100% found this document useful (1 vote)
383 views24 pages

PPT

NFC allows for contactless transactions and data transfer between devices over short distances. It operates at 13.56 MHz and has a maximum transfer speed of 424 kBaud. NFC requires an initiator that generates an RF field to power a passive target. It can be used for contactless payments at point of sale terminals, exchanging contacts between phones with a tap, and accessing transportation with tickets and passes on phones. While offering secure and convenient exchanges, NFC is susceptible to eavesdropping, data modification, and man-in-the-middle attacks if not implemented correctly.

Uploaded by

Pavan Smiley
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
383 views24 pages

PPT

NFC allows for contactless transactions and data transfer between devices over short distances. It operates at 13.56 MHz and has a maximum transfer speed of 424 kBaud. NFC requires an initiator that generates an RF field to power a passive target. It can be used for contactless payments at point of sale terminals, exchanging contacts between phones with a tap, and accessing transportation with tickets and passes on phones. While offering secure and convenient exchanges, NFC is susceptible to eavesdropping, data modification, and man-in-the-middle attacks if not implemented correctly.

Uploaded by

Pavan Smiley
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24

Presented by: B.

Pavan Srinivas 08l61A0458

CONTENTS
INTRODUCTION HISTORY ARCHITECTURE TRANSACTIONS COMPARISON ADVANTAGES DISADVANTAGES APPLICATIONS CONCLUSION

INTRODUCTION
NFC technology makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices with a touch. Designed for short distance communication (up to 10 cm) Its a contactless card and a contactless reader in one chip

It operates at 13.56 MHz


Its designed for low bandwidth (max speed is 424 kBaud)

Initiator

Message Reply

Target

NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target. This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require batteries. OPERATIONAL MODES: This has two operational modes. aactive mode and passive mode

Active means the device generates an RF field Passive means the device uses the RF field generated by the other device

NFC employs two different codings to transfer data. If an active device transfers data at 106 kbit/s, a modified Miller coding with 100% modulation is used. In all other cases Manchester coding is used with a modulation ratio of 10%.
STANDARDS: NFC was approved as an ISO/IEC standard on December 8, 2003 and later as an ECMA standard. These standards specify the modulation schemes, coding, transfer speeds and frame format of the RF interface of NFC devices ISO/IEC 18092 / ECMA-340
Near Field Communication Interface and Protocol-1 (NFCIP-1) ISO/IEC 21481 / ECMA-352 Near Field Communication Interface and Protocol-2 (NFCIP-2)

HISTORY
History of NFC 1983 - The first patent to be associated with the abbreviation RFID was granted to Charles Walton. 2004 - Nokia, Philips and Sony established the Near Field Communication (NFC) Forum 2006 - Initial specifications for NFC Tags 2006 - Specification for "SmartPoster" records 2006 - Nokia 6131 was the first NFC phone 2009 - In January, NFC Forum released Peer-to-Peer standards to transfer contact, URL, initiate Bluetooth, etc. 2010 - Samsung Nexus S: First Android NFC phone shown 2011 - NFC support becomes part of the Symbian mobile operating system with the release of Symbian Anna version

NFC is not a new technology.It has been evolved from RFID or Radio frequency identification technology. NFC extended the concept of RFID. RFID is made of tiny computer chips that are linked to an antenna RFID is a bar code technology that allows for data to be transmitted from an RFID tag to compatible reader When scanned with a reader device, the antenna picks up the electromagnetic energy and sends its unique identification number and stored information to the reader device.

13,56MHz RF Link

RFID object

ARCHITECTURE
Card emulation: to make contactless transactions, including those for payment, access and ticketing. Reader mode: to access digital content via a NFC tag embedded in a poster or advert. Peer-to-peer mode: to enable electronic devices, such as two handsets, to exchange information.

