The Ultimate of Wireless Technologies: Near Field Communication (NFC)
#1


Presented By:
Ram Naresh Y,
Bhargav G

[attachment=10056]
Introduction
 Definition :
 NFC is a short range, high frequency wireless technology that allows communications to take place between devices that either touch or are momentarily held close together.
 Extension:
 The technology is a simple extension of the ISO 14443 proximity-card standard (contact less card, RFID) that combines the interface of a smartcard and a reader into a single device..
 Technology:
 The technology works via magnetic field induction and operates on an unlicensed radio frequency band.
 NFC is based on Radio Frequency Identification (RFID) technology, which is compatible with most of the contactless transportation and ticketing solutions
 NFC enables devices that are held together to share information either in one direction or both.
 Range :
 NFC operates in the 13.56 MHz frequency range and coverage range up to ~10cm.
 Compatibility
 It also compatible to the broadly established contactless smart card infrastructure based on ISO 14443 A
 For getting NFC feature we need specified NF H/W chipsets for getting contactless behavior on the devices.
 Features of NFC :
 Short contactless transmission range
 Quick data transfer between the devices.
 Provides the key to Omnipresent wireless networking of all kinds.
NFC is a powerful catalyst
 It has the potential to make almost all wireless technologies easy enough so that everyone – even the non-technical-can use them.
Primary Uses:
♦ Connect Electronic Devices
♦ Access Digital Content
♦ Make Contactless Transactions
Significance & Functioning of NFC Technology
 NFC is an important technology for a number of reasons:
 Reach and availability
 Variety of use
 Ease of use
 Security
 Value added services
 Infrastructure
The Basis of NFC
 A communication system using RFID technology consists of
 A reader/interrogator device
 one or several transponders/tags.
 Most RFID technology use induction.
 The reader antenna works as a coil providing a magnetic field, which induces a current in the antenna coil in the tag.
 The different distances the reader and the tags can communicate on are divided into three areas:
 Close coupling systems
– The range where communication is considered to be close coupled is between 0 and 1 cm.
– Close coupling is also preferred for systems with high security requirements.
 Remote coupling systems
– Remote coupling systems operate typically in the range up to 1m.
 Long range systems
– The distances in long range RFID systems are between 1 m and 10 m (significantly greater distances also exist)
 Frequency bands and regulation
– The frequency range below 135 kHz is not reserved as an ISM band.
– Electromagnetic waves transmitted on these frequencies have physical characteristics, allowing them to travel very far without severe propagation loss.
Security Threats & Solutions on NFC Usage
 Security is a critical requirement for NFC payment and ticketing
 Mobile phones tend to come equipped with passcode that can be activited by the user.
 NFC enabled mobile devices
– Incorporates a number of credit and debit cards
– Need to have a higher levels of security
– Should assure the user against misuse.
 The secure element can either be held on
– a chip within the mobile phone, or
– on the SIM card or
– a memory card device.
Eavesdropping
-When two devices communicate via NFC they use RF waves to talk to each other.
– An attacker can of course use an antenna to also receive the transmitted signals.
– Data transmitted in passive mode - harder to be eavesdropped on,
– But, using the passive mode - not sufficient for sensitive data.
Data Corruption
– Attacker can also try to modify the data transmitted via the NFC interface.
– Attacker just wants to disturb the communication
– The receiver is not able to understand data sent by the other device.
– Data corruption can be achieved by transmitting valid frequencies of the data spectrum at a correct time.
Data Corruption – NFC Counter Measures
– NFC can check the RF field, while they are transmitting data.
– If an NFC device does this, it will be able to detect the attack.
– The power for corrupting the data is bigger, than the power for detecting it by the NFC device.
– Thus, every such attack should be detectable.
Data Modification
– Attacker wants the receiving device to actually receive some valid, but manipulated data.
– Different from just data corruption.
– The feasibility of this attack highly depends on the applied strength of the amplitude modulation.
– This is because the decoding of the signal is different for 100% and 10% modulation.
Data Modification – NFC Counter Measures
– Protection can be achieved in various ways.
– By using 106k Baud in active mode – impossible for an attacker to modify all the data transmitted via the RF link.
