SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Gujarat Technological University
SITARAMBHAI NARANJI PATEL INSTITUTE OF TECHNOLOGY &
RESEARCH CENTRE, UMRAKH
Computer Science & Engineering Department
SEMINAR REPORT ON
NFC TECHNOLOGY
In Partial Fulfillment for the Award of
Bachelor of Engineering
In
Computer Science & Engineering
SUBMITTED BY
Pandya Kinjal D
UNDER THE GUIDANCE OF
Prof .Bhavesh Patel
Year 2013-14
Gujarat Technological University
SITARAMBHAI NARANJI PATEL INSTITUTE OF TECHNOLOGY &
RESEARCH CENTRE, UMRAKH
Computer Science & Engineering Department
Certificate
This is to certify that the Seminar report entitled “NFC Technology” which is being
submitted by Kinjal Pandya(110490131030 ) for the partial fulfillment of the award of the
degree “Bachelor of Engineering (Computer Science & Engineering)” of “Gujarat
Technological University, Ahmedabad” is a record of the candidates own work carried out
by him/her under my supervision and guidance. The matter embodied in this report has
not been submitted for the award of any other degree.
Date:
Guide H.O.D
Prof.Bhavesh Patel Prof. Dhaval A. Jadhav
NFC technolgy
SNPIT & RC,UMRAKH
Acknowledgement
It gives me a great sense of pleasure to present the B.E Seminar Prof.Bhavesh Patel
for his constant support and guidance throughout the course of our work. His sincerity,
thoroughness and perseverance have been a constant source of inspiration for me. It is only
his cognizant efforts that mine endeavour have seen light of the day.
I also do not like to miss the opportunity to acknowledge the contribution of all
dignitary Staff-members of SNPIT&RC for their kind assistance and cooperation during the
development of our Seminar report. Last but not the least, I acknowledge my friends for their
contribution in the completion of the seminar report.
Apart from the efforts of me, the success of this project depends largely on the
encouragement and guidelines of many others. I take this opportunity to express my gratitude
to the people who have been instrumental in the successful completion of this report.
Kinjal Pandya
(110490131030)
NFC technolgy
SNPIT & RC,UMRAKH
Abstract
Near Field Communication Technology
NFC is one of the latest wireless communication technologies. As a short-range
wireless connectivity technology, NFC offers safe — yet simple and intuitive —
communication between electronic devices. Users of NFC-enabled devices can simply point
or touch their devices to other NFC-enabled elements in the environment to communicate
with them, making application and data usage easy and convenient.
With NFC technology, communication occurs when an NFC-compatible device is
brought within a few centimeters of another NFC device or an NFC tag. The big advantage of
the short transmission range is that it inhibits eavesdropping on NFC-enabled transactions.
NFC technology opens up exciting new usage scenarios for mobile devices.
Keywords: NFC Modes, NFC and RFID, NFC over Bluetooth, Security Issues, Protection
measure
NFC technolgy
SNPIT & RC,UMRAKH
INDEX
NO CONTENTS PAGE NO
Abstract
1. Introduction 1
2 Standards and Compatibility 3
3 Near Field & Far Field 4
4 NFC Technical Architecture 5
5 . Technology Overview 9
6 Unique Feature 16
7 Operating Mode 17
8 Comparison with other Technologies 18
9 Security Aspects 21
10 User and Application 27
11 Future Application 28
12 Conclusion 29
13 Bibliography 30
NFC technology
SNPIT & RC,UMRAKH Page 1
1.INTRODUCTION
Near Field Communication (NFC) is a technology for contactless short-range
communication. Based on the Radio Frequency Identification (RFID), it uses magnetic field
induction to enable communication between electronic devices. The number of short-range
applications for NFC technology is growing continuously, appearing in all areas of life.
Especially the use in conjunction with mobile phones offers great opportunities.
