期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Security Threats to Business Information Systems Using NFC Read/Write Mode
1
作者 Sergio Rios-Aguilar Marta Beltrán González-Crespo Rubén 《Computers, Materials & Continua》 SCIE EI 2021年第6期2955-2969,共15页
Radio Frequency IDentification(RFID)and related technologies such as Near Field Communication(NFC)are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange,either devic... Radio Frequency IDentification(RFID)and related technologies such as Near Field Communication(NFC)are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange,either device-to-device or tag-to-device.One of the three main operation modes of NFC,called read/write mode,makes use of the latter type of interaction.It is extensively used in business information systems that make use of NFC tags to provide the end-user with augmented information in one of several available NFC data exchange formats,such as plain text,simple URLs or enriched URLs.Using a wide variety of physical form factors,NFC-compatible tags(wireless transponders)are currently available in many locations with applications going from smart posters,contactless tokens,tap-and-go payments or transport ticketing to automated device configuration,patient identification at hospitals or inventory management within supply chains.Most of these applications handle sensitive processes or data.This paper proposes a complete security threat model for the read/write operation mode of NFC used in Next Generation Industrial IoT(Nx-IIoT)contexts.This model,based on a wellknown methodology,STRIDE,allows developers and users to identify NFC applications vulnerabilities or weaknesses,analyze potential threats,propose risk management strategies,and design mitigation mechanisms to mention only some significant examples. 展开更多
关键词 Near field communications read/write NFC SECURITY threat modelling STRIDE Nx-IIoT
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部