– This means that for both directions active mode would be needed to protect against data modification.
Man–in–the–middle attack
– Two parties talking to each other, are tricked into a three party conversation by an attacker.
– Two parties must not be aware of the fact that they are not talking to each other, but that they are both sending and receiving data from Eve.
Man–in–the–middle attack – NFC Counter Measures
– It is practically impossible to do a Man-in-the-Middle-Attack on an NFC link.
– The recommendation is to use active-passive communication mode such that the RF field is continuously generated by one of the valid parties.
– The active party should listen to the RF filed while sending data to be able to detect any disturbances caused by a potential attacker.
Features of NFC Supporting Mobile OS
NFC Mobile devices
 Here are some examples of what a user can do with an NFC mobile phone in an NFC-enabled environment:
– Download music or video from a smart poster.
– Exchange business cards with another phone.
– Pay bus or train fare.
– Print an image on a printer.
– Use a point-of-sale terminal to pay for a purchase, the same way as with a standard contactless credit card.
– Pair two Bluetooth devices.
Applications of NFC
 Four Basic Categories:
– Touch and Go:
– Access control or transport/event ticketing,
– Picking up an Internet URL from a smart label on a poster.
– Touch and Confirm:
– Mobile payment - Confirmation by entering a password or just accepting the transaction.
– Touch and Connect:
– Linking two NFC-enabled devices to enable peer to peer transfer of data.
– Downloading music, exchanging images or synchronizing address books.
– Touch and Explore:
– The consumer will be able to explore a device's capabilities to find out which functionalities and services are offered.
 Using an NFC device everyone will be able to:
– Make payments with a wave or a touch
– Read information and “pick up” special offers and discounts from smart posters or smart billboards
– Store tickets to access transportation gates, parking garages or get into events
– Store personal information that will allow secure building access
– Take a picture and transfer it to an NFC-enabled printer or monitor
– Share Business cards with other NFC-enabled phones
– ….. and perform many more functions
 The uses of NFC are endless, and many exciting ideas are in development now.
Transit and Ticketing
Wireless payment via NFC Mobile phones
Advertising
– The consumer initiates the contact by bringing an NFC-enabled mobile phone to an NFC tag, effectively self qualifying for the product or service being offered.
Connectivity
Conclusion and Future Enhancement
 NFC has the potential to be a disruptive technology,
 Changing the way that lives are lived,
 Transforming everyday tasks, making things easier, more intuitive and more effective.
 Mass adoption technology
NFC can further be extended as:
1. As a NFC H/W integrator
2. Solutions for different NFC h/w for particular boards.
3. SIM based NFC for local and remote payments will be the hot issue in the near future development.
4.As a NFC service provider
5. Security Element Transaction Management.
6. Developing UI in J2ME (contactless API from JSR 257)
7. Online content sales and Event ticketing applications development for transport and medical fields.
8. M-Business solution using NFC for different level organizations
9. Security authentication solutions
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: the ultimate of wireless technologies near field communication nfc by ram naresh,
Popular Searches: wireless technologies**t, ultimate viking obstacle*, nfc report abstract, nfc of over bridge ppt, list of disadvantages of nfc, ultimate fighter, nfc ring seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  wireless charging through microwaves full report project report tiger 90 70,955 27-09-2016, 04:16 AM
Last Post: The icon
  Wireless Power Transmission via Solar Power Satellite full report project topics 32 50,420 30-03-2016, 03:27 PM
Last Post: dhanabhagya
  Seminar Report on Night Vision Technologies computer girl 2 4,765 05-07-2014, 09:17 PM
Last Post: Guest
  Global Wireless E-VOTING seminar class 10 12,845 09-04-2014, 04:52 PM
Last Post: Guest
  Led Wireless computer science crazy 11 11,791 22-03-2014, 06:01 AM
Last Post: Guest
  wireless sensor networks full report project report tiger 18 16,300 15-07-2013, 12:18 PM
Last Post: computer topic
  Low Power Wireless Sensor Network computer science crazy 4 5,744 30-04-2013, 10:04 AM
Last Post: computer topic
  A Disaster Information System by Ballooned Wireless Adhoc Network seminar surveyer 2 2,368 15-02-2013, 10:20 AM
Last Post: seminar details
  FIELD EMISSION DISPLAY FULL REPORT seminar class 2 2,304 04-02-2013, 03:14 PM
Last Post: seminar details
  satellite communication pdf report seminar presentation 11 20,576 31-01-2013, 12:06 PM
Last Post: seminar details

Forum Jump: