Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy

The rapid growth of Near Field Communication (NFC) technology has facilitated its widespread adoption in everyday activities, particularly in cashless mobile payments and access control among urban dwellers. However, this convenience is accompanied by significant security risks, including data spoof...

Full description

Bibliographic Details
Main Authors: Megat Khalid, Puteri Shariza, Mohd Sani, Nor Fazlida
Format: Article
Language:English
Published: Little Lion Scientific 2024
Online Access:http://psasir.upm.edu.my/id/eprint/118812/
http://psasir.upm.edu.my/id/eprint/118812/1/118812.pdf
_version_ 1848867794814238720
author Megat Khalid, Puteri Shariza
Mohd Sani, Nor Fazlida
author_facet Megat Khalid, Puteri Shariza
Mohd Sani, Nor Fazlida
author_sort Megat Khalid, Puteri Shariza
building UPM Institutional Repository
collection Online Access
description The rapid growth of Near Field Communication (NFC) technology has facilitated its widespread adoption in everyday activities, particularly in cashless mobile payments and access control among urban dwellers. However, this convenience is accompanied by significant security risks, including data spoofing, relay attacks, and unauthorized data access. Despite advancements in NFC technology, a critical gap persists in securing communications, particularly at the end-user level, where awareness and preventive measures are insufficient. This research aims to address those gaps by focusing on end-user vulnerabilities and providing tailored solutions through the development of an NFC End-User specific security policy. The study's primary contribution lies in the development of an information security policy tailored specifically for NFC End-Users. This policy serves as a comprehensive guideline aimed at enhancing the security posture of individuals who utilize NFC-enabled devices. Unlike previous studies that primarily examine technical countermeasures, this work emphasizes the human factors by assessing user awareness and NFC secure practices. By developing an NFC security policy specifically for end users, the study aims to bridge the gap between technological safeguards and NFC End User behavior.
first_indexed 2025-11-15T14:42:10Z
format Article
id upm-118812
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T14:42:10Z
publishDate 2024
publisher Little Lion Scientific
recordtype eprints
repository_type Digital Repository
spelling upm-1188122025-07-24T06:48:16Z http://psasir.upm.edu.my/id/eprint/118812/ Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy Megat Khalid, Puteri Shariza Mohd Sani, Nor Fazlida The rapid growth of Near Field Communication (NFC) technology has facilitated its widespread adoption in everyday activities, particularly in cashless mobile payments and access control among urban dwellers. However, this convenience is accompanied by significant security risks, including data spoofing, relay attacks, and unauthorized data access. Despite advancements in NFC technology, a critical gap persists in securing communications, particularly at the end-user level, where awareness and preventive measures are insufficient. This research aims to address those gaps by focusing on end-user vulnerabilities and providing tailored solutions through the development of an NFC End-User specific security policy. The study's primary contribution lies in the development of an information security policy tailored specifically for NFC End-Users. This policy serves as a comprehensive guideline aimed at enhancing the security posture of individuals who utilize NFC-enabled devices. Unlike previous studies that primarily examine technical countermeasures, this work emphasizes the human factors by assessing user awareness and NFC secure practices. By developing an NFC security policy specifically for end users, the study aims to bridge the gap between technological safeguards and NFC End User behavior. Little Lion Scientific 2024-10-31 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/118812/1/118812.pdf Megat Khalid, Puteri Shariza and Mohd Sani, Nor Fazlida (2024) Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy. Journal of Theoretical and Applied Information Technology, 102 (20). pp. 7315-7346. ISSN 1992-8645; eISSN: 1817-3195 https://www.jatit.org/volumes/Vol102No20/6Vol102No20.pdf
spellingShingle Megat Khalid, Puteri Shariza
Mohd Sani, Nor Fazlida
Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
title Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
title_full Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
title_fullStr Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
title_full_unstemmed Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
title_short Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
title_sort mitigating data spoofing risks in near field communication (nfc) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
url http://psasir.upm.edu.my/id/eprint/118812/
http://psasir.upm.edu.my/id/eprint/118812/
http://psasir.upm.edu.my/id/eprint/118812/1/118812.pdf