Security in NFC Readers Public
Security in NFC Readers Public
► Use cases
Access control system
Internet gateway
► NFC security cookbook and conclusions
Training
2
NFC AND SECURITY
3
NFC, a different kind of wireless
NFC at a glance:
Training
4
The three modes of NFC: A tap is all it takes
Training
5
NFC connected devices
Market update - some key figures
► 1.2 billion smartphones shipped in 2014 11.0B+ NFC-enabled devices shipping 2013-2018
Training
6
The Internet of Things Revolution
Ingredients for security challenges
► Distributed communications
► It is about
- sensing, collecting and sharing data;
- control, actuation, automation.
Training
7
Under the hood of NFC based devices
NFC
Connected uC
NFC tag
uC Reader
IC
Adding an NFC tag:
NFC tag ► Behaves as a tag
► No additional electronics
Training
8
Enhancing the security of an NFC-based architecture
uC Reader
IC
Adding an NFC tag:
DATA SECURITY
UNAUTHORIZED ACCESS PROTECTION
Training
9
Security need: Secure data exchange
Training
10
Security need: Protection from unauthorized access
Training
11
Security… a big word!
Training
12
SECURE DATA EXCHANGE
13
What do we want to protect?
Training
14
Information Security goals
Security goal Description Mechanism Algorithm
Public key
Asymmetric: Public/private key pair. RSA, ECC.
Private key
Training
15
Cryptographic mechanisms summary
Symmetric Asymmetric
Confidentiality
Integrity
Authentication
Training
16
Secret Key management
► How are the secret keys loaded into the NFC Reader?
Key
Training
Secure Access Modules (SAMs)
Training 18
Data protection for NFC tags
► To ensure data integrity and authenticity of the written data in the tag:
Digital signature added to data stored.
Secret key to verify digital signature stored in SAM in the NFC device.
NFC
uC Reader NFC tag
IC
Training
19
Secure data exchange summary
Training
20
PROTECTION FROM
UNAUTHORIZED ACCESS
21
NFC device access considerations
Training
22
Remote access protection
Training
23
NFC Access protection
Training
24
USE CASES
25
Access control systems
NFC Readers Credentials
Training
26
Security design in NFC access control systems
Cryptographic keys
NFC
Key Key
uC Reader
IC
Training
27.
Security design in NFC access control systems
SAM ensures protection in overall system
OK
Adding a SAM to the Reader
allows us to securely store
and protect the cryptographic
keys
NFC
uC Reader
IC
Training
28.
Internet gateway
A-
Series
IC
Training
29
Internet Gateway
Secure cloud access use case
Router
Sign
Use Case: Authentication A- digitally
Series data;
IC
Verify
DCC Insecure digitally
Cloud or NFC
uC signed data
Reader
network Host SW
IC
Router
Use Case: Secure Channel Setup
A-
Series
Secure
fad%&SH28sjdksjdf Jdef87$6sdf!s IC channel;
DCC Encrypt/
NFC Decrypt
uC
Reader
Host SW
IC
Training 30
Internet Gateway
Confidential commissioning use case
Training
31
CONCLUSION
32
NFC Security Cookbook
The use of NFC Connected Tag
- NTAGF
Active NFC device required? NO - NTAG I2C
CAN PROTECT EEPROM
CONTENT FROM UNAUTHORIZED
YES UPDATES
NFC device will be connected to the cloud? NO NFC application based on MIFARE?
YES YES
The use of A-Series HW security module The use of SAM devices CAN
CAN PROTECT ACCESS TO THE SECURE DATA EXCHANGE
DEVICE THROUGH NFC INTERFACE
Training
33
Summary and Conclusion
Training
34
Need More? NXP - NFC Reader Solutions
Reader forum:
http://www.mifare.net/en/micommunity/forum/mif
are-and-nfc-reader-ics
Training 35
MobileKnowledge
Thank you for your attention
www.themobileknowledge.com
Eric Leroux
eric.leroux@themobileknowledge.com
+34 629 54 45 52
Training
36