Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review
Abstract
:1. Introduction
2. Methodology
- Keyword 1: “NFC” && “Risks”.
- Keyword 2: “NFC devices” && “Security”.
- Keyword 3: “NFC” && “Privacy”.
- Keyword 4: “NFC” && “Technology”.
- Another metric we considered was the use of literature written in English, and we obtained these results after the first extraction. Due to the use of English criteria, the study materials used were reduced from 6348 to 5563.
- The 5563 studies were double-checked to avoid repeated use of study materials.
3. NFC Technology, Risks, and Mitigation Solutions
3.1. NFC Technology
3.2. NFC Transactions
3.3. Key Players and Stakeholders Involved in NFC Transactions
4. NFC Cyber Risks
4.1. Cyber Risks Associated with NFC Transactions
4.1.1. Security Risks
- Data breaches can happen in various forms, which can be grouped into data tampering, data interception/eavesdropping, and relay attacks [83,84]. Data tampering is a method used by criminally minded persons to manipulate data transmitted in an NFC transaction process with the aim of modifying data details to redirect funds from owners’ bank accounts to their own accounts [85]. Data tampering can occur using data corruption methods, which allows data communication processes to be flooded with corrupt information in a bid to breach the financial data transmitted over an NFC platform [66,86]. Data tampering can happen by data modification or insertion [87]. Data modification is a process that allows the attacker can alter and modify actual data into incorrect data during a data transmission process over an NFC network [17]. Additionally, the data insertion process involves a process where the attacker includes invalid data as part of the original data during a data transmission process over an NFC platform [88].
- Data interception and eavesdropping, a rather different yet similar security risk term, is explained as a method employed by criminally minded persons to tap into information, listen and see all financial communication transmitted between devices over NFC transaction platforms, to have unauthorized access to users’ financial information [89,90]. Other cyber threats have similar approaches and goals, such as relay attacks, which are similar to data interception threats [91,92]. The relay attack, which is a man-in-the-middle type attack, not only involves listening to data communication between devices but also involves the interception of data communication signals in an NFC transaction process to mislead others into believing that the main device owner initiated the transaction [92,93,94]. This type of data breach is carried out to gain unauthorized access to the user’s financial information to commit financial crimes [95].
- Unauthorized access allows persons with no right to financial information to gain unpermitted access to users’ financial data through the NFC transaction process. This can include any access to restricted devices or users’ mobile devices with the intent of initiating a transaction or committing financial crimes over NFC platforms [96,97]. However, the unauthorized access security issues are relevant to several other NFC cyber issues, as many other attacks start with unauthorized access.
- Identity theft is a process employed by cybercriminals to steal an individual’s payment-sensitive information, including, but not limited to, credit card information such as card expiration numbers, transaction codes, user access pins, and more [98]. Identity theft could occur due to the theft or loss of a user’s device into the hands of criminally minded persons, who take advantage of the device to make purchases or payments for transactions [99].
4.1.2. Privacy Risk
4.1.3. Fraud Risk
4.2. Payment Devices in NFC Transactions
4.3. Risk-Mitigating Strategies
4.3.1. Encryption and Authentication Techniques
4.3.2. Fraud Detection and Prevention Solutions
4.3.3. Regulatory Compliance and Standards
4.4. Cybersecurity Solutions by World-Renowned Cybersecurity Companies
5. Discussion
5.1. Challenges and Opportunities in NFC Transactions Security
5.2. Recommendations to Stakeholders
5.3. Study Limitations
5.4. Contributions to Knowledge
5.5. Future Studies
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Min, H.; Galle, W.P. Electronic commerce usage in business-to-business purchasing. Int. J. Oper. Prod. Manag. 1999, 19, 909–921. [Google Scholar] [CrossRef]
- Grewal, R.; Lilien, G.L.; Bharadwaj, S.; Jindal, P.; Kayande, U.; Lusch, R.F.; Mantrala, M.; Palmatier, R.W.; Rindfleisch, A.; Scheer, L.K. Business-to-business buying: Challenges and opportunities. Cust. Needs Solut. 2015, 2, 193–208. [Google Scholar] [CrossRef]
- Malherbe, M.; Simon, F. Near-field communication (NFC) technology emergence: One or several technological paths? J. Innov. Econ. Manag. 2021, I91-35. Available online: https://shs.cairn.info/revue-journal-of-innovation-economics-2021-2-page-151?lang=fr&ref=doi (accessed on 5 November 2024). [CrossRef]
- Lacmanović, I.; Radulović, B.; Lacmanović, D. Contactless payment systems based on RFID technology. In Proceedings of the 33rd International Convention MIPRO, Opatija, Croatia, 24–28 May 2010. [Google Scholar]
- Kulkarni, R. Near field communication (NFC) technology and its application. In Techno-Societal 2020: Proceedings of the 3rd International Conference on Advanced Technologies for Societal Applications—Volume 1; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Chandrasekar, P.; Dutta, A. Recent developments in near field communication: A study. Wirel. Pers. Commun. 2021, 116, 2913–2932. [Google Scholar] [CrossRef]
- Pasquet, M.; Reynaud, J.; Rosenberger, C. “Payment with mobile nfc phones” how to analyze the security problems. In Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, Irvine, CA, USA, 19–23 May 2008. [Google Scholar]
- Gupta, B.B.; Narayan, S. A survey on contactless smart cards and payment system: Technologies, policies, attacks and countermeasures. J. Glob. Inf. Manag. (JGIM) 2020, 28, 135–159. [Google Scholar] [CrossRef]
- Vidakis, K.; Mavrogiorgou, A.; Kiourtis, A.; Kyriazis, D. A comparative study of short-range wireless communication technologies for health information exchange. In Proceedings of the 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Istanbul, Turkey, 12–13 June 2020. [Google Scholar]
- Ali, A.H.; Abouhogail, R.A.; Tarrad, I.F.; Youssef, M.I. Assessment and comparison of commonly used wireless technologies from mobile payment systems perspective. Int. J. Softw. Eng. Its Appl. 2014, 8, 255–266. [Google Scholar]
- Hamzah, M.L.; Desnelita, Y.; Purwati, A.A.; Rusilawati, E.; Kasman, R.; Rizal, F. A review of Near Field Communication technology in several areas. Rev. Espac. 2019, 40. Available online: https://www.researchgate.net/publication/336774868_A_review_of_Near_Field_Communication_technology_in_several_areas (accessed on 5 November 2024).
