A Challenging Solution for Man-in-Middle Security Issues through Near Field Communication (NFC)
Meenaketan Sarangi1, Debabrata Singh2, Mitrabinda Khuntia3

1Meenaketan Sarangi, Department of CSE, ITER, SOA Deemed to be University, BBSR, Odisha, India.
2Debabrata Singh, Department of CSIT, ITER, SOA Deemed to be University, BBSR, Odisha, India.
3Mitrabinda Khuntia, Department of CSE, ITER, SOA Deemed to be University, BBSR, Odisha, India.

Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 492-498 | Volume-8 Issue-4, April 2019 | Retrieval Number: D6459048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: NFC (Near Field Communication) integration with mobile devices does provide a huge space where it opens gateway for easy transactions, of money and data. Thus, NFC can be used by banks, and applications that regulate under initiating some action or to keep a record of something. NFC provides easy update facility of any kind of regular log application. This property will also give a consumer or a user an ease to access and keep a track on everyday update and have correct check on their record consumption or payment trail. Use of NFC gives the best ease in communication that can be used to keep an up to date record. NFC provides the ease of communication and easy transactions which leads our interest to the vast area where we need to discuss its challenges, like man-in-middle issue, relay attack and eavesdropping. This paper primarily focuses on how to solve the attacks like man-in-middle security and then put some light on how to create the whole system of NFC module to be utilized for a complex system. The use of NFC provides one of the smallest, shortest and the best cost efficient communication that can help to transfer data, update data, and various other tasks. Though being one of the shortest communication modules where the distance between two operating devices is the shortest, yet it does give space to vital challenges.
Keywords: NFC, Radio Frequency, Single Wire Protocol, UICC, Attacks & Authentication.

Scope of the Article: Frequency Selective Surface