Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Near field communication (NFC)
1. NFC: NEAR FIELD COMMUNICATION
Bharat Kachhwaha,
Pune, 7/9/2020,
Lenze
Reviewer: Prafulla, Dipti
2. SUMMAR
Y
Part 0 History
Part 2 Services
Part 3 Security, Comparison and Uses
Prerequisite
1. Basic understanding of signal (Analog and digital)
2. Basic knowledge of Electro magnetic induction.
Q & A
Appendix: Data Format
Part 1 NFC
3. NEAR
Exchange of data between
two devices
FIELD Communication
Wireless technology
using magnetism
A short distance
Near Field Communication (NFC) is a contact-less communication technology based on a
radio frequency (RF) field using a base frequency of 13.56 MHz .
NFC technology is perfectly designed to exchange data between two devices through a
simple touch gesture.
4. 1983
• The first patent to be associated with the abbreviation RFID was granted to Charles
Walton
2004
• Nokia Phillips and Sony established Near Field Communication (NW) Forum
2010
• Samsung Nexus S first Android NFC phone, developed jointly by Google and Samsung
2011
• First mobile phone (Nokia 6131) with NFC released by NOKIA
2014
• The introduction of Apple Pay to the iPhone 6 and 6+ models.
2015
• Android Lollipop 5.0 and above introduced contactless payments, with the addition of
two-factor authentication, using NFC
History
of
NFC
5. TIMELINE,
POPULARITY &
GROWTH
260
400
600
800
1000
1200
1700
2200
0
500
1000
1500
2000
2500
2013 2014 2015 2016 2017 2018 2019 2020
in
millions
Year
Shipments of NFC-Enabled Mobile
Handsets
2013 2014 2015 2016 2017 2018 2019 2020
Since 2006, when the first
devices to support NFC were
released, the number of new
devices supporting the
technology has grown rapidly.
According to IHS Technology,
2.2 billion NFC-enabled
smartphone units will be in use
by 2020. Apple further opened
NFC possibilities in 2017 when it
began allowing NFC capabilities
beyond Apple Pay.
7. Part 1 NFC
Part 2 Services
• NFC technology
• NFC and other Contactless Protocols
• NFC Coding
• NFC Transmission Technology
• NFC Tag Types
NFC
Part 3 Security, Comparison and Uses
8. NFC Technology
The RF field generated by
an NFC Device to
communicate with an
NFC Tag has three tasks:
To transfer power
from the NFC Device
to the NFC Tag.
The NFC device is sending
information to an NFC Tag
by modulating the RF field
signal (signal modulation).
The NFC device is receiving
information from an NFC Tag
by sensing the modulation of
the load generated by the
NFC tag (load modulation).
Polling
Device
Listening
Device
9. NFC and other Contactless Protocols
NFC Devices are able to
communicate with:
• Readers and cards compliant to
the ISO/IEC 14443 Type A
standard
• Readers and cards compliant to
the ISO/IEC 14443 Type B
standard
• Cards compliant to the ISO/IEC
15693 standard
• Devices compliant to the
ISO/IEC 18092 standard
• Readers and cards compliant to
the JIS-X 6319-4 standard
• NFC Tags
• Other NFC Devices
10. NFC Coding
Appears as raw binary
bits without any coding.
Typically binary 1 maps
to logic-level high, and
binary 0 maps to logic-
level low.
Non-
Return-to-
Zero (L) A low-to-high transition
expresses a 0 bit,
whereas a high-to-low
transition stands for a 1
bit.
Manchester
Coding
Pauses occurring in the
carrier at different
positions of a period.
While a 1 is always
encoded in the same
way, coding a 0 is
determined on the basis
of the preceded bit.
