SlideShare ist ein Scribd-Unternehmen logo
1 von 40
SUBMITTED TO:
VLSI
DEPARTMENT
SUBMITTED BY:
LALIT KUMAR
MVLSI-749-2K15
1
 Designed for short distance communication (up to 10 cm)
 NFC or Near Field Communication is a short range high
frequency wireless communication technology
 It’s a contactless card and a contactless reader in one chip
 It operates at 13.56 MHz
 It’s designed for low bandwidth (max speed is 424 kBaud)
 Applications aimed for are
 Ticketing
 Payment
 Device Pairing
2
Short Range
13.56MHz
RF Link
 NFC is mainly aimed for mobile or handheld
devices.
 NFC is an extension of Radio frequency
identification or RFID technology
 RFID is mainly used for tracking and
identification by sending radio waves
 In 2004,NFC Forum was formed by Nokia,
Philips, Sony, to set standards for NFC. Every
NFC enabled device will have “N-Mark” trade
mark, developed by NFC forum.
N-Mark Trade mark
 In 2006
First mobile phone (nokia 6131) with NFC
released by NOKIA.
 In 2010
First android phone SAMSUNG NEXUS S with
NFC support released
 Near Field Communication is based on
inductive coupling.
 NFC works using magnetic induction between
two loop antennas located within each other’s
‘near field’.
 Operating frequency 13.56 Mhz.
 Data rate 106 kbit/s to 424 kbit/s
 NFC use an initiator and a target.
 Initiator actively generates an RF field that can
power a passive target.
 WPAN (wireless personal area network)is used
in this technology
 In active mode, both devices with NFC chip
generates an electromagnetic field and
exchange data.
 In passive mode, there is only one active device
and other uses that field to exchange
information.
 NFC application can be split into three basic
categories:
a. Touch and Go---ticketing
b. Touch and Confirm---mobile payment
c. Touch and Connect---to enable peer to peer
transfer of data
 Nexus S
 Google Nexus S 4G
 Samsung Galaxy S II
 Samsung Galaxy Note
 Galaxy Nexus
 Nokia 6212 Classic
 Nokia 6131 NFC
1) Coil in the first smart phone sets up a current that is picked up a second
smart phone or reader.
2) The second smart phone receives the “induced current” from the first,
recognizes it as a valid signal and offers a connection.
3) The first cell phone accepts the connection and begins the transaction.
1) Coil in the smart phone sets up a current that is picked up by the smart tag
2) The smart tag receives the “induced current” from the cell phone, recognizes
it as a valid signal and offers a connection to the cell phone.
3) The cell phone accepts the connection and begins the transaction
Advantage of NFC
1. Two-way data communication
2. Security level is high due to encoding system
3. High recognition speed, and low recognition error
 Make payments or use coupons via devices,
instead of credit or debit cards
 Transfer files and share documents
 Download information about objects, services
or places from “smart posters”
 Display electronic identity documents, like air
travel boarding passes
 There are dedicated roles
 Initiator and Target
 Any data transfer is a message and reply pair.
17
Initiator Target
Message
Reply
• There are dedicated modes of operation
– Active and Passive
– Active means the device generates an RF field
– Passive means the device uses the RF field generated by the other
device
 The VCO produce frequency modulated signal
at the transmitter and phase locked loop
demodulated the signal at receiver.
19
Active Passive
106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK
212 kBaud Manchester, 10% ASK Manchester, 10% ASK
424 kBaud Manchester, 10% ASK Manchester, 10% ASK
Active Passive
Initiator Possible Not Possible
Target Possible Possible
 I am sorry, but NFC is not secure against
eavesdropping .
 From how far away is it possible to eavesdrop?
 Depends….
 RF field of sender
 Equipment of attacker
 ….
 Does Active versus Passive mode matter?
 Yes
 In active mode the modulation is stronger (in particular at 106 kBaud)
 In passive mode eavesdropping is harder.
 Countermeasure
 Secure Channel
20
 Eavesdropping:-
NFC by itself can not protect against eavesdropping.
An attacker can use an antenna to also receive the
transmitted signals.
 Data Corruption:-
Data corruption can be achieved by transmitting valid
frequencies of the data spectrum at a correct time. The
correct time can be calculated if attacker has a good
understanding of the used modulation scheme and
coding.
 Data modification and Insertion :-
An attacker can insert massage into the data
exchange between two devices. But this is
possible only in case the answering device needs
a very long time to answer.
For the modified miller encoding with 100% ASK
this attack is feasible for certain bits and
impossible for other bits. But for Manchester
coding with 10% ASK this attack is feasible on all
bits.
 Eavesdropping:-
Data transmitted in possible mode is significantly
harder to be eavesdropping on, but just using the
passive mode is probably not sufficient for most
applications which transmit sensitive data.
Only real solution is to establish a secure channel
between the two devices.
 Data corruption:-
NFC devices can count this attack because they
can check the RF field while they are transmitting
data .
If an NFC device does this, it will be able to detect
the attack. The power which is needed to corrupt
the data is significantly bigger, than the power
which can be detected by the device.
This every such attack should be detectable.
 Data modification and Insertion:-
By using 100k baud in active mode it gets impossible
for an attacker to modify the data transmitted.
NFC device should check the RF field while sending
which means the sending device could continuously
check for such an attack and could stop the data
transmission when an attack is detected.
Establishing an secure channel between in two
devices.
26
1 Bit
1. Half-Bit 2. Half-Bit
100
0
Coded “0” Coded “1”
Modified Miller
Coding, 100%
ASK
Manchester
Coding, 10%
ASK
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
27
Alice Bob
Eve
28
Alice Bob
Message
Eve
Contents
29
Alice Bob
Message
Eve
Eavesdropping
30
Alice Bob
Message
Eve
EavesdroppingDisturb
31
Alice Bob
Message
Eve
EavesdroppingDisturb
Alice detects the disturbance and stops the protocol
• Check for active disturbances !
32
Alice Bob
Eve
Message
33
Alice Bob
Eve
Message
Eve cannot send to Bob, while RF field of Alice is on!
• Use Active – Passive connection !
• Use 106 kBaud !
 Eavesdropping
 No protection
 Use a Secure Channel
 Data Modification
 No protection
 Use Secure Channel
 Man in the Middle Attack
 Very good protection if
 Alice uses 106 kBaud
 Alice uses Active – Passive mode
 Alice checks for disturbance
 Alice checks for suspicious answers from Bob
34