- Pulipati, M.; Phani, S. Comparison of various short range wireless communication technologies with nfc. Inter. J. Sci. Res 2013, 2, 87–91. [Google Scholar]
- Luo, J.-N.; Yang, M.-H. EMV-compatible offline mobile payment protocol with mutual authentication. Sensors 2019, 19, 4611. [Google Scholar] [CrossRef]
- Kairo, J. Future of paying? Exploring the possibilities of contactless payment with Ultra-Wideband technology. Comput. Sci. 2024. Available online: https://www.utupub.fi/bitstream/handle/10024/178615/kairo_joona_thesis.pdf?sequence=-1&isAllowed=y (accessed on 5 November 2024).
- Orman, I.; Teker, D.; Teker, S. Evolution of digital payment systems and a breakthrough. J. Econ. Manag. Trade 2022, 28, 100–108. [Google Scholar]
- Alrawad, M.; Lutfi, A.; Almaiah, M.A.; Elshaer, I.A. Examining the influence of trust and perceived risk on customers intention to use NFC mobile payment system. J. Open Innov. Technol. Mark. Complex. 2023, 9, 100070. [Google Scholar] [CrossRef]
- Almaiah, M.A.; Al-Rahmi, A.; Alturise, F.; Hassan, L.; Lutfi, A.; Alrawad, M.; Alkhalaf, S.; Al-Rahmi, W.M.; Al-sharaieh, S.; Aldhyani, T.H. Investigating the effect of perceived security, perceived trust, and information quality on mobile payment usage through near-field communication (NFC) in Saudi Arabia. Electronics 2022, 11, 3926. [Google Scholar] [CrossRef]
- Clarisa, D.; Marlena, D. Design of secure NFC e-payment with ambient conditions-based solutions and Chaskey algorithm. In Proceedings of the 2021 6th International Workshop on Big Data and Information Security (IWBIS), Depok, Indonesia, 23–25 October 2021. [Google Scholar]
- Madlmayr, G.; Langer, J.; Kantner, C.; Scharinger, J. NFC Devices: Security and Privacy. In Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain, 4–7 March 2008. [Google Scholar]
- Bojjagani, S.; Sastry, V.N.; Chen, C.-M.; Kumari, S.; Khan, M.K. Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Humaniz. Comput. 2023, 14, 609–654. [Google Scholar] [CrossRef]
- Shobha, N.S.S.; Aruna, K.S.P.; Bhagyashree, M.D.P.; Sarita, K.S.J. NFC and NFC payments: A review. In Proceedings of the 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Indore, India, 18–19 November 2016. [Google Scholar]
- Mandal, S.; Shill, P.C. Ensuring Security and Efficiency in Digital Payments using Blockchain with NFC. In Proceedings of the 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS), Chickballapur, India, 18–19 April 2024. [Google Scholar]
- Saunders, M. Research Methods for Business Students; Person Education Limited: London, UK, 2009. [Google Scholar]
- Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Int. J. Surg. 2010, 8, 336–341. [Google Scholar] [CrossRef]
- BasuMallick, C. What Is NFC (Near Field Communication)? Definition, Working, and Examples. 2022. Available online: https://www.spiceworks.com/tech/networking/articles/what-is-near-field-communication/ (accessed on 5 August 2024).
- Linn, H.; Nutting, R. CompTIA PenTest+ Certification All-In-One Exam Guide, (Exam PT0-002); McGraw-Hill Education: New York, NY, USA, 2022. [Google Scholar]
- Want, R. Near field communication. IEEE Pervasive Comput. 2011, 10, 4–7. [Google Scholar] [CrossRef]
- Beal, V. Near Field Communication (NFC). 2024. Available online: https://www.techopedia.com/definition/27583/near-field-communication-nfc (accessed on 18 September 2024).
- Chen, X.; Choi, K.; Chae, K. A secure and efficient key authentication using bilinear pairing for NFC mobile payment service. Wirel. Pers. Commun. 2017, 97, 1–17. [Google Scholar] [CrossRef]
- Lathiya, P.; Wang, J. Near-field communications (NFC) for wireless power transfer (WPT): An overview. In Wireless Power Transfer—Recent Development, Applications and New Perspectives; IntechOpen: London, UK, 2021; pp. 95–122. [Google Scholar]
- Goitre, A. Bringing NFC Wireless Charging to Consumer Devices; MA Business: London, UK, 2020. [Google Scholar] [CrossRef]
- Kavitha, T. Internet of Everything: Smart Sensing Technologies; Nova Science Publishers: Hauppauge, NY, USA, 2022. [Google Scholar]
- Singh, N.K. Near-Field Communication (NFC): An Alternative to RFID in Libraries; Information Technology and Libraries, 2020; Volume 39. [Google Scholar]
- Cho, J.H.; Kim, J.; Kim, J.W.; Lee, K.; Ahn, K.D.; Kim, S. An NFC transceiver with RF-powered RFID transponder mode. In Proceedings of the 2007 IEEE Asian Solid-State Circuits Conference, Jeju City, Republic of Korea, 12–14 November 2007. [Google Scholar]
- Albattah, A.; Alghofaili, Y.; Elkhediri, S. NFC Technology: Assessment Effective of Security towards Protecting NFC Devices & Services. In Proceedings of the 2020 International Conference on Computing and Information Technology (ICCIT-1441), Tabuk, Saudi Arabia, 9–10 September 2020. [Google Scholar]
- Bojjagani, S.; Sastry, V.N. A secure end-to-end proximity NFC-based mobile payment protocol. Comput. Stand. Interfaces 2019, 66, 103348. [Google Scholar] [CrossRef]
- Motola, C. NFC Payment Guide: What Are NFC Mobile Payments & NFC Readers. Available online: https://www.merchantmaverick.com/what-is-nfc/ (accessed on 12 March 2024).
- Giese, D.; Liu, K.; Sun, M.; Syed, T.; Zhang, L. Security analysis of near-field communication (NFC) payments. arXiv 2019, arXiv:1904.10623. [Google Scholar]
- Ghosh, S.; Majumder, A.; Goswami, J.; Kumar, A.; Mohanty, S.P.; Bhattacharyya, B.K. Swing-pay: One card meets all user payment and identity needs: A digital card module using NFC and biometric authentication for peer-to-peer payment. IEEE Consum. Electron. Mag. 2016, 6, 82–93. [Google Scholar] [CrossRef]
- Marriott, H.R.; Williams, M.D. Exploring consumers perceived risk and trust for mobile shopping: A theoretical framework and empirical study. J. Retail. Consum. Serv. 2018, 42, 133–146. [Google Scholar] [CrossRef]
- Raina, V.K. NFC Payment Systems and the New Era of Transaction Processing; IGI Global: Hershey, PA, USA, 2017. [Google Scholar]
- Treece, D. What Are NFC Mobile Payments? This Contactless Payment Option Can Boost Customer Convenience and Facilitate Seamless Transactions. 2024. Available online: https://www.businessnewsdaily.com/16250-nfc-mobile-payments.html (accessed on 18 September 2024).
- Dai, D.; An, Z.; Pan, Q.; Yang, L. MagCode: NFC-Enabled Barcodes for NFC-Disabled Smartphones. In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, Madrid Spain, 2–6 October 2023; Association for Computing Machinery: Madrid, Spain, 2023; p. 22. [Google Scholar]
- Shin, S.; Lee, W.-J. Factors affecting user acceptance for NFC mobile wallets in the US and Korea. Innov. Manag. Rev. 2021, 18, 417–433. [Google Scholar] [CrossRef]
- Al-Amri, R.; Maarop, N.; Jamaludin, R.; Samy, G.; Magalingam, P.; Hassan, N.H.; Ten, D.W.H.; Daud, S.M. Correlation analysis between factors influencing the usage intention of NFC mobile wallet payment. J. Fundam. Appl. Sci. 2018, 10, 215–228. [Google Scholar]
- McGrath, S.K.; Whitty, S.J. Stakeholder defined. Int. J. Manag. Proj. Bus. 2017, 10, 721–748. [Google Scholar] [CrossRef]
- Michael, C. Stakeholders Outline Impact of Contactless Payment Across Sectors. 2023. Available online: https://businessday.ng/technology/article/stakeholders-outline-impact-of-contactless-payment-across-sectors/ (accessed on 18 September 2024).
- Benyó, B. Business process analysis of NFC-based Services. In Proceedings of the 2009 IEEE International Conference on Computational Cybernetics (ICCC), Palma de Mallorca, Spain, 26–29 January 2009. [Google Scholar]
- Liébana-Cabanillas, F.; Molinillo, S.; Ruiz-Montañez, M. To use or not to use, that is the question: Analysis of the determining factors for using NFC mobile payment systems in public transportation. Technol. Forecast. Soc. Chang. 2019, 139, 266–276. [Google Scholar] [CrossRef]
- Li, H.; Liu, Y.; Heikkilä, J. Understanding the factors driving NFC-enabled mobile payment adoption: An empirical investigation. In Proceedings of the PACIS 2014 Proceedings, Chengdu, China, 24–28 June 2014. [Google Scholar]
- CBN. Guidelines to Banks for Contactless Payments in Nigeria; Management, P.S., Ed.; Central Bank of Nigeria: Lagos, Nigeria, 2023.
- Smets, J.; Ergeerts, G.; Beyers, R.; Schrooyen, F.; Ceulemans, M.; Wante, L.; Renckens, K. An NFC-based customer loyalty system. In Proceedings of the First International Conference on Mobile Services, Resources, and User, Barcelona, Spain, 23–29 October 2011. [Google Scholar]
- Gerpott, T.J.; Meinert, P. Who signs up for NFC mobile payment services? Mobile network operator subscribers in Germany. Electron. Commer. Res. Appl. 2017, 23, 1–13. [Google Scholar] [CrossRef]
- Reimers, J.; Honekamp, W. Risk Analysis of NFC Payment Systems. In Mobility in a Globalised World 2019; University of Bamberg Press: Bamberg, Germany, 2020. [Google Scholar]
- Ali, A.H.; Abouhogail, R.A.; Tarrad, I.F.; Youssef, M.I. A new design of Mobile Payment system based on NFC Technology. Int. J. Eng. Technol. IJET-IJENS 2017, 17, 7–18. [Google Scholar]
- Cremer, F.; Sheehan, B.; Fortmann, M.; Kia, A.N.; Mullins, M.; Murphy, F.; Materne, S. Cyber risk and cybersecurity: A systematic review of data availability. Geneva Pap. Risk Insur.-Issues Pract. 2022, 47, 698–736. [Google Scholar] [CrossRef]
- Vishwakarma, P.P.; Tripathy, A.K.; Vemuru, S. An empiric path towards fraud detection and protection for NFC-enabled mobile payment system. Telkomnika 2019, 17. [Google Scholar] [CrossRef]
- Markets, R.a. Near Field Communication Enabled Handsets Global Strategic Business Report 2024–2030. 2024. Available online: https://finance.yahoo.com/news/near-field-communication-enabled-handsets-095100067.html (accessed on 9 September 2024).
- Sasu, D.D. Payment Methods in Nigeria-Statistics & Facts. 2023. Available online: https://www.statista.com/topics/7133/payment-methods-in-nigeria/#topicOverview (accessed on 18 February 2024).
