International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2905
Accessory authentication on NFC enabled product using three pass AES
algorithm
Sukrutha C Basappa
1
, Nagaraja G S
2
1
MTech student at R V College of Engineering, Bengaluru, Karnataka
2
Professor and Associate Dean (PG-CSE) at R V College of Engineering, Bengaluru, Karnataka
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Nowadays, Near Field Communication (NFC)
market is no more a monopoly. Competition is high among the
companies with regard to products they manufacture and
their features for consumer attraction. Mutual authentication
between NFC reader and tag ensures safe communication
between them. This paper proposes an accessory
authentication model that guarantees that counterparts of a
product are of same company. AES-128 bits algorithm is used
in two different modes, that is AES-ECB and AES-CBC for
mutual authentication. AES-CBC mode is stronger in terms of
security when compared to AES-ECB mode.
Key Words: AES, Brand protection, Mutual
authentication, NFC, Security.
1. INTRODUCTION
NFC technology was developed in the year 2004 by
Philips Electronics and Sony. It is a short range, wireless
technology with operating area within 10 centimeters,
operating frequency 13.56 MHz and data transmission rate
used here is of 106 kbps. The objective of the paper is to
develop an accessory authentication model for an NFC
enabled product. This ensures that replaceable part of the
product (NFC tag) and the fixed part (active NFC reader) are
paired counterparts and are of the same company. With this
end-user can get high quality product. This kind of product
positively impacts manufacturing and authenticating
companies, thereby ensuring brand protection. Some
examples are authentication in motorized tooth brush,
where brush handle has NFC reader and the brush head has
NFC tag in it. In high end blenders, the base unit will have
NFC reader and the jar/container will have NFC tag.[12] To
achieve this, firstly communication is established among the
NFC reader and the tag. Then three pass AES (Advanced
Encryption Standard) algorithm is run, before actual data
transfer happens. AES-128 is a symmetric block cipher, that
uses one shared secret key for both encryption and
decryption. Choice for mode of AES is provided. User can
choose authentication to happen either in AES-ECB
(Electronic Code Book) or in AES-CBC (Cipher Block
Chaining) mode, depending on their requirement.
2. LITERATURE SURVEY
In [1], authors have used the fact that NFC has an
operating mode called read or write. This has the property of
one directional transfer of data only. However, they have
tried to bring in a bi-directional model that is half duplex in
nature. Main advantage of this operating mode of NFC is that,
it allows different data formats and very low protocol
overhead. But one main challenge is regarding the reader
collision problem, completing transactions in a secure way,
within a time frame. Fingerprint and Kerberos are two factor
authentication used.
In [2], a smart bandage with wireless temperature and
strain sensor, with passive NFC tag is designed. An android
application called SenseAble was built, to display the body
temperature and other sensor readings. Chest expansion and
contraction of a Covid-19 patient was rightly monitored by
this smart bandage.
In [3], it proves that MITM attacks can be done during NFC
communication, when using a passive card. This method of
attack mimics real implementation of EMV protocol enabling
devices, used for payments. Paper demonstrates how a
contactless payment system can be compromised by an
attacker, by using a malicious MITM card.
In [4], study is done on reading range of implanted
sensors, based on NFC Integrated circuit (IC) by using a NFC
enabled smart phone. Challenges noted were low coupling
between loops of various sizes and limited quality imposed
by bandwidth communication. Results show that system with
three coils performs better at longer distance than 2-coil
system.
In [5], a scheme to build a new public transport payment
method with different technologies like NFC, Bluetooth, IC
card is integrated. Advantage is that, passengers can choose
the payment method that suits them, in terms of discount on
ticket fare. This solves the problem that the payment
platforms are not unified and that passengers have many
applications on their mobile, which causes inconvenience
while travelling.
In [6], a model for vehicle network operators using NFC is
proposed. Tourists generally will not use local mobile
operator’s services, as they stay for short time and the
roaming charges are also high. As a solution, the model which
allows less mobile traffic cost for tourist and has increased
transaction security is proposed. Here the user’s mobile
traffic is routed to the network of vehicle rental service