TRANSACTIONS
A transaction always needs two parties, an Initiator sending the data and a Target receiving the information. Any device , a cellphone, a camera or a watch, can be equipped with an NFC initiator, which is simply an antenna that can store data . If the device is an NFC smartphone , the initiator and target(NFC reader)need to be up close for data exchange to happen.

The reader is attached to a point of sale(PoS)terminal or cash register in a retail store that accepts NFC payments. A simple wave of the phone can pay for a purchase . Alternatively, Two NFC phones can be tapped lightly to exchange business cards

COMPARISON
NFC is a technology that is distinct from other wireless technologies, not only in the technology used, but also the applications envisaged. Bluetooth: Although both Bleutooth and NFC can be used to transfer data, Bluetooth has been designed to transfer data over much greater distances. NFC is designed to be close proximity only. Wi-Fi / IEEE 802.11: Wi-Fi is designed for local area networks, and is not a short range peer to peer technology. RFID: Although RFID is very similar to NFC in many respects, RFID is a much broader technology.

NFC
Network Standard

Bluetooth
IEEE 802.15.1

IEEE 802.15.1

Standardis ISO/IEC ation Body


Range Frequency Bit Rate

Bluetooth
SIG ~10 m (class 2) 2.42.5 GHz

< 0.2 m 13.56 M Hz

424 kbit/s 2.1 Mbit/s varies with class

Power < 15mA Consumpti (read) on

ADVANTAGES
Intuitive: NFC interactions require no more than a simple touch Versatile: NFC is ideally suited to the broadest range of industries, environments, and uses Open and standards-based: The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI standards Technology-enabling: NFC facilitates fast and simple setup of wireless technologies, such as Bluetooth, Wi-Fi, etc.)

Inherently secure: NFC transmissions are short range (from a touch to a few centimeters) Interoperable: NFC works with existing contactless card technologies Security-ready: NFC has built-in capabilities to support secure applications Increased worker productivity.

NFC harmonizes todays diverse contactless technologies, enabling current and future solutions in areas such as: Access control Consumer electronics Healthcare Information collection and exchange Loyalty and coupons Payments Transport

DISADVANTAGES
Eavesdropping When two devices communicate via NFC they use RF waves to talk to each other. An attacker can use an antenna to also receive the transmitted RF signals and extract the data out of it. Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.

Data Modification The feasibility of this attack highly depends on the strength of
the amplitude modulation as decoding of the signal is different for 100% and 10% modulation. For the modified Miller encoding with 100% ASK this attack is feasible for certain bits and impossible for other bits, but for Manchester coding with 10% ASK this attack is feasible on all bits.

man-in-the-middle
This form of NFC security issue involves a two party communication being intercepted by a third party. The third party acts as a relay, but using information received and modifying it if required to enable the attacker to achieve their aims. This must obviously be achieved without the two original parties knowing that there is an interceptor between them.

APPLICATIONS
Mobile phones, PDAs, etc Personal computers Check-out cash registers or "point-of-sale" equipment Turnstiles Vending machines Parking meters ATMs Applications around the office and house, e.g. garage doors, etc Ticketing: NFC will help reduce the cost of issuing tickets and of maintaining the ticketing infrastructure as in mass transport and airline ticketing

Data Transfer: NFC can be used for making connections between electronic devicessimply touching the devices together will enable them to transfer the data like photos, videos, files.
ID security: NFC devices can be used for identification. These devices can be used at residence, hotels and offices. These cards can be provided to students for identity. Mobile Payments: NFC devices can be used to make simple and fast payment transactions via PayPal, Credit Cards etc.

NFC ENABLED HANDSETS: android Blackberry Symbian GOOGLE WALLET:

Google Wallet is a contactless payment system that uses NFC.

CONCLUSION
NFC is a cutting edge technology. Its basically a variation of other short-range wireless technologies already used throughout the world NFC is not a fashionable nice-to-have technology, but actually a technology that makes peoples' lives easier easier to pay for goods and services, easier to use public transport, and easier to share data between devices.

QUEIRIES?

You might also like