- Ye, H.; Lee, C.-J.; Wu, T.-Y.; Yang, X.-D.; Chen, B.-Y.; Liang, R.-H. Body-Centric NFC: Body-Centric Interaction with NFC Devices Through Near-Field Enabled Clothing. In Proceedings of the 2022 ACM Designing Interactive Systems Conference, Virtual Event, Australia, Virtual, 13–17 June 2022; pp. 1626–1639. [Google Scholar]
- Juen, Y.W.; Balachandran, D. Predicting the diffusion of NFC-enabled smartphone payment in Malaysia. Int. J. Model. Oper. Manag. 2021, 8, 266–298. [Google Scholar] [CrossRef]
- Ramos de Luna, I.; Montoro-Ríos, F.; Liébana-Cabanillas, F.J. New Perspectives on Payment Systems: Near Field Communication (NFC) Payments Through Mobile Phones. In Mobile Commerce: Concepts, Methodologies, Tools, and Applications; Management Association, I.R., Ed.; IGI Global: Hershey, PA, USA, 2018; pp. 1487–1507. [Google Scholar] [CrossRef]
- Anggoro, O.; Dzulfikar, M.; Purwandari, B.; Mishbah, M. Secure Smartphone-Based NFC Payment to Prevent Man-in-the-Middle Attack. In Proceedings of the 2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), Jakarta, Indonesia, 24–25 October 2019. [Google Scholar]
- Li, P.; Fang, H.; Liu, X.; Yang, B. A countermeasure against relay attack in NFC payment. In Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, Cambridge, UK, 22–23 March 2017; p. 96. [Google Scholar]
- Yuvarani, R.; Mahaveerakannan, R. Payment Security Expert: Analyzing Smart Cards and Contactless Payments with Cryptographic Techniques. In Proceedings of the 2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS), Virtual, 10–12 July 2024. [Google Scholar]
- Shariati, S.M.; Abouzarjomehri, A.; Ahmadzadegan, M.H. Investigating NFC technology from the perspective of security, analysis of attacks and existing risk. In Proceedings of the 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, Iran, 5–6 November 2015. [Google Scholar]
- Lakshmanan, D.; Nagoor Meeran, A.R. NFC Logging Mechanism—Forensic Analysis of NFC Artefacts on Android Devices. In Artificial Intelligence and Evolutionary Computations in Engineering Systems; Springer: Singapore, 2017. [Google Scholar]
- Arabo, A.; Pranggono, B. Mobile Malware and Smart Device Security: Trends, Challenges and Solutions. In Proceedings of the 2013 19th International Conference on Control Systems and Computer Science, Bucharest, Romania, 29–31 May 2013. [Google Scholar]
- Kortvedt, H.; Mjolsnes, S. Eavesdropping near field communication. In Proceedings of the Norwegian Information Security Conference (NISK), Bergen, Norway, 25–27 November 2024. [Google Scholar]
- Guers, K.; Chowdhury, M.M.; Rifat, N. Card Skimming: A Cybercrime by Hackers. In Proceedings of the 2022 IEEE International Conference on Electro Information Technology (eIT), Mankato, MI, USA, 19–21 May 2022. [Google Scholar]
- Roland, M.; Langer, J. Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on {EMV} Contactless. In Proceedings of the 7th USENIX Workshop on Offensive Technologies (WOOT 13), Washington, DC, USA, 13 August 2013. [Google Scholar]
- Chabbi, S.; Madhoun, N.E.; Khamer, L. Security of NFC Banking Transactions: Overview on Attacks and Solutions. In Proceedings of the 2022 6th Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 24–26 October 2022. [Google Scholar]
- Zhao, H.; Anong, S.T.; Zhang, L. Understanding the impact of financial incentives on NFC mobile payment adoption. Int. J. Bank Mark. 2019, 37, 1296–1312. [Google Scholar] [CrossRef]
- Korhonen, N.-P. NFC Payment & Security Threats. 2017. Available online: https://www.theseus.fi/handle/10024/125290?show=full (accessed on 5 November 2024).
- Dudin, M.N.; Zasko, V.N.; Frolova, E.E.; Pavlova, N.G.; Rusakova, E.P. Mitigation of cyber risks in the field of electronic payments: Organizational and legal measures. J. Adv. Res. Law Econ. 2018, 9, 78–88. [Google Scholar] [CrossRef]
- Świecka, B.; Terefenko, P.; Wiśniewski, T.; Xiao, J. Consumer financial knowledge and cashless payment behavior for sustainable development in poland. Sustainability 2021, 13, 6401. [Google Scholar] [CrossRef]
- Verkijika, S.F.; Neneh, B.N. Standing up for or against: A text-mining study on the recommendation of mobile payment apps. J. Retail. Consum. Serv. 2021, 63, 102743. [Google Scholar] [CrossRef]
- Asanprakit, S.; Kraiwanit, T. Causal factors influencing the use of social commerce platforms. J. Open Innov. Technol. Mark. Complex. 2023, 9, 100172. [Google Scholar] [CrossRef]
- Anusha, R. Qualitative assessment on effectiveness of security approaches towards safeguarding NFC devices & services. Int. J. Electr. Comput. Eng. (IJECE) 2018, 8, 1214–1221. [Google Scholar]
- Al-Haj, A.; Al-Tameemi, M.A. Providing security for NFC-based payment systems using a management authentication server. In Proceedings of the 2018 4th International Conference on Information Management (ICIM), Oxford, UK, 25–27 May 2018. [Google Scholar]
- Kajol, K.; Singh, R.; Paul, J. Adoption of digital financial transactions: A review of literature and future research agenda. Technol. Forecast. Soc. Chang. 2022, 184, 121991. [Google Scholar] [CrossRef]
- Liébana-Cabanillas, F.; Sánchez-Fernández, J.; Muñoz-Leiva, F. Antecedents of the adoption of the new mobile payment systems: The moderating effect of age. Comput. Hum. Behav. 2014, 35, 464–478. [Google Scholar] [CrossRef]
- Molitor, D.; Raghupathi, W.; Saharia, A.; Raghupathi, V. Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics. Information 2023, 14, 600. [Google Scholar] [CrossRef]
- Singh, M.M.; Adzman, K.; Hassan, R. Near Field Communication (NFC) technology security vulnerabilities and countermeasures. Int. J. Eng. Technol. 2018, 7, 298–305. [Google Scholar] [CrossRef]
- No, P. Users’ Perception of NFC Technology in Digital Payment Transactions in Indonesia. Available online: https://ijefm.co.in/v6i5/15.php (accessed on 5 November 2024).