One of the main goals of NFC technology has been to make the benefits of short-range
contactless communications available to consumers globally. The existing radio frequency
(RF) technology base has so far been driven by various business needs, such as logistics and
item tracking. While the technology behind NFC is found in existing applications, there has
been a shift in focus — most notably, in how the technology is used and what it offers to
consumers.
With just a point or a touch, NFC enables effortless use of the devices and gadgets we
use daily. Here are some examples of what a user can do with an NFC mobile phone in an
NFC-enabled environment:
 Download music or video from a smart poster.
 Exchange business cards with another phone.
 Pay bus or train fare.
 Print an image on a printer.
 Use a point-of-sale terminal to pay for a purchase, the same way as with a standard
contactless credit card.
 Pair two Bluetooth devices.
 An NFC-enabled phone functions much like standard contactless smart cards that
are used worldwide in credit cards and in tickets for public transit systems. Once an
application, such as a credit card application, has been securely provisioned to the
NFC-enabled phone, the customer can pay by simply waving the phone at a point-of-
sale reader. The NFC phone also offer enhanced security, enabling the user to protect
the secure applications through the phone's user interface features.
NFC technology
SNPIT & RC,UMRAKH Page 2
NFC technology
SNPIT & RC,UMRAKH Page 3
2.Standards and Compatibility
Near Field Communication is an open platform technology, developed by Philips and
Sony. NFC, described by NFCIP-1 (Near Field Communication Interface and Protocol 1), is
standardized in ISO 18092 [1], ECMA 340[2] as well as in ETSI TS 102 190[3]. These
standards specify the basic capabilities, such as the transfer speeds, the bit encoding schemes,
modulation, the frame architecture, and the transport protocol. Furthermore, the active and
passive NFC modes are described and the conditions that are required to prevent collisions
during initialization.
Todays NFC devices do not only implement NFCIP-1, but also NFCIP-2, which is defined in
ISO 21481 [4], ECMA 352 [5] and ETSI TS 102 312[6]. NFCIP-2 allows for selecting one of
three operating modes:
• NFC data transfer (NFCIP-1),
• proximity coupling device (PCD), defined in ISO 14443 [7], and
• vicinity coupling device (VCD), defined in ISO 15693 [8].
NFC devices have to provide these three functions in order to be compatible with the
main international standards for smartcard interoperability, ISO 14443 (proximity cards, e.g.
Philip’s Mifare), ISO 15693 (vicinity cards) and to Sonys FeliCa contactless smart card
system. Hence, as a combination of smartcard and contactless interconnection technologies,
NFC is compatible with today’s field proven RFID-technology. That means, it is providing
compatibility with the millions of contactless smartcards and scanners that already exist
worldwide.
NFC technology
SNPIT & RC,UMRAKH Page 4
3. NEAR FIELD AND FAR FIELD
The terms ―far field‖ and ―near field‖ describe the fields around an antenna or, more
generally, any electromagnetic-radiation source .The names imply that two regions with a
boundary between them exist around an antenna. Actually, as many as three regions and two
boundaries exist. These boundaries are not fixed in space. Instead, the boundaries move
closer to or farther from an antenna, depending on both the radiation frequency and the
amount of error an application can tolerate. To talk about these quantities, we need a way to
describe these regions and boundaries.A brief scan of reference literature yields the
terminology in Figure 1. The terms apply to the two- and three-region models.
NFC technology
SNPIT & RC,UMRAKH Page 5
4.NFC Technical Architecture
 RF Layer
a) Analog Specification:
 Defines the radio frequency characteristics of an NFC Forum
device.e.g. shape and strength of RF fields.
 Determines the operating range of devices.
b)Digital Protocol Specification:
 Implementation Specification for digital aspect of ISO/IEC
18092 & ISO/IEC 14443.
 Define the building block for the communication.
NFC technology
SNPIT & RC,UMRAKH Page 6
 Mode Switch
a) NFC Activities Specification:
 Defines the activities required to set up communication in an
interoperable manner, based on the building blocks of the
digital protocol specification..e.g., polling cycles, when to
perform collision detection.
