betweenthemstarts,elseaborts.

Figure 2: DFDLevel0

DFDLevel1infigure3showsthetwomodulesinvolved in accessory authentication. First is communication establishmemtbetweenreaderandtag,whichisachievedby usingavailablecommandsetoftags.Ifmorethanonecardis presentinproximity,collisionresolutionisdonebystandard anticollisionprocedureandonecardisselected.Thenthree passAESalgorithmisusedformutualauthentication.

©
Page2906
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p ISSN: 2395 0072

themselvestoother,theaccessoryauthenticationprocedure is aborted. User can choose either AES ECB mode for authenticationorAES CBCmode.Ifdatabeingencipheredby each party is not sensitive, ECB is best option as it is fast. However, if security of data is prime concern, then CBC is preferredbecauseofitscomplexity.Figure5showspictorial representationofauthenticationprocedurediscussedabove.

Figure 3: DFDLevel1

4. METHODOLOGY

NFCreaderwill emitradiowavesina periodic manner andchecksifanycardispresentinitsproximity.Ifnocardis detected,readercontinuestheloopuntilacardisdetected.If more than one card is detected, anticollision procedure resolvestheconflictandchoosesonecardascounterpartfor reader. After card selection and activation, authentication procedure happens. If reader and tag successfully authenticatetoeachother,asampletextiswrittenintothe card and then read back to check data integrity. Figure 4 showsentiremethodologyadoptedintheformofflowchart.

Figure 5: Threepassmutualauthentication

5. RESULT AND ANALYSIS

Anticollision procedure selects a tag based on its uid (unique identification number) which is followed by card activation. The console display is as shown in figure 6. Technologyofthedetectedcardisdisplayedalongwithits uid.

Figure 6: Cardactivation

Card activation is followed by choice entry by user for mode selection. The output after running accessory authenticationinAES CBCmodeisshowninfigure7.Both readerandtaghaveauthenticatedtoeachother.Sampletext waswrittenintotagandreadsuccessfullywithoutanyerror.

Figure 4: Flowchartofaccessoryauthentication

AES three pass mutual authentication is a procedure which uses key of length 128 bits [12]. In the first pass of algorithm,NFCreaderencryptsitsdata(RndX)withagreed secretkey(K)andsendstheciphertoNFCtag.Inreturn,tag respondsbysendingthedeciphereddata.Insecondpass,tag encryptsitsdata(RndY)andsendstheciphergeneratedto reader.Readerdeciphersandsendstheresponseback.Third passincludeseachpartyverifyingifdatareceivedissameas whattheyhadgeneratedoriginally.Thatisreaderchecksif tag had sent RndX correctly, and tag checks if reader’s response had RndY. If any one party fails to authenticate

Figure 7: AccessoryauthenticationbyAES-CBCmode

©
Journal | Page2907
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

AES ECBmodeissimpleandfastapproach.Drawbackis thatduplicatedatainplaintextwillbereflectedinthecipher text. Hence, it is not recommended in the areas where securityisapriority.Whereas,AES CBCmodewillencrypt everyoccurrenceofsameplaintextintodifferentciphertext. ButitisslowandcomplexcomparedtoECBmode.YetCBCis stronger in terms of security and is preferred for authentication.

6. CONCLUSION

AsurveyshowsthatNFCmarketislikelytoraisefrom 18billionUSDin2020to34.9billionUSDby2025.Themain use cases are in mobile commerce and usage of wearable technology. This paper serves the need for accessory authentication by AES algorithm, to ensure that genuine partsofsamecompanyareused.Thisenhancesconsumer experience, convenience and ensures product safety. If productrequiresmoresecureformofauthentication,ECCis suggestedfrompublickeycryptographicalgorithms.Here, userapplicationjustchecksreadandwriteontothetagafter successful authentication. This feature can be enhanced according to user needs. Example in case of NFC enabled product like motorized toothbrush, authentication can be followedbytappingmobilephonetotagcandisplayURLto webpage that keeps track of oral health and brush head replacementdate.

