Digital data on computer screen. Green numbers and letters. Digital background. Data security. Cyber
Enhancing NFC Security with Blockchain: The NOANE Protocol
Discover how the NOANE Protocol utilizes the decentralized and tamper-proof nature of the blockchain to enhance the security of NFC technology.

NFC technology has rapidly become a ubiquitous presence in our daily lives, enabling contactless payments, access control, and supply chain tracking, among other applications. However, while NFC offers numerous benefits, it also comes with certain vulnerabilities that can compromise the security of the transmitted data. One approach to enhancing the security of NFC chips is the NOANE Protocol, which leverages the blockchain to provide a decentralized method of key storage. By enabling physical assets to be linked to their digital counterparts through the use of NFTs, the NOANE Protocol represents an exciting new approach to enhancing the security of NFC chips, and is just one example of the myriad applications of blockchain technology for radio frequency technologies.

Digital security
Digital Security
What is NFC

NFC technology is a specialized subset of RFID (Radio Frequency Identification) technology designed to operate within short ranges, typically a few centimeters. Like all RFID technology, NFC uses radio waves to communicate between devices wirelessly, without the need for physical contact. 

NFC technology operates at a frequency of 13.56 MHz and has a maximum data transfer rate of 424 kbps. An important distinction of NFC technology is that it is designed to be bidirectional, which means that it can both read and write data to other NFC-enabled devices. This makes it well-suited for applications such as mobile payments and data transfer.

Old cell phones
Old cell phones
History of NFC

NFC technology was first patented in the 1980s by Sony, and was originally intended for use in contactless payment systems. However, it wasn’t until the early 2000s that NFC technology began to gain traction in the consumer electronics market. In 2004 the NFC forum was formed through a partnership between Nokia, Sony and Philips. 

The first commercial NFC-enabled device was the Nokia 6131, which was released in 2006. At the time, there were few other NFC devices on the market, which limited its usefulness. In 2010 Samsung and Google partnered to release the Nexus S, the first Android with NFC support. At this time NFC technology began to gain wider adoption with the launch of many pilot projects.

Current Use Cases for NFC

NFC has a wide range of use cases, making it a versatile technology that can be applied to various industries and applications. One of the most common use cases for NFC today is contactless payment, where NFC-enabled devices such as smartphones or smartwatches can be used to make payments at contactless payment terminals. This has made payment processing faster and more convenient for consumers, allowing them to pay for goods and services with just a tap of their device.

Woman paying the bill through mobile phone using NFC technology.
Woman paying the bill through mobile phone using NFC technology.

Another use case for NFC is access control, where NFC-enabled devices can be used to grant access to secure areas, facilities or events. By simply tapping their device to a reader, users can unlock doors, gates, and turnstiles or show proof of ticket purchase. This technology is commonly used in offices, universities, and events, where it can provide a secure and efficient way of controlling access.

Supply chain tracking is another use case for NFC, providing businesses with greater efficiency, transparency, and security. By attaching NFC tags to products or raw materials, businesses can track their movement throughout the supply chain and gain real-time updates on inventory levels, verify the authenticity and origin, and monitor quality at various stages.

Connected logistics and supply chain.
Connected logistics and supply chain.

NFC technology  is rapidly becoming more prevalent thanks to its ease of use and convenience. Today, most modern smartphones come equipped with NFC, and it is estimated that there are over 2 billion NFC-enabled devices in use worldwide. NFC has a wide range of potential applications in various industries, including retail, transportation, supply chain, healthcare, and smart homes.

Vulnerabilities of NFC

While NFC offers many benefits, it’s important to note that it also comes with some vulnerabilities. Some of the biggest threats include data interception, relay attacks and data modification. In all three instances an attacker intercepts communication between two NFC-enabled devices by placing their own device in close proximity during transmission. This allows the attacker to access and/or manipulate the transmitted data.

NFC tags are also vulnerable to emulation or spoofing, where an attacker creates a fake NFC tag that mimics a legitimate one.  This can be done by using specialized hardware and software tools to clone the legitimate tag or by creating a new tag that responds to the same commands. A cloned or emulated NFC tag can be used to trick a user into interacting with the fake tag, allowing the attacker to steal sensitive information or carry out unauthorized transactions. In instances where an NFC tag is used for authentication, an emulated tag could pass off a counterfeit as legitimate. 

Hacker with a device for obtaining an access code
Hacker with a device for obtaining an access code
NFC Encryption

To keep NFC communication secure, there are measures that can be taken to enhance its security. One of these measures is encryption, which is a way of protecting information so that only authorized people can access it. NFC chips use encryption to make sure that the information being transferred between devices is secure and can only be accessed by authorized parties.

There are different types of encryption methods used in NFC, but the most common one is called Advanced Encryption Standard (AES). With this method, a key is used to encrypt and decrypt the data. When two NFC-enabled devices communicate, they both need to have access to this key. In most cases, the key is stored in a secure central database that verifies the authenticity of the device and provides the key for decryption.

Centralized Key Storage

There are several downsides to needing a database to store encryption keys. One of the main concerns is the potential for a security breach, where an attacker could gain unauthorized access to the database and obtain the encryption keys. This could compromise the security of the encrypted data, as the attacker would have the means to decrypt it.

Datacenter
Datacenter

Another downside is that a database can be a single point of failure. If the database goes down, it can prevent users from accessing the encrypted data, causing disruption to business operations or user experience.

Maintaining a database to store encryption keys can also be complex and costly, requiring regular maintenance, backups, and security measures to ensure the integrity and availability of the database.

Lastly, storing encryption keys in a database can potentially violate data privacy, especially in cases where the encrypted data contains sensitive personal information. 

NFC and Blockchain

The NOANE Protocol is an innovative key exchange method that connects an NFC chip to a Non Fungible Token (NFT), enabling the keys to be stored in a decentralized manner on the blockchain. This approach significantly enhances the security of the NFC chips, making it virtually impossible for attackers to spoof or replicate them.

NFT
NFT

By using the blockchain to store the keys, the NOANE Protocol provides a tamper-proof and decentralized method of key storage, making it more secure than traditional database storage methods. This approach also allows for the creation of true physical NFTs, enabling physical assets to be linked to their digital counterparts in a secure and transparent way.

Overall, the NOANE Protocol represents an exciting new approach to enhancing the security of NFC chips, and has the potential to transform the way physical assets are linked to their digital counterparts through the use of NFTs.

In Conclusion

The NOANE Protocol’s use of blockchain technology to enhance the security of NFC chips through Physical NFTs is just one example of the many potential applications of blockchain for radio frequency technologies. As the use of radio frequency technologies becomes increasingly prevalent in our daily lives, the need for secure and efficient methods of communication and data storage will only grow. By leveraging the decentralized and tamper-proof nature of the blockchain, we can create innovative solutions that enhance the security and functionality of these technologies. The combination of blockchain and radio frequency technologies has immense potential, and NFC is just the tip of the iceberg in terms of what is possible.

Signup now

Stay plugged in with news that will keep you LITx!

Lith Labs™, $LITx, LITH Fam NFT & Shoplith™ news by signing up for our newsletter today.