- Trautman, L.J.; Ormerod, P.C. Corporate directors’ and officers’ cybersecurity standard of care: The Yahoo data breach. Am. UL Rev. 2016, 66, 1231. [Google Scholar]
- Banerjee, D. Data Tampering: A Comprehensive Guide. 2023. Available online: https://www.kosli.com/blog/data-tampering-a-comprehensive-guide/#:~:text=Data%20tampering%20is%20the%20deliberate,or%20any%20digital%20storage%20device (accessed on 19 September 2024).
- Haselsteiner, E.; Breitfuß, K. Security in near field communication (NFC). In Proceedings of the Workshop on RFID Security, Seoul, Republic of Korea, 6 July 2006. [Google Scholar]
- Chattha, N.A. NFC—Vulnerabilities and defense. In Proceedings of the 2014 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, Pakistan, 12–13 June 2014. [Google Scholar]
- Ayereby, M.P.-M. Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems; Walden University: Minneapolis, MN, USA, 2018. [Google Scholar]
- Wang, Y.; Zou, J.; Zhang, K. Deep-Learning-Aided RF Fingerprinting for NFC Relay Attack Detection. Electronics 2023, 12, 559. [Google Scholar] [CrossRef]
- Imran, M.I.I.; Putrada, A.G.; Abdurohman, M. Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain. In Proceedings of the 2019 Fourth International Conference on Informatics and Computing (ICIC), Semarang, Indonesia, 16–17 October 2019. [Google Scholar]
- TapTrack. NFC Relay Attacks. 2016. Available online: https://taptrack.com/nfc-relay-attacks/ (accessed on 2 August 2024).
- Akter, S.; Chellappan, S.; Chakraborty, T.; Khan, T.A.; Rahman, A.; Al Islam, A.A. Man-in-the-middle attack on contactless payment over NFC communications: Design, implementation, experiments and detection. IEEE Trans. Dependable Secur. Comput. 2020, 18, 3012–3023. [Google Scholar] [CrossRef]
- Rahmad, N.N.; Zullzaidi, N.S.M.; Azmi, N.D.F.; Khairudin, N.M. Mobile Payment Security: A Critical Analysis of Vulnerabilities & Emerging Threats. Authorea Preprints, 2024. Available online: https://www.researchgate.net/publication/377716256_Mobile_Payment_Security_A_Critical_Analysis_of_Vulnerabilities_Emerging_Threats (accessed on 2 August 2024).
- Bojjagani, S.; Rao, P.V.V.; Vemula, D.R.; Reddy, B.R.; Lakshmi, T.J. A secure IoT-based micro-payment protocol for wearable devices. Peer-to-Peer Netw. Appl. 2022, 15, 1163–1188. [Google Scholar] [CrossRef]
- Faccia, A. National payment switches and the power of cognitive computing against fintech fraud. Big Data Cogn. Comput. 2023, 7, 76. [Google Scholar] [CrossRef]
- Opderbeck, D.W. Cybersecurity and Data Breach Harms: Theory and Reality. Md. L. Rev. 2022, 82, 1001. [Google Scholar] [CrossRef]
- Saeed, D.; Iqbal, R.; Sherazi, H.H.R.; Khan, U.G. Evaluating Near-Field Communication tag security for identity theft prevention. Internet Technol. Lett. 2019, 2, e123. [Google Scholar] [CrossRef]
- Sahi, A.M.; Khalid, H.; Abbas, A.F.; Zedan, K.; Khatib, S.F.A.; Al Amosh, H. The Research Trend of Security and Privacy in Digital Payment. Informatics 2022, 9, 32. [Google Scholar] [CrossRef]
- Kang, J.; Park, J.H.; Suk, S. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC. Symmetry 2015, 7, 935–948. [Google Scholar] [CrossRef]
- Tang, B.; Baoguo, Y.; Fushun, N.; Peijun, H. Review of Near-Field Microwave Microscopy Technology. In Proceedings of the 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), Chengdu, China, 23–26 April 2021. [Google Scholar]
- Rajan, M.A. The future of wallets: A look at the privacy implications of mobile payments. CommLaw Conspec. 2011, 20, 445. [Google Scholar]
- Hutagalung, G.A.; Dalimunte, Y.A.; Khairina, I.; Lubis, M.a.Z.; Firmansyah, D.; Sinaga, D.N.; Simanjuntak, I.S.; Indandi, Z. Attendance Data Collection Using NFC Tags. Int. J. Res. Vocat. Stud. (IJRVOCAS) 2024, 3, 67–72. [Google Scholar] [CrossRef]
- Ok, K.; Coskun, V.; Aydin, M.N.; Ozdenizci, B. Current benefits and future directions of NFC services. In Proceedings of the 2010 International Conference on Education and Management Technology, Cairo, Egypt, 2–4 November 2010. [Google Scholar]
- Saraubon, K.; Chinakul, P.; Chanpen, R. Asset management system using NFC and IoT technologies. In Proceedings of the 2019 3rd International Conference on Software and e-Business, Tokyo, Japan, 9–11 December 2019. [Google Scholar]
- Edwan, E.; Shaheen, F.; Shaheen, A.; Sarsour, A. Automated NFC-Based System for Management and Tracking of Assets in Sharing Economy. In Proceedings of the 2019 International Conference on Promising Electronic Technologies (ICPET), Gaza City, Palestine, 23–24 October 2019. [Google Scholar]
- Kumar, M. Disadvantages of NFC Business Cards. 2024. Available online: https://www.hihello.com/blog/disadvantages-of-nfc-business-cards (accessed on 10 August 2024).