NFC Intro
Eaves-
dropping
Conclusion
Data
Modification
Man-in-the-
Middle
Contents
Speed of various technologies used for data transfer
QR (Quick Response) code
VS
NFC (Near Field Communication)
ALTERNATIVES
RFID Difference Barcode
$0.5/1 unit. Price $0.005/1 unit.
More than 216 . High
capacity
Storage capacity
27 .
Low capacity(about 20
letter)
Radio frequency. How to use Visible light(infrared ray)
Possible.(by using
satellite or mobile radio
communication network)
Information
understanding
in real time
Impossible.
Long distance. Distance with reader Close distance.
Read + write. Read/write capacity Only read.
Virtually none. Once up
and running, the system is
completely automated.
Human Capital
Large requirements.
Laborers must scan each
tags.
High. Durability Low.
High. Security Low.
APPLICATION
Before & After
Previously Used
Methods
Current &
Future
Methods
IN HOTELS

Weitere ähnliche Inhalte

Was ist angesagt?

NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field CommunicationSalomon Thomas
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)Jagadish Mohanty
 
near field communication
near field communicationnear field communication
near field communicationChitrabengani
 
2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paperBoni
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technologyshrien_sahi
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFCMehvish Mushtaq
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONavtechno
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technologyIshtdeep Hora
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationYesha Kava
 
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...nwgong
 

Was ist angesagt? (20)

Near field communication
Near field communicationNear field communication
Near field communication
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
 
near field communication
near field communicationnear field communication
near field communication
 
2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
10.1
10.110.1
10.1
 
Iot
IotIot
Iot
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
NFC
NFCNFC
NFC
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technology
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
It nfc presentation
It nfc presentationIt nfc presentation
It nfc presentation
 
nfc report file
nfc report filenfc report file
nfc report file
 
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
 

Andere mochten auch

Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
Near field communication
Near field communication Near field communication
Near field communication Paurnima Pawar
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesBabu Kumar
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and MoneyVikram Dahiya
 
Near field communication
Near field communicationNear field communication
Near field communicationNithin Krishna
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)Chetan Chaudhari
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsRohde & Schwarz North America
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full PresentationDILIN RAJ DS
 
Near field communication
Near field communicationNear field communication
Near field communicationNagesh Mishra
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)ADARSH KUMAR
 
