SlideShare a Scribd company logo
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 8, No. 3, December 2017, pp. 730 ~ 732
DOI: 10.11591/ijeecs.v8.i3.pp730-732 730
Received June 29, 2017; Revised August 15, 2017; Accepted September 23, 2017
NFC Secured Offline Password Storage
Senthil Kumar M*, V Mathivanan
Department of Information Technology, AMET University, Chennai
Abstract
In this paper is all about constructing a device called “One-WORD” that aims to solve this
problem. One-word is an offline password keeper aimed at saving and encrypting the passwords in a more
secure manner. The main device contains the encrypted passwords while a secure NFC smartcard and a
personal pin-code allows the decryption. Even if an attacker is able to get hold the smartcard, or the device
it is completely useless without the personal code.
Keywords: NFC, Communication, Smartcard
Copyright © 2017Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
Security in an organizational environment like a university is always a solicitude.
According to the National Association of Campus Card Users of the approximately 231 schools
they have on record 197 of them are using magstripe technology, and 62 have already moved
to some form of non contact technology [1-3]. Various methods have been engaged over the
years to meet the security needs of universities. Some of the methods of security have included
keys, badges, magstripe cards, smartcards, and currently the emerging trend is NFC [4-5]. Each
of these methods has a role in security dependent on cost versus security
2. Existing Problem
Log-In and Passwords are integral part of our daily lives. They will prevent malicious
users from doing harmful things with our personal data. People tend to use the same credentials
for the different websites they visit. However recent news has taught us that credentials stored
by websites are compromises on daily basis, which means that once an attacker gets your
credential set, he can use it on other websites. This is why using different passwords for
different websites is important. Remembering many different passwords is difficult. One option
is software based password database [6-8]. But it must be stored on your computer or
smartphone memory, which is still vulnerable and a malicious user can get access to the
database without you knowing it.
3. Proposed Method
One-word is an offline password keeper aimed at saving and encrypting the passwords
in a more secure manner. The main device contains the encrypted passwords while a secure
NFC smartcard and a personal pin-code allows the decryption. Even if an attacker is able to get
hold the smartcard, or the device it is completely useless without the personal code.
To enter the log-in credentials on the webpage, the user must first connect the device to
the PC using USB cable, enter a 4-digit pin number (only the first time) and place the smartcard
within the card slot, and should simply speak the name of the website. The device recognizes
the website name, using an android app and enters the username and password automatically
like a keyboard.
The advantages of our devices are.
1) It cannot be attacked by viruses or malicious programs
2) It is impossible to change the firmware as it is an offline device, increasing robustness of the
solution.
3) NFC smartcard approach allows multiple users to use the device each with their own pins
and smartcard
IJEECS ISSN: 2502-4752 
NFC Secured Offline Password Storage (Senthil Kumar M)
731
4) Speech recognition allows the device to be used in any computer. There is no need to
install additional software.
NFC Smartcard
The device is constructed with NFC transponder chip that enables it to read and write
the smartcard. The card holds very little details regarding the user, and thus using it gives no
security risk. NFC is a secure and universal contactless communication technology evolved
from RFID. NFC operates in the 13.56MHz radio frequency band and the communication
typically happens at 10 cm or lesser distance. Thus the communication happens only when the
card is very close proximity to the device [9-10].
Speech Recognition & Bluetooth
The device uses bluetooth to communicate with an app running on an android
smartphone. Speech recognition is done by the android app and relays the information to our
device via bluetooth. In addition to this, the app also lets the user to control and configure the
device.
Capacitive Touch GUI
A set of capacitive touch buttons and a graphics display allows the user to enter the pin
number via simple touch gestures. The device status is indicated using a set of onboard color
LED’s.
Onboard Storage & Multiuser Support
The device has an onboard Quad-SPI flash memory, which is used to store the
encrypted passwords as well as other audio files. The device can be used by more than one
user. Each user needs to have a unique smartcard and PIN number A survey on query
processing in mobile database is discussed in [11].
USB Keyboard Profile
The device is equipped with USB connectivity that implements the USB keyboard profile
according to the USB specification. This helps it to automatically type the characters in the user
name and password field of the login page.
Secure USB Mass Storage Device
The device can also be used as a mass storage peripheral, used to store text files in an
encrypted manner. To transfer the file to the PC, the user must be authenticated before any file
transfer is possible. Even if an attacker is able to capture the file, he will see only the encrypted
data and not the original data generating a digital signature based on new cryptographic
scheme for user authentication and security is explained in [12]. The authentication process
involves pin number and NFC smartcard verification.
4. Implementation of Hardware Subsystem
 ISSN: 2502-4752
IJEECS Vol. 8, No. 3, December 2017 : 730 – 732
732
5. Conclusion
NFC is mostly continue its path of being highly utilized in every fields because of its
easy to use for people. It is also very bendable when compared to identification devices of the
previous, allowing various types of identification. The result is NFC will be widely used for
identification and multiple protocols will be utilized in the future.
References
[1] Smart Card Alliance. EMV and NFC complementary technologies that deliver secure payments and
value added functionality. 2012.
[2] developer.android.com, Accessed on Sept, 2014.
[3] Erick Macias and Josh Wyatt. Texas instruments-nfc active and passive peer-to-peer communication.
2014.
[4] Gerald Madlmayr, Christan Kantner. NFC devices: Security and Privacy. Availability Reliability and
Security. 2008
[5] Maximilian Engelhardt, Florian Pfeiffer, Klaus Finkenzeller and Erwin Biebl. Extending ISO/IEC 14443
type A eavesdropping range using higher harmonics. 2013
[6] Nikolaos Alexiou, Stylianos Basagiannis and Sophia Petridou. Security analysis of NFC relay attacks
using probabilistic model checking. 2014
[7] Antonio J Jara, Alberto F Alcolea, Miguel A Zamora and Antonio FG Skarmeta. Evaluation of the
security capabilities on nfc-powered devices. 2010
[8] www.naccu.org, Accessed on Sept, 2014
[9] www.ncpc.org, Accessed on Sept, 2014
[10] Manickasankari N, Arivazhagan D & Vennila G. A survey on query processing in mobile
database. Indian Journal of Science and Technology. 2014; 7: 32.
[11] Ganeshkumar K and Arivazhagan D. Generating a digital signature based on new cryptographic
scheme for user authentication and security. Indian Journal of Science and Technology. 2014; 7(S6):
1-5.