- Nelson, D.; Qiao, M.; Carpenter, A. Security of the near field communication protocol: An overview. J. Comput. Sci. Coll. 2013, 29, 94–104. [Google Scholar]
- Kumar, S. CYBER CRIME: A Review. Int. J. Adv. Sci. Innov. 2023, 5. Available online: https://www.academia.edu/114986516/CYBER_CRIME_A_Review (accessed on 5 November 2024).
- Moore, T.; Clayton, R.; Anderson, R. The economics of online crime. J. Econ. Perspect. 2009, 23, 3–20. [Google Scholar] [CrossRef]
- Francis, L.; Hancke, G.; Mayes, K.; Markantonakis, K. Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. In Proceedings of the 2009 International Conference for Internet Technology and Secured Transactions,(ICITST), London, UK, 9–12 November 2009. [Google Scholar]
- Akinyokun, N.; Teague, V. Security and Privacy Implications of NFC-enabled Contactless Payment Systems. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017; p. 47. [Google Scholar]
- Hartoneva, M. Contactless Payments with Inherence: Strong Customer Authentication And biometrics. 2020. Available online: https://www.theseus.fi/handle/10024/346627 (accessed on 2 August 2024).
- Wazid, M.; Das, A.K.; Khan, M.K.; Al-Ghaiheb, A.A.D.; Kumar, N.; Vasilakos, A.V. Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. IEEE Internet Things J. 2017, 4, 1634–1646. [Google Scholar] [CrossRef]
- Khalil, G.; Doss, R.; Chowdhury, M. A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems. J. Sens. Actuator Netw. 2019, 8, 37. [Google Scholar] [CrossRef]
- Best, M. Practices; CAE Associates: Middlebury, CT, USA, 2012. [Google Scholar]
- Levitin, A.J. Private Disordering-Payment Card Fraud Liability Rules. Brooklyn J. Corp. Financ. Commer. Law 2010, 5, 1. [Google Scholar]
- Mann, R.J. Payment Systems and Other Financial Transactions: Cases, Materials, and Problems; Aspen Publishing: Waltham, MA, USA, 2023. [Google Scholar]
- Guo, Y.; Bao, Y.; Stuart, B.J.; Le-Nguyen, K. To sell or not to sell: Exploring sellers’ trust and risk of chargeback fraud in cross-border electronic commerce. Inf. Syst. J. 2018, 28, 359–383. [Google Scholar] [CrossRef]
- Scanio, S.; Glasgow, J.W. Payment card fraud, data breaches, and emerging payment technologies. Fidel. Law J. 2015, 21, 1–36. [Google Scholar]
- Ehabe, E. Attacks on Near Field Communication Devices. 2023. Available online: https://repository.stcloudstate.edu/cgi/viewcontent.cgi?article=1197&context=msia_etds (accessed on 5 November 2024).
- Beck, S.; Raavi, M.; Dale, C.; Weishalla, K.; Worrell, B. Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies. In Proceedings of the 2024 IEEE International Conference on Electro Information Technology (eIT), Eau Claire, WI, USA, 30 May–1 June 2024. [Google Scholar]
- CBNA. What Are Phishing and Skimming? Find Out Before Using Your Card. Available online: https://cbna.com/blog/financial-wellbeing/what-are-phishing-and-skimming (accessed on 19 October 2024).
- Guarascio, M.; Zuppelli, M.; Cassavia, N.; Caviglione, L.; Manco, G. Revealing MageCart-like Threats in Favicons via Artificial Intelligence. In Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August 2022; p. 45. [Google Scholar]
- Rus, C.; Sarmah, D.K.; El-Hajj, M. Defeating MageCart Attacks in a NAISS Way. In Proceedings of the 20th International Conference on Security and Cryptography, Rome, Italy, 10–12 July 2023. [Google Scholar]
- Akamai. What Is Magecart? Protecting Your Business from Online Credit Card Skimming. 2024. Available online: https://www.akamai.com/glossary/what-is-magecart (accessed on 20 August 2024).
- Pietro, R.D.; Oligeri, G.; Salleras, X.; Signorini, M. N-Guard: A Solution to Secure Access to NFC tags. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June 2018. [Google Scholar]
- Raso, E.; Bianco, G.M.; Bracciale, L.; Marrocco, G.; Occhiuzzi, C.; Loreti, P. Privacy-aware architectures for NFC and RFID sensors in healthcare applications. Sensors 2022, 22, 9692. [Google Scholar] [CrossRef]
- Usman, A.A.; Sani, S.; Shehu, B.; Abubakar, A. The Use of Contactless Payment Method to Promote Cashless in Birnin Kebbi Central Market, Kebbi State-Nigeria. Int. J. Res. Publ. Rev. 2024, 5, 918–925. [Google Scholar]
- Akana, T.; Ke, W. Contactless Payment Cards: Trends and Barriers to Consumer Adoption in the US; Working paper, DP; Federal Reserve Bank of Philadelphia, Consumer Finance Institute: Philadelphia, PA, USA, 2020; p. 20-03.
- Agrawal, S. Integrating Digital Wallets: Advancements in Contactless Payment Technologies. Int. J. Intell. Autom. Comput. 2021, 4, 1–14. [Google Scholar]
- Straits Research. Wearable Payments Market Size, Share & Trends Analysis Report By Device Type. 2024. Available online: https://straitsresearch.com/report/wearable-payments-market#:~:text=The%20global%20wearable%20payments%20market,period%20(2024%20%E2%80%93%202032) (accessed on 19 September 2024).