 Reader /Writer Mode
a)NFC Data Exchange Format(NDEF):
 Message coding format used by NFC Referance Applications.
 Allows multiple NDEF message.
 Allows messages to be divide in to chunk.
b)Record Type Defination(RTD):
 Define how to construct records in NDEF messages.
 Record may contain other records.
 Each record has a type,indicating what is contain.
 Record type are extensiable-they may be defined by NFC fourm
specification(reference applications)or by other bodies(using domain
name).
NFC technology
SNPIT & RC,UMRAKH Page 7
c)Type 1-4 Tag Operation
 Define how to read and write NDEF data from/to a tag.
 Type 1 tag:
Type 1 Tags are cost effective and ideal for many NFC
applications.
 Based on ISO-14443A standard
 Read and rewrite capable; also users can
configure the tag to be only read.
 96 bytes of memory, expandable up to 2 kB
 Communication speed 106 kbits/s
 No data collision protection
 Type 2 tag:
Type 2 Tags are similar to Type 1 Tags and are derived from
the NXP/Philips MIFARE Ultralight tag.
 Based on ISO-14443A standard
 Read and rewrite capable; also users can
configure the tag to be read-only
 96 bytes of memory, expandable up to 2 kB
 Communication speed 106 kbits/s
 Anticollision support
 Compatible produts available in the market —
NXP MIFARE Ultralight
 Type 3 tag:
Type 3 Tags are derived from the nonsecure parts of
Sony FeliCa tags. These tags are costlier than Types 1
and 2.
 Based on the Japanese Industrial
Standard (JIS) X 6319-4
NFC technology
SNPIT & RC,UMRAKH Page 8
 Preconfigured at manufacture to be
either read and rewritable, or read-only
 Variable memory, up to 1 MB per
service
 Supports two communication speeds:
212 or 424 kbits/s
 Anticollision support
 Compatible products available in the
market Sony FeliCa
 Type 4 tag:
Type 4 Tags are similar to Type 1 Tags and are derived from
the NXP DESFire tag.
 Based on ISO-14443A standard
 Preconfigured at manufacture to be
either read and rewritable, or read-only
 Variable memory, up to 32 kB per
service
 Supports three different communication
speeds: 106, 212, or 424 kbits/s
 Anticollision support
 Compatible products available in the
market NXP DESFire, SmartMX-JCOP
 Peer to Peer Mode
NFC technology
SNPIT & RC,UMRAKH Page 9
a)Logical Link Control Protocol(LLCP):
 Link activication,supervision,Deactivication
 Asynchronuns balanced mode
 Protocol Multiplication
 Connectionless Transport
 Connection oriented Transport.
b)Simple NDEF Exchange Protocol(SNEP):
 Protocol to allow the exchange of NDEF messages in peer mode.
 Analougs to tag operation specification.
C)Protocol Binding
 Provides the standard binding (e.g. Port Number) to NFC forum
register protocol. Allow interoperable use of register Protocols.
NFC technology
SNPIT & RC,UMRAKH Page 10
5. Technology Overview
NFC operates in the standard, globally available 13.56MHz frequency band. Possible
supported data transfer rates are 106, 212 and 424 kbps and there is potential for higher data
rates. The technology has been designed for communications up to a distance of 20 cm, but
typically it is used within less than 10 cm. This short range is not a disadvantage, since it
aggravates eavesdropping.
ESSENTIAL SPECIFICATIONS:
 Like ISO/IEC 14443, NFC communicates via magnetic field induction, where
two loop antennas are located within each other’s near field, effectively forming an
air-core transformer. It operates within the globally available and unlicensed radio
frequency ISM band of 13.56 MHz. Most of the RF energy is concentrated in the
allowed 14 kHz bandwidth range, but the full spectral envelope may be as wide as
1.8 MHz when using the ASK modulation.
 Working distance with compact standard antennas: up to 20 cm
 Supported data rates: 106, 212, 424 or 848 kbit/s
5.1 Communication Modes: Active and Passive
The NFC interface can operate in two different modes: active and passive. An active
device generates its own radio frequency (RF) field, whereas a device in passive mode has to
use inductive coupling to transmit data. For battery-powered devices, like mobile phones, it is
better to act in passive mode. In contrast to the active mode, no internal power source is
required. In passive mode, a device can be powered by the RF field of an active NFC device
and transfers data using load modulation. Hence, the protocol allows for card emulation, e.g.,
used for ticketing applications, even when the mobile phone is turned off.