More Related Content

PDF
2FYSH: two-factor authentication you should have for password replacement
TELKOMNIKA JOURNAL
 
PDF
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
 
PDF
Review on Vulnerabilities of IoT Security
ijtsrd
 
PDF
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
PPTX
Security in IoT
gr9293
 
PPTX
IOT privacy and Security
noornabi16
 
PDF
Intellectual Bank Locker Security System
IJERA Editor
 
2FYSH: two-factor authentication you should have for password replacement
TELKOMNIKA JOURNAL
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
 
Review on Vulnerabilities of IoT Security
ijtsrd
 
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Security in IoT
gr9293
 
IOT privacy and Security
noornabi16
 
Intellectual Bank Locker Security System
IJERA Editor
 

What's hot (20)

PDF
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
PDF
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
IJECEIAES
 
PDF
Q180203109113
IOSR Journals
 
PPT
IoT Security by Sanjay Kumar
OWASP Delhi
 
PPT
Near field communication (NFC) in android
Mindfire Solutions
 
PDF
Internet of Things IoT Security Perspective
ijtsrd
 
PDF
Security threats analysis in bluetooth enabled mobile devices
IJNSA Journal
 
PDF
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
 
PDF
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
PDF
IOT Security
Sylvain Martinez
 
PDF
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Mahmud Hossain
 
PDF
IoT based facial recognition door access control home security system using r...
International Journal of Power Electronics and Drive Systems
 
PPTX
Privacy and security in IoT
Vasco Veloso
 
PDF
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
PPTX
Iot(security)
Shreya Pohekar
 