Near field communication new
Near field communication newNear field communication new
Near field communication newSanu Varghese
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overviewMaarten Weyn
 

Andere mochten auch (20)

Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
Near field communication
Near field communication Near field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slides
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Nfc
Nfc Nfc
Nfc
 
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
Nfc kdr
Nfc kdrNfc kdr
Nfc kdr
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
 

Ähnlich wie LALIT NFC

Near field communication
Near field communicationNear field communication
Near field communicationVaibhav Chandak
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)Bharat Kachhwaha
 
Security in NFC
Security in NFCSecurity in NFC
Security in NFCdo vietanh
 
Near field communication
Near field communicationNear field communication
Near field communicationDipen Jain
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)Aditya Singh
 
Near field communication
Near field communicationNear field communication
Near field communicationanshu kumari
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptxPoriumlimited
 
Near field communication
Near field communicationNear field communication
Near field communicationdivyasolanki101
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxShirishaBhuvanagiri
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfSibenConor
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Seminar Links
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationVasanth Krupa
 
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MoreNear Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MorePraful Manjunath
 
Ece interview questions with answers
Ece interview questions with answersEce interview questions with answers
Ece interview questions with answersmanish katara
 

Ähnlich wie LALIT NFC (20)

Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
 
NFC
NFCNFC
NFC
 
Security in NFC
Security in NFCSecurity in NFC
Security in NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
NFC tech
NFC techNFC tech
NFC tech
 
Nfc
NfcNfc
Nfc
 
nfc
nfcnfc
nfc
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdf
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MoreNear Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much More
 
Ece interview questions with answers
Ece interview questions with answersEce interview questions with answers
Ece interview questions with answers
 

