JOURNAL ARTICLE

A mobile trusted computing architecture for a near field communication ecosystem

Abstract

Near Field Communication (NFC) is a wireless communication technology to transfer data over distances of up to 10 cm. With this technology, a mobile device is capable of emulating smartcards for access, payment or loyalty. The benefits of a mobile device with NFC over an ordinary smartcard are the interaction and network capabilities of such a device. Thus there is the possibility to distributed smartcard applications through a data link to a mobile device, instead of issuing physical cards. The goal of this paper is to present a platform to securely manage smartcard applications in such NFC devices. Issuing of application in NFC devices is different in several stages compared to ordinary smartcards. With regard to security, there are different processes to be protected and new attack scenarios. In this paper functional aspects of such an architecture and the rolls of the instances participating are discussed. Although NFC allows a smooth interaction for the consumer, the infrastructure behind the scene is complex and requires the cooperation on different levels to ensure interoperability and of a thriving contactless scheme to be deployed. According to the concept, three different prototypes have been implemented to remotely manage the smartcard applications.

Keywords:
Smart card Near field communication Computer science Java Card Mobile device Computer security Architecture Wireless Smart card application protocol data unit Contactless smart card Computer network Interoperability Thriving Embedded system Operating system Telecommunications Java Ultra high frequency

Metrics

25
Cited By
3.18
FWCI (Field Weighted Citation Impact)
10
Refs
0.93
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.