PPTX
Hardware Authentication
Coder Tech
 
PDF
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Scientific Review SR
 
PDF
A Survey on Communication for Smartphone
Editor IJMTER
 
PDF
Le security v0.8
Ravikiran HV
 
PDF
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
IJECEIAES
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
IJECEIAES
 
Q180203109113
IOSR Journals
 
IoT Security by Sanjay Kumar
OWASP Delhi
 
Near field communication (NFC) in android
Mindfire Solutions
 
Internet of Things IoT Security Perspective
ijtsrd
 
Security threats analysis in bluetooth enabled mobile devices
IJNSA Journal
 
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
IOT Security
Sylvain Martinez
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Mahmud Hossain
 
IoT based facial recognition door access control home security system using r...
International Journal of Power Electronics and Drive Systems
 
Privacy and security in IoT
Vasco Veloso
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
Iot(security)
Shreya Pohekar
 
Hardware Authentication
Coder Tech
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Scientific Review SR
 
A Survey on Communication for Smartphone
Editor IJMTER
 
Le security v0.8
Ravikiran HV
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
IJECEIAES
 
Ad

Similar to 38 9145 it nfc secured offline password storage (edit lafi) (20)

PDF
76 s201917
IJRAT
 
PDF
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
TELKOMNIKA JOURNAL
 
PDF
A Survey on Smart Android Graphical Password
ijtsrd
 
PDF
Security Protocols for USB Mass Storage Devices
IRJET Journal
 
PPTX
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 
PPTX
vyber security on different fields bullying .pptx
SantoshChinchali1
 
PDF
Cyber security and cyber law
Divyank Jindal
 
PDF
Detection and prevention method of rooting attack on the android phones
IAEME Publication
 
PDF
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
PDF
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODSWIRELESS COMMUNICA...
samueljackson3773
 
PDF
880 st011
Chandra Rao
 
PDF
NFiD: An NFC based system for Digital Business Cards
IRJET Journal
 
PDF
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
 
PDF
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
ADEIJ Journal
 
PDF
Color based android shuffling pattern lock
IRJET Journal
 
PPTX
IoT setup and pairing
Guy Vinograd ☁
 
PDF
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
SafeNet
 
PDF
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
PDF
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
PDF
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
76 s201917
IJRAT
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
TELKOMNIKA JOURNAL
 
A Survey on Smart Android Graphical Password
ijtsrd
 
Security Protocols for USB Mass Storage Devices
IRJET Journal
 
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 
vyber security on different fields bullying .pptx
SantoshChinchali1
 
Cyber security and cyber law
Divyank Jindal
 
Detection and prevention method of rooting attack on the android phones
IAEME Publication
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODSWIRELESS COMMUNICA...
samueljackson3773
 
880 st011
Chandra Rao
 
NFiD: An NFC based system for Digital Business Cards
IRJET Journal
 
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
ADEIJ Journal
 
Color based android shuffling pattern lock
IRJET Journal
 
IoT setup and pairing
Guy Vinograd ☁
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
SafeNet
 
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
 
Ad

More from IAESIJEECS (20)