Modified
Miller
Coding
NRZ-L
Mancheste
r
Modified
Miller
1 0 1 1 0 0
11. NFC-Forum
Standard
Polling /
Listening
Coding Modulation Data Rate Carrier frequency
NFC - A Polling Modified Miller ASK 100% 106 kb/s 13.56 MHz
Listening Manchester Load modulation
(ASK)
106 kb/s 13.56 MHz +- 848
kHz subcarrier
NFC – B Polling NRZ-L ASK 100% 106 kb/s 13.56 MHz
Listening NRZ-L Load modulation
(ASK)
106 kb/s 13.56 MHz +- 848
kHz subcarrier
NFC – F Polling Manchester ASK 100% 212 / 424 kb/s 13.56 MHz
Listening Manchester Load modulation
(ASK)
212 / 424 kb/s 13.56 MHz (without
subcarrier)
NFC Transmission Technologies (RF Standards )
12. Type 1 Type 2 Type 3 Type 4
ISO/IEC standard 14443 A 14443 A JIS 6319-4 14443 A / B
Compatible Product Innovision
Topaz
NXP MIFARE Sony FeliCa NXP DESFire,
SmartMXJCOP, …
Data rate 106 kb/s 106 kb/s 212, 424 kb/s 106/212/424 kb/s
Memory 96 bytes,
expandable to 2
kbyte
48 bytes, expandable to
2 kbyte
Variable, max.
1Mbyte
Variable, max. 32 kbyte
Anti-collision No Yes Yes Yes
NFC Tag Types
13. Part 1 NFC
Part 2 Services
Part 3 Comparison and Uses
• Communication mode
• Reader / Writer mode
• Peer-to-Peer mode
• Card Emulation mode
• Wireless Charging mode
Services
14. Communication mode
Active Mode
Passive Mode
Both the target device as well as the initiating device have their individual power supplies which
allows them communicate with one another by alternating signal transmission.
The initiator device generates radio signals (magnetic field) that is so strong that it powers on the
target device via the electromagnetic field.
15. Communication mode
Active Mode
Passive Mode
Both the target device as well as the initiating device have their individual power supplies which
allows them communicate with one another by alternating signal transmission.
The initiator device generates radio signals (magnetic field) that is so strong that it powers on the
target device via the electromagnetic field.
25. NFC vs. Other Technology
NFC
Zig Bee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
IrDA
IrDA is a short range (< 1 meter), line-of-
sight communication standard for
exchange of data over infrared light. IrDA
interfaces are frequently used in
computers and mobile phones.
26. NFC vs. Other Technology
NFC
ZigBee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
ZigBee wireless technology is a standard
enabling control and monitoring
capabilities for industrial and
residential applications within a +100-
meter range.
IrDA
27. NFC vs. Other Technology
NFC
Zig Bee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
Bluetooth wireless technology was
designed to replace cables between cell
phones, laptops, and other computing and
communication devices within a 10+-meter
range
IrDA
28. NFC vs. Other Technology
NFC
Zig Bee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
Wi-Fi technology was designed and
optimized for Local Area Networks (LAN); it
provides an extension or replacement of
wired networks for dozens of computing
devices within a +100-meter range.
IrDA
37. Appendix
An NDEF message is composed of one or more NDEF records.
NDEF
message
NDEF record
NDEF record
header
38. Appendix
An NDEF Record Header
1. TNF: Type Name Format (3 bits)
a) Empty
b) Well Known
c) Multi-Purpose
d) Absolute
e) External
f) Unknown
g) Unchanged
h) Reserved
2. IL: Tells whether the record contains an ID length field.
3. SR: Determines whether the record is a short record.
4. CF: When a record is chunked.
5. ME: Message Ending.
6. MB: Message Beginning.
Hinweis der Redaktion
The NFC Forum was founded in the year 2004 by NXP, Sony and Nokia to harmonize the NFC technique and to stimulate its deployment. The NFC forum develops specifications which ensure interoperability of NFC units and services.
The NFC Forum certifies NFC units compatible to its specifications from December 2010 onwards.
For Wireless Charging the primary goal of NFC Technology is to transfer power thus extending communication. In this case NFC communication is used to regulate the power transfer. When Wireless Charging mode is active the field strength of the RF field can be increased allowing a power transfer of up to 1 W.
Due to the coupling of the coils of a polling and a listening device, a passive listening device also affects the active polling device.
A variation in the impedance of the listening device causes amplitude or phase changes to the antenna voltage of the polling device, detected by the polling device. This technique is called load modulation.
Depending on the communication protocol used and the capability of the remote device, a communication speed of up to 424 Kbit/s is supported by NFC Forum Devices.