- rfidspecialist. Which NFC Readers Are Most Commonly Used for The development of Information Solutions with NFC Technology? 2023. Available online: https://rfidspecialist.eu/which-nfc-readers-are-most-commonly-used-for-the-development-of-information-solutions-with-nfc-technology--09-10-2023.html (accessed on 10 August 2024).
- Ahamad, S.S. A novel NFC-based secure protocol for merchant transactions. IEEE Access 2021, 10, 1905–1920. [Google Scholar] [CrossRef]
- Thammarat, C. Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol. Symmetry 2020, 12, 1649. [Google Scholar] [CrossRef]
- Sethia, D.; Gupta, D.; Saran, H.; Agrawal, R.; Gaur, A. Mutual authentication protocol for secure NFC based mobile healthcard. IADIS Int. J. Comput. Sci. Inf. Syst. 2016, 11, 195. [Google Scholar]
- de Carvalho Videira, H. The offline digital currency puzzle solved by a local blockchain. arXiv 2023, arXiv:2305.02290. [Google Scholar]
- Ibrahim, A.O.; Ismael, Y.H. EMV Electronic Payment System and its Attacks: A Review. Al-Rafidain J. Comput. Sci. Math. (RJCM) 2022, 16, 23–29. [Google Scholar]
- Chabbi, S.; Araar, C. RFID and NFC authentication protocol for securing a payment transaction. In Proceedings of the 2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS), Oum El Bouaghi, Algeria, 12–13 October 2022. [Google Scholar]
- Rayani, P.K.; Changder, S. Continuous user authentication on smartphone via behavioral biometrics: A survey. Multimed. Tools Appl. 2023, 82, 1633–1667. [Google Scholar] [CrossRef]
- Khan, H.U.; Sohail, M.; Nazir, S.; Hussain, T.; Shah, B.; Ali, F. Role of authentication factors in Fin-tech mobile transaction security. J. Big Data 2023, 10, 138. [Google Scholar] [CrossRef]
- Alshammari, M.; Nashwan, S. Fully Authentication Services Scheme for NFC Mobile Payment Systems. Intell. Autom. Soft Comput. 2022, 32, 401–428. [Google Scholar] [CrossRef]
- Nicholson, T.; Hayes, D.; Le-Khac, N.-A. Forensic Analysis of the iOS Apple Pay Mobile Payment System. In IFIP International Conference on Digital Forensics; Springer: Berlin/Heidelberg, Germany, 2023. [Google Scholar]
- Vishwakarma, P.P.; Tripathy, A.K.; Vemuru, S. Fraud detection in nfc-enabled mobile payments: A comparative analysis. In Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2020; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Yang, M.-H.; Luo, J.-N.; Vijayalakshmi, M.; Shalinie, S.M. Contactless Credit Cards Payment Fraud Protection by Ambient Authentication. Sensors 2022, 22, 1989. [Google Scholar] [CrossRef] [PubMed]
- Khalilzadeh, J.; Ozturk, A.B.; Bilgihan, A. Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Comput. Hum. Behav. 2017, 70, 460–474. [Google Scholar] [CrossRef]
- Wang, F.; Yang, N.; Shakeel, P.M.; Saravanan, V. Machine learning for mobile network payment security evaluation system. Trans. Emerg. Telecommun. Technol. 2024, 35, e4226. [Google Scholar] [CrossRef]
- Liebenau, J.; Elaluf-Calderwood, S.; Hosein, G.; Kärrberg, P. Near Field Communications: Privacy, Regulation & Business Models. 2011. Available online: https://eprints.lse.ac.uk/82485/1/Near%20Field%20Communications%20%5BNFC%5D_%20Privacy%2C%20Regulation%2C%20and%20Business%20Models%20_%20LSE%20Network%20Economy%20Forum.pdf (accessed on 5 August 2024).
- Huang, R.H.; Lam, L.; Oi, A.; Yu, T.; Wing, A.; Wang, C.M. The Development and Regulation of Mobile Payment: Chinese Experiences and Comparative Perspectives. WashU Glob. Stud. L. Rev. 2021, 20, 1. [Google Scholar]
- NFC-Forum. Industry Body Supports Emerging Regulatory Requirements for Sustainable Product Development. 2024. Available online: https://nfc-forum.org/news/2024-01-industry-body-supports-emerging-regulatory-requirements-for-sustainable-product-development/#_ftn1 (accessed on 10 August 2024).
- Sutherland, T. 5 Legal Requirements of Using Contactless Technology in Physical Retail Businesses. 2023. Available online: https://legalvision.co.uk/regulatory-compliance/contactless-technology-legal-requirements/ (accessed on 5 August 2024).
- PCI. PCI Contactless Payments on COTS (CPoC™) Standard Provides Security and Test Requirements for Solutions that Enable Contactless Payment Acceptance on Merchant Mobile Devices Using NFC. 2019. Available online: https://www.pcisecuritystandards.org/about_us/press_releases/pci-security-standards-council-publishes-new-standard-for-contactless-payments/ (accessed on 8 August 2024).
- Symantec. Symantec Endpoint Protection Mobile. 2019. Available online: https://docs.broadcom.com/doc/endpoint-protection-mobile-en (accessed on 24 October 2024).
- McAfee. McAfee Complete Data Protection. 2019. Available online: https://partners.trellix.com/enterprise/en-us/assets/data-sheets/ds-complete-data-protection.pdf (accessed on 24 October 2024).
- Povolny, S. The Tradeoff Between Convenience and Security—A Balance for Consumers & Manufacturers. 2020. Available online: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-tradeoff-between-convenience-and-security-a-balancing-act-for-consumers-and-manufacturers/ (accessed on 24 October 2024).