This yields to two possible cases, which are described in Table 5.1. The
communication between two active devices case is called active communication mode,
whereas the communication between an active and a passive device is called passive
communication mode.
NFC technology
SNPIT & RC,UMRAKH Page 11
Communication Mode Description
Active Two active devices communicate with each other.Each
device has to generate its own RF field,if it wants to send
data. The RF field is alternately generated by one of the
two devices.
Passive In this mode the communication takes place between an
active and a passive device. The passive device has no
battery and uses the RF field generated by the active
device.
Table 5.1: Communication Configurations
In general, at most two devices communicate with each other at the same time.
However, as defined in [2], §11.2.2.3, in passive mode the initiator (see Section 3.3) is able to
communicate with multiple targets. This is realized by a time slot method, which is used to
perform a Single Device Detection (SDD). The maximal number of time slots is limited to
16. A target responds in a random chosen time slot that may lead to collision with the
response of another target. In order to reduce the collisions, a target may ignore a polling
request set out by the initiator. If the initiator receives no response, it has to send the polling
request again.
5.2 Coding and Modulation
The distinction between active and passive devices specifies the way data is
transmitted. Passive devices encode data always with Manchester coding and a 10%ASK1.
Instead, for active devices one distinguishes between the modified Miller coding with 100%
modulation if the data rate is 106 kbps, and the Manchester coding using a modulation ratio
of 10% if the data rate is greater than 106 kbps. As we will discuss later the modulation ratio,
defined in [1] is of high importance for the security of the NFC data transfer.
NFC technology
SNPIT & RC,UMRAKH Page 12
Active Device Passive Device
106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK
212 kBaud Manchester, 10% ASK Manchester, 10% ASK
424 kBaud Manchester, 10% ASK Manchester, 10% ASK
Table 5.2: Coding and Modulation at different transfer speeds [10]
NFC devices are able to receive and transmit data at the same time. Thus, they need to
check the radio frequency field and can detect a collision if the received signal does not
match with the transmitted signal.
NFC technology
SNPIT & RC,UMRAKH Page 13
5.2.1 Manchester Code
The Manchester coding depends on two possible transitions at the midpoint of a
period. A low-to-high transition expresses a 0 bit, whereas a high-to-low transition stands for
a 1 bit. Consequently, in the middle of each bit period there is always a transition. Transitions
at the start of a period are not considered.
Figure 5.1: Manchester Code
5.2.2 Modified Miller Code
The Modified Miller bit coding defines ONE and ZERO by the position of a pulse
during one bit period. The pulse is a transition from HIGH to LOW, followed by a period of
LOW, followed by a transition to HIGH. The bit representation is illustrated in Figure 14.
For a ONE the pulse shall occur in the second half of the bit period; the transition
from HIGH to LOW shall be in the middle of the bit period.
For a ZERO a pulse shall occur at the beginning of the bit period with the following
exception. In case a ZERO bit follows a ONE bit, no pulse shall occur during this ZERO.
Figure 5.2: Modified Miller Code
NFC technology
SNPIT & RC,UMRAKH Page 14
5.3 Initiator and Target
Furthermore, it is important to observe the role allocation of initiator and target. The
initiator is the one who wishes to communicate and starts the communication. The target
receives the initiator’s communication request and sends back a reply. This concept prevents
the target from sending any data without first receiving a message. Regarding the passive
communication mode, the passive device acts always as NFC target. Here the active device is
the initiator, responsible for generating the radio field. In the case of an active configuration
in which the RF field is alternately generated, the roles of initiator and target are strictly
assigned by the one who starts the communication. By default all devices are NFC targets,
and only act as NFC initiator device if it is required by the application. In the case of two
passive devices communication is not possible (see Table 3.3).