Depending on the communication protocol used and the capability of the remote device, a communication speed of up to 424 Kbit/s is supported by NFC Forum Devices.
Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies:
Amplitude-shift keying is a form of amplitude modulation that represents digital data as variations in the amplitude of a carrier wave.
Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies:
NFC operates in a frequency range centered on 13.56 MHz and offers a data transmission rate of up to 424 kbit/s within a distance of approximately 10 centimeters. In contrast to the conventional contactless technology in this frequency range (only active-passive communications), communications between NFC-capable devices can be active-active (peer-to-peer) as well as active-passive, NFC therefore represents a link to the RFID world. NFC is backwards compatible with the widely used Smart Card infrastructure based on ISO/IEC 14443 A (e. g. NXP's MIFARE technology) and ISO/IEC 14443 B as well as with the Sony FeliCa card (JIS X 6319-4). For the exchange of information between two NFC devices, a new protocol was developed which is defined in the standards ECMA-340 and ISO/IEC 18092.
Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies:
NFC-A (backward compatible to ISO/IEC 14443 A)
NFC-B (backward compatible to ISO/IEC 14443 B)
NFC-F (backward compatible to JIS X 6319-4)
Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies:
NFC-A (backward compatible to ISO/IEC 14443 A)
NFC-B (backward compatible to ISO/IEC 14443 B)
NFC-F (backward compatible to JIS X 6319-4)
Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies:
NFC-A (backward compatible to ISO/IEC 14443 A)
NFC-B (backward compatible to ISO/IEC 14443 B)
NFC-F (backward compatible to JIS X 6319-4)
Though NFC operated over shorter distance, less prone to attacks but complete security is not ensured.
Eavesdropping – receiving signals without transmitters knowledge. Radio waves used for communication would be picked up by unwanted user. Can be minimized using active-passive mode. Passive devices hard to eavesdropping. Can be prevented using secure channel.
As NFC uses radio waves to communicate, and these propagate in the vicinity of the transmitter, and not just to the wanted receiver, it is possible for unwanted users to pick up the signals. The technology to receive this signals is not difficult to create.
The only real solution to prevent eavesdropping is to use a secure channel.
Data corruption – Attacker disturbs communication. attacker does not need to be able to decipher the valid data being sent
the attacker may try to disturb the communications by sending data that may be valid, or even blocking he channel so that the legitimate data is corrupted.
Solution
By listening when data is transmitted they will be able to detect any attack of this form because the power required to successfully attack a system is significantly higher than that which can be detected by the NFC device transmitting the data.
Data modification – here attacker modifies actual payload being sent.
. This form of NFC security issue involves the attacker aiming to arrange for the receiving device to receive data that has been manipulated in some form. This data will naturally have to be in the correct format for it to be accepted.
This form of attack is possible for some bits under different coding schemes. There are a number of ways to provide protection against this form of security attack. It is impossible for an attacker to modify all the data transmitted at the 106 Baud data rate in active mode. As a result, the 106 Baud data rate, active mode would be required for data transfer in both directions. However this is the most vulnerable mode to eavesdropping.
The best option is to use a secure channel as this provides the greatest level of NFC security
NFC security - man-in-the-middle
This form of NFC security issue involves a two party communication being intercepted by a third party. The third party acts as a relay, but using information received and modifying it if required to enable the attacker to achieve their aims. This must obviously be achieved without the two original parties knowing that there is an interceptor between them.
Though NFC operated over shorter distance, less prone to attacks but complete security is not ensured.
Eavesdropping – receiving signals without transmitters knowledge. Radio waves used for communication would be picked up by unwanted user. Can be minimized using active-passive mode. Passive devices hard to eavesdropping. Can be prevented using secure channel.
As NFC uses radio waves to communicate, and these propagate in the vicinity of the transmitter, and not just to the wanted receiver, it is possible for unwanted users to pick up the signals. The technology to receive this signals is not difficult to create.
The only real solution to prevent eavesdropping is to use a secure channel.
Data corruption – Attacker disturbs communication. attacker does not need to be able to decipher the valid data being sent
the attacker may try to disturb the communications by sending data that may be valid, or even blocking he channel so that the legitimate data is corrupted.
Solution
By listening when data is transmitted they will be able to detect any attack of this form because the power required to successfully attack a system is significantly higher than that which can be detected by the NFC device transmitting the data.
Data modification – here attacker modifies actual payload being sent.
. This form of NFC security issue involves the attacker aiming to arrange for the receiving device to receive data that has been manipulated in some form. This data will naturally have to be in the correct format for it to be accepted.
This form of attack is possible for some bits under different coding schemes. There are a number of ways to provide protection against this form of security attack. It is impossible for an attacker to modify all the data transmitted at the 106 Baud data rate in active mode. As a result, the 106 Baud data rate, active mode would be required for data transfer in both directions. However this is the most vulnerable mode to eavesdropping.
The best option is to use a secure channel as this provides the greatest level of NFC security
NFC security - man-in-the-middle
This form of NFC security issue involves a two party communication being intercepted by a third party. The third party acts as a relay, but using information received and modifying it if required to enable the attacker to achieve their aims. This must obviously be achieved without the two original parties knowing that there is an interceptor between them.
Though NFC operated over shorter distance, less prone to attacks but complete security is not ensured.
Eavesdropping – receiving signals without transmitters knowledge. Radio waves used for communication would be picked up by unwanted user. Can be minimized using active-passive mode. Passive devices hard to eavesdropping. Can be prevented using secure channel.
As NFC uses radio waves to communicate, and these propagate in the vicinity of the transmitter, and not just to the wanted receiver, it is possible for unwanted users to pick up the signals. The technology to receive this signals is not difficult to create.
The only real solution to prevent eavesdropping is to use a secure channel.
Data corruption – Attacker disturbs communication. attacker does not need to be able to decipher the valid data being sent
the attacker may try to disturb the communications by sending data that may be valid, or even blocking he channel so that the legitimate data is corrupted.
Solution
By listening when data is transmitted they will be able to detect any attack of this form because the power required to successfully attack a system is significantly higher than that which can be detected by the NFC device transmitting the data.
Data modification – here attacker modifies actual payload being sent.
. This form of NFC security issue involves the attacker aiming to arrange for the receiving device to receive data that has been manipulated in some form. This data will naturally have to be in the correct format for it to be accepted.
This form of attack is possible for some bits under different coding schemes. There are a number of ways to provide protection against this form of security attack. It is impossible for an attacker to modify all the data transmitted at the 106 Baud data rate in active mode. As a result, the 106 Baud data rate, active mode would be required for data transfer in both directions. However this is the most vulnerable mode to eavesdropping.
The best option is to use a secure channel as this provides the greatest level of NFC security
NFC security - man-in-the-middle
This form of NFC security issue involves a two party communication being intercepted by a third party. The third party acts as a relay, but using information received and modifying it if required to enable the attacker to achieve their aims. This must obviously be achieved without the two original parties knowing that there is an interceptor between them.
The best approach to ensuring NFC security is to use an NFC secure channel. This will protect against eavesdropping and data modification attacks.It is possible to use standard key agreement protocols such as Diffe-hellman because of the inherent protection has against man in the middle attacks. This protocol can be sued in the standard non-authenticated version because of the inherent NFC security.
The shared key can be used to derive a symmetric key which can then be used for the NFC secure channel.
The NFC secure channel provides for confidentiality, integrity and authenticity of the data transferred between devices.
https://www.samsung.com/global/galaxy/samsung-pay/
https://support.apple.com/en-in/guide/iphone/iphbd4cf42b4/ios
https://pay.google.com/intl/en_in/about/
NFC Payment:
NFC may be most well known for mobile payments, where it powers services like Apple Pay and Google Wallet.
Instead of using the same credit card number for each transaction, mobile payment solutions leverage the power of NFC card emulation to generate a single-use transaction key that can only be used once, and expires within seconds. This technology makes it nearly impossible for bad actors to make unauthorized charges on an account.
Mobile payment
Pay with NFC phones for tickets or taxi rides
Pay with NFC phones at contactless POS (point of sales)
Store vouchers on NFC phones
store electronic keys, legitimations on NFC phones
Secure building access
Secure PC log-in
Unlock car doors
Setup your home office with a touch by your NFC phone
Product Authentication
Counterfeits have arisen as a real threat to customers seeking legitimate products, especially with fakes increasingly sold on legitimate sites like Amazon, Facebook, and Instagram. While some brands try to thwart these efforts with holograms, micro-threading and QR codes, NFC provides the most secure product authentication.
Once a legitimate product is embedded with NFC at the factory, it is given a unique digital identity that can be verified by customers (using an app like decode) before purchase.
6. Protect your brand.
7. Attendance Tracking
8. Transportation — Public and private transportation methods (such as taxis and buses) can benefit from using NFC tags that, when scanned, will direct the passenger to an application, URL, or payment method.
Data transfer between different NFC-units (peer-to-peer data exchange) like NFCsmart phones, digital cameras, notebooks, etc.
Exchange electronic business cards
Print out photos by holding the camera close to printer
In Wireless Charging mode, small IoT devices such as a Bluetooth headset, fitness tracker or smartwatch can be charged with the contact-less transfer of up to1 W of power.
https://nfc-forum.org/resources/what-are-the-operating-modes-of-nfc-devices/
Tap-to-Pair (Wireless Pairing)
Bluetooth
Speakers
Phones
Watches : Apple Watch and few android watch
Wifi
Phones
‘Unlock’ another service (such as opening another communication link for data transfer) – Setting up Bluetooth, WLAN links
Tourism — Tourist locations, such as museums, can benefit from using NFC tags to easily store and deliver information regarding historical events, descriptions of statues/sculptures/artwork, etc.
Restaurants and Accommodation — Restaurants and other customer service oriented businesses can benefit from using NFC tags to quickly and easily deliver data such as menus, promotions, Wi-Fi passwords, and other information.
Customer Support — NFC tags are often used as a way of tracking asset information—such as serial numbers, purchase information, lifespan, etc.—to allow for streamlined customer service and support.
Medicine and Healthcare - NFC offers greater accuracy and convenience in prescribing medicine, easier check-in, payments, checking status of patients, tracking records by embedding NFC tags to patient’s charts.
Read schedules from smart poster to NFC phone
Download maps from smart poster to NFC phone
Record location such as a parking in NFC phone
Smart Ticketing - Integrated smart chips can be used to replace traditional ticketing systems with smart tickets for airlines, train and bus tickets etc…
NFC tags can be used for Smart posters, movie tickets, ticket to concerts, advertisements, flyers and information links.
An NDEF message is composed of one or more NDEF records. There can be multiple records in a NDEF message.
The limit for the number of records that can be encapsulated into an NFC NDEF message depends upon the application in use and the tag type used.
0 – Empty: The record doesn’t contain any information.
1 – Well-known: The data is defined by the Record Type Definition (RTD) specification available from NFC Forum.
2 – Multipurpose Internet Mail Extensions (MIME): This is one of the data types normally found in Internet communications as defined by RFC 2046.
3 – Absolute Uniform Resource Identifier (URI): This is a pointer to a resource that follows the RFC 3986 syntax.
4 – External: This is user-defined data that relies on the format specified by the RTD specification.
5 – Unknown: The data type is unknown, which means that you must set the type length to 0.
6 – Unchanged: Some payloads are chunked, which means that the data is too large to fit within a single record. In this case, each record contains a piece of the data — a chunk. This TNF indicates that this is not the first record in the chunk — it’s one of the middle or the terminating records. The TNF is unchanged from the kind of data found in the first record of the chunked set.
7 – Reserved: This value is reserved for future use.
A short record is one with a payload length <= 255 bytes. Normal records can have payload lengths exceeding 255 bytes up to a maximum 4 GB.
CF flag tells you when a record is chunked. In other words, if you see this flag set, reading a single record won’t provide you with all the data for that data item. You must read all the records associated with that data item to get the complete information about it.
The first record in a message has the MB (message begin) flag set to true so that you know that this is the first record. The last record in the message has the ME flag set so that you know this is the last record. All the intermediate records have both the MB and the ME flags set to false.