LALIT NFC

  • 2.  Designed for short distance communication (up to 10 cm)  NFC or Near Field Communication is a short range high frequency wireless communication technology  It’s a contactless card and a contactless reader in one chip  It operates at 13.56 MHz  It’s designed for low bandwidth (max speed is 424 kBaud)  Applications aimed for are  Ticketing  Payment  Device Pairing 2 Short Range 13.56MHz RF Link
  • 3.  NFC is mainly aimed for mobile or handheld devices.  NFC is an extension of Radio frequency identification or RFID technology  RFID is mainly used for tracking and identification by sending radio waves
  • 4.  In 2004,NFC Forum was formed by Nokia, Philips, Sony, to set standards for NFC. Every NFC enabled device will have “N-Mark” trade mark, developed by NFC forum. N-Mark Trade mark
  • 5.  In 2006 First mobile phone (nokia 6131) with NFC released by NOKIA.
  • 6.  In 2010 First android phone SAMSUNG NEXUS S with NFC support released
  • 7.  Near Field Communication is based on inductive coupling.  NFC works using magnetic induction between two loop antennas located within each other’s ‘near field’.
  • 8.  Operating frequency 13.56 Mhz.  Data rate 106 kbit/s to 424 kbit/s  NFC use an initiator and a target.  Initiator actively generates an RF field that can power a passive target.  WPAN (wireless personal area network)is used in this technology
  • 9.
  • 10.  In active mode, both devices with NFC chip generates an electromagnetic field and exchange data.  In passive mode, there is only one active device and other uses that field to exchange information.
  • 11.  NFC application can be split into three basic categories: a. Touch and Go---ticketing b. Touch and Confirm---mobile payment c. Touch and Connect---to enable peer to peer transfer of data
  • 12.  Nexus S  Google Nexus S 4G  Samsung Galaxy S II  Samsung Galaxy Note  Galaxy Nexus  Nokia 6212 Classic  Nokia 6131 NFC
  • 13. 1) Coil in the first smart phone sets up a current that is picked up a second smart phone or reader. 2) The second smart phone receives the “induced current” from the first, recognizes it as a valid signal and offers a connection. 3) The first cell phone accepts the connection and begins the transaction.
  • 14. 1) Coil in the smart phone sets up a current that is picked up by the smart tag 2) The smart tag receives the “induced current” from the cell phone, recognizes it as a valid signal and offers a connection to the cell phone. 3) The cell phone accepts the connection and begins the transaction
  • 15. Advantage of NFC 1. Two-way data communication 2. Security level is high due to encoding system 3. High recognition speed, and low recognition error
  • 16.  Make payments or use coupons via devices, instead of credit or debit cards  Transfer files and share documents  Download information about objects, services or places from “smart posters”  Display electronic identity documents, like air travel boarding passes
  • 17.  There are dedicated roles  Initiator and Target  Any data transfer is a message and reply pair. 17 Initiator Target Message Reply • There are dedicated modes of operation – Active and Passive – Active means the device generates an RF field – Passive means the device uses the RF field generated by the other device
  • 18.  The VCO produce frequency modulated signal at the transmitter and phase locked loop demodulated the signal at receiver.
  • 19. 19 Active Passive 106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK 212 kBaud Manchester, 10% ASK Manchester, 10% ASK 424 kBaud Manchester, 10% ASK Manchester, 10% ASK Active Passive Initiator Possible Not Possible Target Possible Possible
  • 20.  I am sorry, but NFC is not secure against eavesdropping .  From how far away is it possible to eavesdrop?  Depends….  RF field of sender  Equipment of attacker  ….  Does Active versus Passive mode matter?  Yes  In active mode the modulation is stronger (in particular at 106 kBaud)  In passive mode eavesdropping is harder.  Countermeasure  Secure Channel 20
  • 21.  Eavesdropping:- NFC by itself can not protect against eavesdropping. An attacker can use an antenna to also receive the transmitted signals.  Data Corruption:- Data corruption can be achieved by transmitting valid frequencies of the data spectrum at a correct time. The correct time can be calculated if attacker has a good understanding of the used modulation scheme and coding.
  • 22.  Data modification and Insertion :- An attacker can insert massage into the data exchange between two devices. But this is possible only in case the answering device needs a very long time to answer. For the modified miller encoding with 100% ASK this attack is feasible for certain bits and impossible for other bits. But for Manchester coding with 10% ASK this attack is feasible on all bits.
  • 23.  Eavesdropping:- Data transmitted in possible mode is significantly harder to be eavesdropping on, but just using the passive mode is probably not sufficient for most applications which transmit sensitive data. Only real solution is to establish a secure channel between the two devices.
  • 24.  Data corruption:- NFC devices can count this attack because they can check the RF field while they are transmitting data . If an NFC device does this, it will be able to detect the attack. The power which is needed to corrupt the data is significantly bigger, than the power which can be detected by the device. This every such attack should be detectable.
  • 25.  Data modification and Insertion:- By using 100k baud in active mode it gets impossible for an attacker to modify the data transmitted. NFC device should check the RF field while sending which means the sending device could continuously check for such an attack and could stop the data transmission when an attack is detected. Establishing an secure channel between in two devices.
  • 26. 26 1 Bit 1. Half-Bit 2. Half-Bit 100 0 Coded “0” Coded “1” Modified Miller Coding, 100% ASK Manchester Coding, 10% ASK 1 Bit 1. Half-Bit 2. Half-Bit 100 0 1 Bit 1. Half-Bit 2. Half-Bit 100 0 1 Bit 1. Half-Bit 2. Half-Bit 100 0
  • 31. 31 Alice Bob Message Eve EavesdroppingDisturb Alice detects the disturbance and stops the protocol • Check for active disturbances !
  • 33. 33 Alice Bob Eve Message Eve cannot send to Bob, while RF field of Alice is on! • Use Active – Passive connection ! • Use 106 kBaud !
  • 34.  Eavesdropping  No protection  Use a Secure Channel  Data Modification  No protection  Use Secure Channel  Man in the Middle Attack  Very good protection if  Alice uses 106 kBaud  Alice uses Active – Passive mode  Alice checks for disturbance  Alice checks for suspicious answers from Bob 34   NFC Intro Eaves- dropping Conclusion Data Modification Man-in-the- Middle Contents
  • 35. Speed of various technologies used for data transfer
  • 36. QR (Quick Response) code VS NFC (Near Field Communication) ALTERNATIVES
  • 37. RFID Difference Barcode $0.5/1 unit. Price $0.005/1 unit. More than 216 . High capacity Storage capacity 27 . Low capacity(about 20 letter) Radio frequency. How to use Visible light(infrared ray) Possible.(by using satellite or mobile radio communication network) Information understanding in real time Impossible. Long distance. Distance with reader Close distance. Read + write. Read/write capacity Only read. Virtually none. Once up and running, the system is completely automated. Human Capital Large requirements. Laborers must scan each tags. High. Durability Low. High. Security Low.
  • 38.
  • 40. Before & After Previously Used Methods Current & Future Methods IN HOTELS