SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
References
Near Field Communication is a
short range high frequency
wireless communication
technology. Which enables the
exchange of data between
devices over a distance of up to
10 centimeters.
In 2004, NFC Forum was formed by Nokia,
Philips, Sony, to set standards for NFC .
Every NFC enabled device will have “N-
Mark” trademark ,developed by NFC Forum.
In 2006
First mobile phone( nokia 6131) with NFC
released by NOKIA.
In 2010
First android phone SAMSUNG NEXUS S
with NFC support released.
NFC trademark
logo
It operates within the globally available and unlicensed radio
frequency band of 13.56 MHZ with a bandwidth of 14 KHZ .
Supported data rates: 106, 212 and 424 Kbit/s .
For two devices (Active/Passive) to communicate using NFC, one
device must have an NFC reader/writer and one must have an
NFC tag
1.Active mode of communication 2.Passive mode of communication
Type 1: Read and rewrite capable
Type 2: Anti collision support, rewritable or read only
Type 3: Data collision protection, high speed, large memory
Type 4: Data collision protection, setting can’t be changed
by user
NFC applications can be split into the following three basic categories
 Touch and Go
 Touch and Confirm
 Touch and Connect
 The communication range of NFC is limited to a few centimeters.
 NFC alone does not ensure secure communications.
 Applications may use higher-layer cryptographic protocols to
establish a secure channel.
 customers, who will need to protect their personal devices and
data with passwords, keypad locks, and anti-virus software.
 EAVES DROPPING
 DATA MODIFICATION
 RELAYATTACK
The RF signal for the wireless data transfer can be picked up with
antennas.
The distance from which an attacker is able to eavesdrop the RF
signal depends on numerous parameters.
Eavesdropping
 It is relatively easy to destroy data by using an RFID jammer.
 There is no way currently to prevent such an attack. However, if
NFC devices check the RF field while they are sending, it is
possible to detect attacks.
Data modification:
Relay attack:
It is nothing but a man-in-middle attack.
 High convenience to the user, because the data exchange is
done by bringing two mobiles together.
 Reduces cost of electronic issuance .
 Secure communication.
 No special software.
 No manual configuration and settings.
 No search and pair procedure.
It is slow when compared to Bluetooth.
Power consumption is comparatively more .
The system has the limitation that it can be operated only
with devices under a short range i.e around 10 cm.
The data transfer rate is very less at about 106kbps, 212
kbps and 424kbps.
Mobile handsets are the primary target for NFC and soon NFC
will be implemented in most handheld devices. Even though
NFC have the shortest range among radio frequency
technologies, combining them with existing technologies like
Bluetooth or Infrared can increase its range of applications.
REFERENCE
http://www.nfc-forum.org
http://www.gemalto.com/nfc.html
http://www. whatis.techtarget.com/nfc.html
http://www.nearfieldcommunication.org
http://www.asia.cnet.com/nearfield
communication.html
Near field communication

Weitere ähnliche Inhalte

Was ist angesagt?

Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirMohammed Mudassir
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshLogesh Kumar
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)deepak171991
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFCMehvish Mushtaq
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)Chetan Chaudhari
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)divyakalra200
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
Nfc Overview
Nfc OverviewNfc Overview
Nfc Overviewmehdibs
 

Was ist angesagt? (20)

Nfc
Nfc Nfc
Nfc
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed Mudassir
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by Logesh
 
NFC tech
NFC techNFC tech
NFC tech
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
Nfc
NfcNfc
Nfc
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Ioe module 2
Ioe module 2Ioe module 2
Ioe module 2
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Nfc Overview
Nfc OverviewNfc Overview
Nfc Overview
 

Ähnlich wie Near field communication

Ähnlich wie Near field communication (20)

Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC
NFCNFC
NFC
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATION
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
Near field communication
Near field communication Near field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
nfc
nfcnfc
nfc
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc
NfcNfc
Nfc
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Near field communication

  • 1.
  • 2. Introduction Evolution of NFC Technology How NFC work NFC mode of communication ,tags & Operation Comparison with existing technique Application & Uses of NFC NFC Security Advantages& Disadvantages of NFC Conclusion References
  • 3. Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
  • 4. In 2004, NFC Forum was formed by Nokia, Philips, Sony, to set standards for NFC . Every NFC enabled device will have “N- Mark” trademark ,developed by NFC Forum. In 2006 First mobile phone( nokia 6131) with NFC released by NOKIA. In 2010 First android phone SAMSUNG NEXUS S with NFC support released. NFC trademark logo
  • 5. It operates within the globally available and unlicensed radio frequency band of 13.56 MHZ with a bandwidth of 14 KHZ . Supported data rates: 106, 212 and 424 Kbit/s . For two devices (Active/Passive) to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag
  • 6. 1.Active mode of communication 2.Passive mode of communication Type 1: Read and rewrite capable Type 2: Anti collision support, rewritable or read only Type 3: Data collision protection, high speed, large memory Type 4: Data collision protection, setting can’t be changed by user
  • 7.
  • 8.
  • 9. NFC applications can be split into the following three basic categories  Touch and Go  Touch and Confirm  Touch and Connect
  • 10.
  • 11.  The communication range of NFC is limited to a few centimeters.  NFC alone does not ensure secure communications.  Applications may use higher-layer cryptographic protocols to establish a secure channel.  customers, who will need to protect their personal devices and data with passwords, keypad locks, and anti-virus software.
  • 12.  EAVES DROPPING  DATA MODIFICATION  RELAYATTACK
  • 13. The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters. Eavesdropping
  • 14.  It is relatively easy to destroy data by using an RFID jammer.  There is no way currently to prevent such an attack. However, if NFC devices check the RF field while they are sending, it is possible to detect attacks. Data modification:
  • 15. Relay attack: It is nothing but a man-in-middle attack.
  • 16.  High convenience to the user, because the data exchange is done by bringing two mobiles together.  Reduces cost of electronic issuance .  Secure communication.  No special software.  No manual configuration and settings.  No search and pair procedure.
  • 17. It is slow when compared to Bluetooth. Power consumption is comparatively more . The system has the limitation that it can be operated only with devices under a short range i.e around 10 cm. The data transfer rate is very less at about 106kbps, 212 kbps and 424kbps.
  • 18. Mobile handsets are the primary target for NFC and soon NFC will be implemented in most handheld devices. Even though NFC have the shortest range among radio frequency technologies, combining them with existing technologies like Bluetooth or Infrared can increase its range of applications.