Abstract

Near‐Field Communication (NFC) applications are growing at a rapid pace due to their user‐friendly nature and cost effectiveness. The growth of NFC applications has caught the attention of attackers who can target NFC entities (eg, tags and readers) to gain access to any stored information. NFC is a nascent technology that offers ease of use and secure communication. However, this technology can act as a doorway for major hacks, such as skimming and other identity theft problems. This article presents a technique that can still read the erased data from an NFC tag even if the tag has been erased employing conventional techniques. Furthermore, a set of recommendations is provided for the proper erasure of NFC tags to avoid leaving any traces of the erased data.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call