Initiator Target
Active Possible Possible
Passive Not Possible Possible
Table 5.3: Possible Combinations Active/Passive with Initiator/Target ([9])
5.4 Collision Avoidance
Usually misunderstandings are rather rare, since the devices have to be placed in
direct proximity. The protocol proceeds from the principle: listen before talk.
If the initiator wants to communicate, first, it has to make sure that there is no external
RF field, in order not to disturb any other NFC communication. It has to wait silently as long
as another RF field is detected, before it can start the communication, after an accurately
defined guard-time ([2], §11.1). If the case occurs that two or more targets answer at exactly
the same time, a collision will be detected by the initiator.
NFC technology
SNPIT & RC,UMRAKH Page 15
5.5 General Protocol flow
As shown in Figure 5.3 the general protocol flow can be divided into the initialization
and transport protocol. The initialization comprises the collision avoidance and selection of
targets, where the initiator determines the communication mode (active or passive) and
chooses the transfer speed. As defined in [2], §12, the transport protocol is divided in three
parts:
• Activation of the protocol, which includes the Request for Attributes and the Parameter
Selection.
• The data exchange protocol, and
• The deactivation of the protocol including the Deselection and the Release.
During one transaction, the mode (active and passive) and the role (initiator and target)
does not change until the communication is finished. Though, the data transfer speed may be
changed by a parameter change procedure. For further details the reader may refer to the
standards [1] or [2].
NFC technology
SNPIT & RC,UMRAKH Page 16
Figure 5.3: General initialization and transport protocol ([2])
NFC technology
SNPIT & RC,UMRAKH Page 17
6. UNIQUE FEATURES
What makes the communication between the devices so easy is that the NFC protocol
provides some features not found in other general-purpose protocols.
First of all, it is a very short-range protocol. It supports communication at distances
measured in centimeters . The devices have to be literally almost touched to establish the link
between them. This has two important consequences:
1) The devices can rely on the protocol to be inherently secured since the devices must
be placed very close to each other. It is easy to control whether the two devices
communicate by simply placing them next to each other or keeping them apart.
2) The procedure of establishing the protocol is inherently familiar to people: you want
something to communicate – touch it. This allows for the establishment of the
network connection between the devices be completely automated and happen in a
transparent manner. The whole process feels then like if devices recognize each other
by touch and connect to each other once touched.
Another important feature of this protocol is the support for the passive mode of
communication. This is very important for the battery-powered devices since they have to
place conservation of the energy as the first priority. The protocol allows such a device, like a
mobile phone, to operate in a power-saving mode – the passive mode of NFC
communication. This mode does not require both devices to generate the RF field and allows
the complete communication to be powered from one side only. Of course, the device itself
will still need to be powered internally but it does not have to ―waste‖ the battery on
powering the RF communication interface.
Also, the protocol can be used easily in conjunction with other protocols to select
devices and automate connection set-up. As was demonstrated in the examples of use above,
the parameters of other wireless protocols can be exchanged allowing for automated set-up of
other, longer-range, connections. The difficulty in using long-range protocols like Bluetooth
or Wireless Ethernet is in selecting the correct device out of the multitude of devices in the
range and providing the right parameters to the connection. Using NFC the whole procedure
is simplified to a mere touch of one device to another.
