Please use this identifier to cite or link to this item:
http://studentrepo.iium.edu.my/handle/123456789/5532
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tabet, Nour Elhouda | en_US |
dc.date.accessioned | 2020-08-20T11:46:21Z | - |
dc.date.available | 2020-08-20T11:46:21Z | - |
dc.date.issued | 2013 | - |
dc.identifier.uri | http://studentrepo.iium.edu.my/jspui/handle/123456789/5532 | - |
dc.description.abstract | Near Field Communication (NFC) is a recent technology that has been rapidly implemented in different areas in the market. NFC is a wireless communication technology that enables fast and low cost transaction to be conducted. This technology is based on RFID technology which has been in the market for over a decade. However, NFC comes to serve the areas where RFID failed to do so; areas that requires short range and a quick transaction. NFC has been already implemented in various fields including payment systems, access control systems, monitoring systems, ticketing systems, and many more. However, NFC technology is very recent in comparison to the other wireless technologies. This fact highlights the importance of carrying further studies that investigates the readiness of NFC technology as a service enabler, specifically in low risk tolerance systems such as payment systems. Google wallet is one of the first movers toward implementing NFC into a payment system called Google wallet. Yet, attackers could not resist the temptation of breaking such a new technology. Relay attack was introduced as one of the main threats that have been exploited by attackers. This research studies the security threats and gaps in NFCbased systems, and examines the feasibility of several countermeasures such as setting a time constraint, applying Distance-bounding protocol, and the possibility of procedural improvement. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Kuala Lumpur: International Islamic University Malaysia , 2013 | en_US |
dc.rights | Copyright International Islamic University Malaysia | |
dc.subject.lcsh | Near field communication | en_US |
dc.subject.lcsh | Wireless communication systems | en_US |
dc.subject.lcsh | Mobile communication systems | en_US |
dc.title | Security in NFC-Based application : analysis of its threats and countermeasure | en_US |
dc.type | Master Thesis | en_US |
dc.identifier.url | https://lib.iium.edu.my/mom/services/mom/document/getFile/lbhWRmBFKbe39ZDznahFiC4IRj1GtcUI20140624170224660 | - |
dc.description.identity | t00011295581NourElhouda | en_US |
dc.description.identifier | Thesis : Security in NFC-Based application : analysis of its threats and countermeasure /by Nour Elhouda Tabet | en_US |
dc.description.kulliyah | Kulliyyah of Information and Communication Technology | en_US |
dc.description.programme | Master of Information Technology | en_US |
dc.description.degreelevel | Master | en_US |
dc.description.callnumber | t TK6570N43T113S 2013 | en_US |
dc.description.notes | Thesis (MIT)--International Islamic University Malaysia, 2013 | en_US |
dc.description.physicaldescription | xii, 68 leaves : ill. ; 30cm | en_US |
item.openairetype | Master Thesis | - |
item.grantfulltext | open | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | KICT Thesis |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
t00011295581NourElhouda_SEC_24.pdf | 24 pages file | 255.72 kB | Adobe PDF | View/Open |
t00011295581NourElhouda_SEC.pdf Restricted Access | Full text secured file | 1.64 MB | Adobe PDF | View/Open Request a copy |
Page view(s)
10
checked on May 18, 2021
Download(s)
6
checked on May 18, 2021
Google ScholarTM
Check
Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.