Abstract

Near field communication (NFC) is a technology that facilitates communication between NFC-enabled devices by utilizing low power and radiating signals around a close proximity. The interaction is always binary, between the initiator that emits signals within a range of 4 cm and the target which enters the field of the initiator to begin the interaction. The communication may be one way (passive) or two way (active). The data shared in the session is neither encrypted not authenticated. These two factors aid in potential communication and data transfer. However, this becomes downside to this upcoming technology, when the data provided by the initiator may be subjected to data spoofing or data corruption. When the target processes such data, it could leads to unintended behaviour thereby compromising the integrity of the device. When a forensic investigator is handed a compromised device and asked to recreate the alleged crime, he relies on the presence of nonvolatile data on the device. In the Android operating system, there is no mechanism to provide the nonvolatile artefacts ensuing an NFC interaction. Therefore, any digital crime on Android devices abetted by NFC remains unsolved and the case gets deferred. The main aim of this research is to develop a logging mechanism for Android devices that will log all the interactions taking place through the NFC hardware, and the presence of these nonvolatile logs along with other volatile artefacts would benefit the forensic investigator to comprehend the exact sequence of activities that jeopardized the conventional operation of the android device.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.