PDF
08 20314 electronic doorbell...
IAESIJEECS
 
PDF
07 20278 augmented reality...
IAESIJEECS
 
PDF
06 17443 an neuro fuzzy...
IAESIJEECS
 
PDF
05 20275 computational solution...
IAESIJEECS
 
PDF
04 20268 power loss reduction ...
IAESIJEECS
 
PDF
03 20237 arduino based gas-
IAESIJEECS
 
PDF
02 20274 improved ichi square...
IAESIJEECS
 
PDF
01 20264 diminution of real power...
IAESIJEECS
 
PDF
08 20272 academic insight on application
IAESIJEECS
 
PDF
07 20252 cloud computing survey
IAESIJEECS
 
PDF
06 20273 37746-1-ed
IAESIJEECS
 
PDF
05 20261 real power loss reduction
IAESIJEECS
 
PDF
04 20259 real power loss
IAESIJEECS
 
PDF
03 20270 true power loss reduction
IAESIJEECS
 
PDF
02 15034 neural network
IAESIJEECS
 
PDF
01 8445 speech enhancement
IAESIJEECS
 
PDF
08 17079 ijict
IAESIJEECS
 
PDF
07 20269 ijict
IAESIJEECS
 
PDF
06 10154 ijict
IAESIJEECS
 
PDF
05 20255 ijict
IAESIJEECS
 
08 20314 electronic doorbell...
IAESIJEECS
 
07 20278 augmented reality...
IAESIJEECS
 
06 17443 an neuro fuzzy...
IAESIJEECS
 
05 20275 computational solution...
IAESIJEECS
 
04 20268 power loss reduction ...
IAESIJEECS
 
03 20237 arduino based gas-
IAESIJEECS
 
02 20274 improved ichi square...
IAESIJEECS
 
01 20264 diminution of real power...
IAESIJEECS
 
08 20272 academic insight on application
IAESIJEECS
 
07 20252 cloud computing survey
IAESIJEECS
 
06 20273 37746-1-ed
IAESIJEECS
 
05 20261 real power loss reduction
IAESIJEECS
 
04 20259 real power loss
IAESIJEECS
 
03 20270 true power loss reduction
IAESIJEECS
 
02 15034 neural network
IAESIJEECS
 
01 8445 speech enhancement
IAESIJEECS
 
08 17079 ijict
IAESIJEECS
 
07 20269 ijict
IAESIJEECS
 
06 10154 ijict
IAESIJEECS
 
05 20255 ijict
IAESIJEECS
 

Recently uploaded (20)

PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PPTX
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPTX
easa module 3 funtamental electronics.pptx
tryanothert7
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Software Testing Tools - names and explanation
shruti533256
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
easa module 3 funtamental electronics.pptx
tryanothert7
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Inventory management chapter in automation and robotics.
atisht0104
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 

38 9145 it nfc secured offline password storage (edit lafi)

