2. Designed for short distance communication (up to 10 cm)
NFC or Near Field Communication is a short range high
frequency wireless communication technology
It’s a contactless card and a contactless reader in one chip
It operates at 13.56 MHz
It’s designed for low bandwidth (max speed is 424 kBaud)
Applications aimed for are
Ticketing
Payment
Device Pairing
2
Short Range
13.56MHz
RF Link
3. NFC is mainly aimed for mobile or handheld
devices.
NFC is an extension of Radio frequency
identification or RFID technology
RFID is mainly used for tracking and
identification by sending radio waves
4. In 2004,NFC Forum was formed by Nokia,
Philips, Sony, to set standards for NFC. Every
NFC enabled device will have “N-Mark” trade
mark, developed by NFC forum.
N-Mark Trade mark
5. In 2006
First mobile phone (nokia 6131) with NFC
released by NOKIA.
6. In 2010
First android phone SAMSUNG NEXUS S with
NFC support released
7. Near Field Communication is based on
inductive coupling.
NFC works using magnetic induction between
two loop antennas located within each other’s
‘near field’.
8. Operating frequency 13.56 Mhz.
Data rate 106 kbit/s to 424 kbit/s
NFC use an initiator and a target.
Initiator actively generates an RF field that can
power a passive target.
WPAN (wireless personal area network)is used
in this technology
9.
10. In active mode, both devices with NFC chip
generates an electromagnetic field and
exchange data.
In passive mode, there is only one active device
and other uses that field to exchange
information.
11. NFC application can be split into three basic
categories:
a. Touch and Go---ticketing
b. Touch and Confirm---mobile payment
c. Touch and Connect---to enable peer to peer
transfer of data
12. Nexus S
Google Nexus S 4G
Samsung Galaxy S II
Samsung Galaxy Note
Galaxy Nexus
Nokia 6212 Classic
Nokia 6131 NFC
13. 1) Coil in the first smart phone sets up a current that is picked up a second
smart phone or reader.
2) The second smart phone receives the “induced current” from the first,
recognizes it as a valid signal and offers a connection.
3) The first cell phone accepts the connection and begins the transaction.
14. 1) Coil in the smart phone sets up a current that is picked up by the smart tag
2) The smart tag receives the “induced current” from the cell phone, recognizes
it as a valid signal and offers a connection to the cell phone.
3) The cell phone accepts the connection and begins the transaction
15. Advantage of NFC
1. Two-way data communication
2. Security level is high due to encoding system
3. High recognition speed, and low recognition error
16. Make payments or use coupons via devices,
instead of credit or debit cards
Transfer files and share documents
Download information about objects, services
or places from “smart posters”
Display electronic identity documents, like air
travel boarding passes
17. There are dedicated roles
Initiator and Target
Any data transfer is a message and reply pair.
17
Initiator Target
Message
Reply
• There are dedicated modes of operation
– Active and Passive
– Active means the device generates an RF field
– Passive means the device uses the RF field generated by the other
device
18. The VCO produce frequency modulated signal
at the transmitter and phase locked loop
demodulated the signal at receiver.
19. 19
Active Passive
106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK
212 kBaud Manchester, 10% ASK Manchester, 10% ASK
424 kBaud Manchester, 10% ASK Manchester, 10% ASK
Active Passive
Initiator Possible Not Possible
Target Possible Possible
20. I am sorry, but NFC is not secure against
eavesdropping .
From how far away is it possible to eavesdrop?
Depends….
RF field of sender
Equipment of attacker
….
Does Active versus Passive mode matter?
Yes
In active mode the modulation is stronger (in particular at 106 kBaud)
In passive mode eavesdropping is harder.
Countermeasure
Secure Channel
20
21. Eavesdropping:-
NFC by itself can not protect against eavesdropping.
An attacker can use an antenna to also receive the
transmitted signals.
Data Corruption:-
Data corruption can be achieved by transmitting valid
frequencies of the data spectrum at a correct time. The
correct time can be calculated if attacker has a good
understanding of the used modulation scheme and
coding.
22. Data modification and Insertion :-
An attacker can insert massage into the data
exchange between two devices. But this is
possible only in case the answering device needs
a very long time to answer.
For the modified miller encoding with 100% ASK
this attack is feasible for certain bits and
impossible for other bits. But for Manchester
coding with 10% ASK this attack is feasible on all
bits.
23. Eavesdropping:-
Data transmitted in possible mode is significantly
harder to be eavesdropping on, but just using the
passive mode is probably not sufficient for most
applications which transmit sensitive data.
Only real solution is to establish a secure channel
between the two devices.
24. Data corruption:-
NFC devices can count this attack because they
can check the RF field while they are transmitting
data .
If an NFC device does this, it will be able to detect
the attack. The power which is needed to corrupt
the data is significantly bigger, than the power
which can be detected by the device.
This every such attack should be detectable.
25. Data modification and Insertion:-
By using 100k baud in active mode it gets impossible
for an attacker to modify the data transmitted.
NFC device should check the RF field while sending
which means the sending device could continuously
check for such an attack and could stop the data
transmission when an attack is detected.
Establishing an secure channel between in two
devices.
26. 26
1 Bit
1. Half-Bit 2. Half-Bit
100
0
Coded “0” Coded “1”
Modified Miller
Coding, 100%
ASK
Manchester
Coding, 10%
ASK
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
34. Eavesdropping
No protection
Use a Secure Channel
Data Modification
No protection
Use Secure Channel
Man in the Middle Attack
Very good protection if
Alice uses 106 kBaud
Alice uses Active – Passive mode
Alice checks for disturbance
Alice checks for suspicious answers from Bob
34
NFC Intro
Eaves-
dropping
Conclusion
Data
Modification
Man-in-the-
Middle
Contents
37. RFID Difference Barcode
$0.5/1 unit. Price $0.005/1 unit.
More than 216 . High
capacity
Storage capacity
27 .
Low capacity(about 20
letter)
Radio frequency. How to use Visible light(infrared ray)
Possible.(by using
satellite or mobile radio
communication network)
Information
understanding
in real time
Impossible.
Long distance. Distance with reader Close distance.
Read + write. Read/write capacity Only read.
Virtually none. Once up
and running, the system is
completely automated.
Human Capital
Large requirements.
Laborers must scan each
tags.
High. Durability Low.
High. Security Low.