- Mullick, A.; Senguptta, S. Machine Learning-Based Analysis of IoT Healthcare Data—A Review of Contemporary Research. In Proceedings of the 2024 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, India, 2–3 February 2024. [Google Scholar]
- Kaspersky. What Is Mobile Security? Benefits, Threats, and Best Practices. 2024. Available online: https://www.kaspersky.com/resource-center/definitions/what-is-mobile-security (accessed on 24 October 2024).
- Kaspersky. Tap-to-Pay, Insert-to-Rob: Cybercriminals Can Now Block Contactless Payments. 2023. Available online: https://www.kaspersky.com/about/press-releases/tap-to-pay-insert-to-rob-cybercriminals-can-now-block-contactless-payments (accessed on 23 October 2024).
- Kaspersky. Using a Token and Smart Card with Authentication Agent. 2023. Available online: https://support.kaspersky.co.uk/kes-for-windows/11.7.0/133615 (accessed on 23 October 2024).
- Cisco. Cisco Secure Is the Industry’s Most Complete Open Platform, Securing Your Organization’s Resilience Across Multiple Domains. 2024. Available online: https://www.cisco.com/c/en/us/buy/enterprise-agreement/security.html (accessed on 23 October 2024).
- IBM. Let’s Make Trust the Financial World’s Universal Currency. 2024. Available online: https://www.ibm.com/blockchain/industries/financial-services (accessed on 23 October 2024).
- IBM. IBM Safer Payments: Protect All Cashless Payments from Fraud. 2024. Available online: https://www.ibm.com/products/safer-payments (accessed on 23 October 2024).
- Foresiet. Advanced Android Malware Targets NFC Data for ATM Cashouts. 2024. Available online: https://foresiet.com/blog/advanced-android-malware-targets-nfc-data-for-atm-cashouts (accessed on 24 October 2024).
- NVD. CVE-2024-0568 Detail. 2024. Available online: https://nvd.nist.gov/vuln/detail/CVE-2024-0568 (accessed on 5 November 2024).
- NVD. CVE-2019-9295 Detail. 2019. Available online: https://nvd.nist.gov/vuln/detail/CVE-2019-9295 (accessed on 5 November 2024).
- NVD. CVE-2020-0022 Detail. 2020. Available online: https://nvd.nist.gov/vuln/detail/CVE-2020-0022 (accessed on 5 November 2024).
- NVD. CVE-2023-46765 Detail. 2023. Available online: https://nvd.nist.gov/vuln/detail/CVE-2023-46765 (accessed on 5 November 2024).
- NVD. CVE-2019-13943 Detail. 2019. Available online: https://nvd.nist.gov/vuln/detail/CVE-2019-13943 (accessed on 5 November 2024).
- NVD. CVE-2023-35671 Detail. 2023. Available online: https://nvd.nist.gov/vuln/detail/CVE-2023-35671 (accessed on 5 November 2024).
- Schoon, B. Android Loophole Allows Google Wallet to Leak Credit Card Details via NFC, Fix Coming. Available online: https://9to5google.com/2023/09/13/android-nfc-credit-card-detail-loophole/ (accessed on 5 November 2024).
- NVD. CVE-2024-38381 Detail. 2024. Available online: https://nvd.nist.gov/vuln/detail/CVE-2024-38381 (accessed on 5 November 2024).
- Hunt, R. PKI and digital certification infrastructure. In Proceedings of the Ninth IEEE International Conference on Networks, ICON 2001, Bangkok, Thailand, 10–11 October 2001. [Google Scholar]
- NVD. CVE-2019-2114 Detail. 2019. Available online: https://nvd.nist.gov/vuln/detail/CVE-2019-2114 (accessed on 5 November 2024).
- NVD. CVE-2024-24313 Detail. 2024. Available online: https://nvd.nist.gov/vuln/detail/CVE-2024-24313 (accessed on 5 November 2024).
- Khan, A.; Glinkin, I. Unveiling Vulnerabilities in Cybersecurity: A Penetration Test Journey. 2024. Available online: https://www2.deloitte.com/xe/en/pages/about-deloitte/articles/sustainable-strategies/unveiling-vulnerabilities-in-cybersecurity.html (accessed on 6 November 2024).
Sources | Focus | Major Contribution | Shortcomings |
---|---|---|---|
[20] | Mobile payment security | Examining the NFC vulnerabilities and suggesting some mitigation techniques | Lacks a comprehensive exploration of advanced methods like biometric authentication or detailed practical applications of multi-layered defense strategies. It does not provide in-depth analysis of NFC-specific cyber risks/attacks, such as skimming, cloning, and malware attacks |
[19] | NFC device security and privacy | Identified early risks like eavesdropping and interception | No in-depth analysis of advanced fraud detection methods. Limited focus on evolving attacks such as relay attacks |
[21] | NFC technology and payment processes | Reviewed technological frameworks for NFC payments | Lacks a deep dive into specific mitigation strategies beyond authentication and encryption |
[8] | NFC security policies and countermeasures | Detailed exploration of contactless smart card systems and attacks | Did not explore more advanced techniques like biometrics and the related vulnerabilities |
[16] | Trust and security perception in NFC mobile payments | Analyzed trust and perceived risks influencing NFC payment adoption | Lacked technical exploration of specific security measures against attacks. It also lacks coverage of advanced security mitigations such as AI and blockchain solutions |
[22] | Blockchain in NFC payments | Explored blockchain’s role in improving NFC payment security and efficiency | Did not deeply analyze user-centered threats like phishing or skimming |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Onumadu, P.; Abroshan, H. Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review. Sensors 2024, 24, 7423. https://doi.org/10.3390/s24237423
Onumadu P, Abroshan H. Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review. Sensors. 2024; 24(23):7423. https://doi.org/10.3390/s24237423
Chicago/Turabian StyleOnumadu, Princewill, and Hossein Abroshan. 2024. "Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review" Sensors 24, no. 23: 7423. https://doi.org/10.3390/s24237423
APA StyleOnumadu, P., & Abroshan, H. (2024). Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review. Sensors, 24(23), 7423. https://doi.org/10.3390/s24237423