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, No. 3, December 2017, pp. 730 ~ 732 DOI: 10.11591/ijeecs.v8.i3.pp730-732 730 Received June 29, 2017; Revised August 15, 2017; Accepted September 23, 2017 NFC Secured Offline Password Storage Senthil Kumar M*, V Mathivanan Department of Information Technology, AMET University, Chennai Abstract In this paper is all about constructing a device called “One-WORD” that aims to solve this problem. One-word is an offline password keeper aimed at saving and encrypting the passwords in a more secure manner. The main device contains the encrypted passwords while a secure NFC smartcard and a personal pin-code allows the decryption. Even if an attacker is able to get hold the smartcard, or the device it is completely useless without the personal code. Keywords: NFC, Communication, Smartcard Copyright © 2017Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction Security in an organizational environment like a university is always a solicitude. According to the National Association of Campus Card Users of the approximately 231 schools they have on record 197 of them are using magstripe technology, and 62 have already moved to some form of non contact technology [1-3]. Various methods have been engaged over the years to meet the security needs of universities. Some of the methods of security have included keys, badges, magstripe cards, smartcards, and currently the emerging trend is NFC [4-5]. Each of these methods has a role in security dependent on cost versus security 2. Existing Problem Log-In and Passwords are integral part of our daily lives. They will prevent malicious users from doing harmful things with our personal data. People tend to use the same credentials for the different websites they visit. However recent news has taught us that credentials stored by websites are compromises on daily basis, which means that once an attacker gets your credential set, he can use it on other websites. This is why using different passwords for different websites is important. Remembering many different passwords is difficult. One option is software based password database [6-8]. But it must be stored on your computer or smartphone memory, which is still vulnerable and a malicious user can get access to the database without you knowing it. 3. Proposed Method One-word is an offline password keeper aimed at saving and encrypting the passwords in a more secure manner. The main device contains the encrypted passwords while a secure NFC smartcard and a personal pin-code allows the decryption. Even if an attacker is able to get hold the smartcard, or the device it is completely useless without the personal code. To enter the log-in credentials on the webpage, the user must first connect the device to the PC using USB cable, enter a 4-digit pin number (only the first time) and place the smartcard within the card slot, and should simply speak the name of the website. The device recognizes the website name, using an android app and enters the username and password automatically like a keyboard. The advantages of our devices are. 1) It cannot be attacked by viruses or malicious programs 2) It is impossible to change the firmware as it is an offline device, increasing robustness of the solution. 3) NFC smartcard approach allows multiple users to use the device each with their own pins and smartcard
  • 2. IJEECS ISSN: 2502-4752  NFC Secured Offline Password Storage (Senthil Kumar M) 731 4) Speech recognition allows the device to be used in any computer. There is no need to install additional software. NFC Smartcard The device is constructed with NFC transponder chip that enables it to read and write the smartcard. The card holds very little details regarding the user, and thus using it gives no security risk. NFC is a secure and universal contactless communication technology evolved from RFID. NFC operates in the 13.56MHz radio frequency band and the communication typically happens at 10 cm or lesser distance. Thus the communication happens only when the card is very close proximity to the device [9-10]. Speech Recognition & Bluetooth The device uses bluetooth to communicate with an app running on an android smartphone. Speech recognition is done by the android app and relays the information to our device via bluetooth. In addition to this, the app also lets the user to control and configure the device. Capacitive Touch GUI A set of capacitive touch buttons and a graphics display allows the user to enter the pin number via simple touch gestures. The device status is indicated using a set of onboard color LED’s. Onboard Storage & Multiuser Support The device has an onboard Quad-SPI flash memory, which is used to store the encrypted passwords as well as other audio files. The device can be used by more than one user. Each user needs to have a unique smartcard and PIN number A survey on query processing in mobile database is discussed in [11]. USB Keyboard Profile The device is equipped with USB connectivity that implements the USB keyboard profile according to the USB specification. This helps it to automatically type the characters in the user name and password field of the login page. Secure USB Mass Storage Device The device can also be used as a mass storage peripheral, used to store text files in an encrypted manner. To transfer the file to the PC, the user must be authenticated before any file transfer is possible. Even if an attacker is able to capture the file, he will see only the encrypted data and not the original data generating a digital signature based on new cryptographic scheme for user authentication and security is explained in [12]. The authentication process involves pin number and NFC smartcard verification. 4. Implementation of Hardware Subsystem
  • 3.  ISSN: 2502-4752 IJEECS Vol. 8, No. 3, December 2017 : 730 – 732 732 5. Conclusion NFC is mostly continue its path of being highly utilized in every fields because of its easy to use for people. It is also very bendable when compared to identification devices of the previous, allowing various types of identification. The result is NFC will be widely used for identification and multiple protocols will be utilized in the future. References [1] Smart Card Alliance. EMV and NFC complementary technologies that deliver secure payments and value added functionality. 2012. [2] developer.android.com, Accessed on Sept, 2014. [3] Erick Macias and Josh Wyatt. Texas instruments-nfc active and passive peer-to-peer communication. 2014. [4] Gerald Madlmayr, Christan Kantner. NFC devices: Security and Privacy. Availability Reliability and Security. 2008 [5] Maximilian Engelhardt, Florian Pfeiffer, Klaus Finkenzeller and Erwin Biebl. Extending ISO/IEC 14443 type A eavesdropping range using higher harmonics. 2013 [6] Nikolaos Alexiou, Stylianos Basagiannis and Sophia Petridou. Security analysis of NFC relay attacks using probabilistic model checking. 2014 [7] Antonio J Jara, Alberto F Alcolea, Miguel A Zamora and Antonio FG Skarmeta. Evaluation of the security capabilities on nfc-powered devices. 2010 [8] www.naccu.org, Accessed on Sept, 2014 [9] www.ncpc.org, Accessed on Sept, 2014 [10] Manickasankari N, Arivazhagan D & Vennila G. A survey on query processing in mobile database. Indian Journal of Science and Technology. 2014; 7: 32. [11] Ganeshkumar K and Arivazhagan D. Generating a digital signature based on new cryptographic scheme for user authentication and security. Indian Journal of Science and Technology. 2014; 7(S6): 1-5.