Open Access iconOpen Access

ARTICLE

crossmark

Security Threats to Business Information Systems Using NFC Read/Write Mode

Sergio Rios-Aguilar1,2,*, Marta Beltrán2, González-Crespo Rubén3

1 Department of Organization Engineering, Business Administration and Statistics, ETSI Informáticos, Universidad Politécnica de Madrid (UPM), Boadilla del Monte (Madrid), 28660, Spain
2 Department of Computing, ETSII, Universidad Rey Juan Carlos, Móstoles (Madrid), 28933, Spain
3 ESIT, Universidad Internacional de La Rioja (UNIR), Logroño (La Rioja), 26006, Spain

* Corresponding Author: Sergio Rios-Aguilar. Email: email

(This article belongs to the Special Issue: Current trends and Advancements for next-generation secure Industrial IoT)

Computers, Materials & Continua 2021, 67(3), 2955-2969. https://doi.org/10.32604/cmc.2021.014969

Abstract

Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either device-to-device or tag-to-device. One of the three main operation modes of NFC, called read/write mode, makes use of the latter type of interaction. It is extensively used in business information systems that make use of NFC tags to provide the end-user with augmented information in one of several available NFC data exchange formats, such as plain text, simple URLs or enriched URLs. Using a wide variety of physical form factors, NFC-compatible tags (wireless transponders) are currently available in many locations with applications going from smart posters, contactless tokens, tap-and-go payments or transport ticketing to automated device configuration, patient identification at hospitals or inventory management within supply chains. Most of these applications handle sensitive processes or data. This paper proposes a complete security threat model for the read/write operation mode of NFC used in Next Generation Industrial IoT (Nx-IIoT) contexts. This model, based on a well-known methodology, STRIDE, allows developers and users to identify NFC applications vulnerabilities or weaknesses, analyze potential threats, propose risk management strategies, and design mitigation mechanisms to mention only some significant examples.

Keywords


Cite This Article

APA Style
Rios-Aguilar, S., Beltrán, M., Rubén, G. (2021). Security threats to business information systems using NFC read/write mode. Computers, Materials & Continua, 67(3), 2955-2969. https://doi.org/10.32604/cmc.2021.014969
Vancouver Style
Rios-Aguilar S, Beltrán M, Rubén G. Security threats to business information systems using NFC read/write mode. Comput Mater Contin. 2021;67(3):2955-2969 https://doi.org/10.32604/cmc.2021.014969
IEEE Style
S. Rios-Aguilar, M. Beltrán, and G. Rubén, “Security Threats to Business Information Systems Using NFC Read/Write Mode,” Comput. Mater. Contin., vol. 67, no. 3, pp. 2955-2969, 2021. https://doi.org/10.32604/cmc.2021.014969



cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2841

    View

  • 1907

    Download

  • 0

    Like

Share Link