REFERENCES

[1] M.S.Chishti,C.T.KingandA.Banerjee,“ExploringHalf Duplex Communication of NFC Read/Write Mode for Secure Multi Factor Authentication”, 2021 in IEEE Access, vol. 9, pp. 6344 6357, doi: 10.1109/ACCESS.2020.3048711.

[2] P.Escobedo,M.Bhattacharjee,F.Nikbakhtnasrabadiand R. Dahiya, “Smart Bandage With Wireless Strain and TemperatureSensorsandBatterylessNFCTag”,2021,in IEEEInternetofThingsJournal,vol.8,no.6,pp.5093 5100,15March,doi:10.1109/JIOT.2020.3048282.

[3] S. Akter, S. Chellappan, T. Chakraborty, T. A. Khan, A. RahmanandA.B.M.AlimAlIslam,“Man in the Middle Attack on Contactless Payment over NFC Communications:Design,Implementation,Experiments and Detection”, 2021, in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 3012 3023, 1 Nov Dec, doi: 10.1109/TDSC.2020.3030213.

[4] A.Lazaro,M.Boada,R.VillarinoandD.Girbau,“Studyon the Reading of Energy Harvested Implanted NFC Tags UsingMobile Phones”, 2020in IEEE Access, vol. 8, pp. 2200 2221,doi:10.1109/ACCESS.2019.2962570.

[5] C. Shuran and Y. Xiaoling, “A New Public Transport PaymentMethodBasedonNFCandQRCode”,2020IEEE

5th International Conference on Intelligent Transportation Engineering (ICITE), pp. 240 244, doi: 10.1109/ICITE50838.2020.9231356.

[6] V.OliinykandO.Rubel,“ImprovingSafetyandEaseof UseinAutomaticElectricVehicleRentalSystems”,2020 IEEE15thInternationalConferenceonAdvancedTrends inRadioelectronics,TelecommunicationsandComputer Engineering (TCSET), pp. 800 803, doi: 10.1109/TCSET49122.2020.235545.

[7] A. Albattah, Y. Alghofaili and S. Elkhediri, “NFC Technology: Assessment Effective of Security towards ProtectingNFCDevices&Services”,2020International ConferenceonComputingandInformationTechnology (ICCIT 1441), 2020, pp. 1 5, doi: 10.1109/ICCIT 144147971.2020.9213758.

[8] M.M.Singh,K.A.A.K.AdzmanandR.Hassan,“NearField Communication (NFC) Technology Security Vulnerabilities and Countermeasures”,2018, InternationalJournalofEngineering&Technology,vol.7, no.4.31,pp.298 305.

[9] Kishore Kumar Reddy N. G. and Rajeshwari K., “InteractiveclothesbasedonIOTusingNFCandMobile Application”, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), 2017,pp.1 4,doi:10.1109/CCWC.2017.7868339

[10] KorakT,“Evaluationofasecurity enabledNFCTagwith AESandECDSA”,2011,Master’sthesis,Institute

forappliedInformationProcessingandCommunications (IAIK),Austria.

[11] NFCReaderLibrary: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/nfc/707/1/UM10802_NXP NFC Reader Library v3.010 API.pdf

[12] Mutualauthenticationprocedure: https://community.nxp.com/pwmxy87654/attachme nts/pwmxy87654/tech days/179/1/AMF SMC T3036.pdf

BIOGRAPHIES

Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

Sukrutha C Basappa, is a MTech student at Department of Computer Science and Engineering, R V College ofEngineering,Bengaluru,Karnataka, India.(sukruthacb.scn20@rvce.edu.in)

Page2908

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p ISSN: 2395 0072

Dr. Nagaraja G S, is working as Professor and Associate Dean (PG CSE) at Department of Computer Science and Engineering, R V College ofEngineering,Bengaluru,Karnataka, India (nagarajags@rvce.edu.in)

2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal

©
Page2909
|

Turn static files into dynamic content formats.

Create a flipbook