NFC technology
SNPIT & RC,UMRAKH Page 18
7.OPERATING MODES OF NFC
NFC is a proximity coupling technology closely linked to the standard of proximity
smart cards as specified in ISO 14443. NFC Devices are capable of three different operating
modes:
o PEER-TO-PEER MODE (NFC):
This mode is the classic NFC mode, allowing data connection for up to 424
kBit/sec. The electromagnetic properties and the protocol (NFCIP-1) is standardized
in ISO 18092 and ECMA 320/340.
o READER/WRITER MODE (PCD):
NFC devices can be used as a reader/writer for tags and smart cards. In this case
the NFC device acts as an initiator and the passive tag is the target. In reader/writer
mode data rates of 106 kBit/sec are possible.
o TAG EMULATION MODE (PICC):
In this mode the NFC device emulates an ISO 14443 smart card or a smart card
chip integrated in the mobile devices is connected to the antenna of the NFC module.
This is an advantage of NFC technology as already existing reader infrastructures do
not need to be replaced. The smart card chip used for tag emulation is also referred to as
secure element.
NFC technology
SNPIT & RC,UMRAKH Page 19
8.Comparison with other Technologies
8.1 NFC and RFID
The heritage of earlier standards gives NFC compatibility benefits with existing RFID
applications, such as access control or public transport ticketing – it is often possible to
operate with old infrastructure, even if the RFID card is replaced with an NFC-enabled
mobile phone, for example. This is possible because of NFC’s capability to emulate RFID
tags (―card interface mode‖). NFC hardware can include a secure element for improved
security in critical applications such as payments. For example, a credit card could be
integrated into a mobile phone and used over NFC. NFCIP-1 is an NFC-specific
communication mode, defined in the ECMA-340 standard. This mode is intended for peer-to-
peer data communication between devices. In this mode, NFC is comparable to other short-
range communic
Basically, the technologies Radio Frequency Identification and Near Field
Communication use the same working standards. However, the essential extension of RFID is
the communication mode between two active devices. In addition to contactless smart cards
(ISO 14443 [7]), which only support communication between powered devices and passive
tags, NFC also provides peer-to-peer communication.
Thus, NFC combines the feature to read out and emulate RFID
tags, and furthermore, to share data between electronic devices that both have
active power.
NFC technology
SNPIT & RC,UMRAKH Page 20
8.2 Comparison with Bluetooth and Infrared
Compared to other short-range communication technologies, which have been
integrated into mobile phones, NFC simplifies the way consumer devices interact with one
another and obtains faster connections. The problem with infrared, the oldest wireless
technology introduced in 1993, is the fact that a direct line of
sight is required, which reacts sensitively to external influences such as light and reflecting
objects. The significant advantage over
Bluetooth is the shorter set-up time. Instead of performing manual configurations to
identify the other’s phone, the connection between two NFC devices is established at once
(<0,1s).
Table 8.1 points out these different capabilities of NFC, Bluetooth and infrared. All
these protocols are point-to-point protocols. Bluetooth also supports point-tomultipoint
communications. With less than 10 cm, NFC has the shortest range.
This provides a degree of security and makes NFC suitable for crowded areas. The
data transfer rate of NFC (424 kbps) is slower than Bluetooth (721 kbps), but faster than
infrared (115 kbps). In contrast to Bluetooth and infrared NFC is compatible to RFID.
.
NFC technology
SNPIT & RC,UMRAKH Page 21
NFC Benefits of NFC Bluetooth IrDa
Network Type Point-to-point Easy set-up,
pairing=bringing
close
Point to
multipoint
Point to point
Range <0.1m Safe, suitable for
crowded areas
10m 1m
Speed 424 kbps
(1Mbpscoming)
721 kbps 115 kbps
Set-up time <0.1 s Fast transactions e.g.
. for public transport
6 s 0.5 s
Modes Active-active,
active-passive
Reader mode and
card-like mode
Active-active Active-active
Compatible
with RF ID
Yes Can work with
existing
infrastructure
No No
Costs Low Affordable for most
devices
Moderate Low
Table 8.1: NFC compared with Bluetooth and IrDa [12]
NFC technology
SNPIT & RC,UMRAKH Page 22
9.Security Aspects
In this seminar, we want to analyze the security of NFC. In this context two very
interesting papers have been published. In [9] Ernst Haselsteiner and Klemens Breits discuss
some threats and solution for the security of NFC, and also the paper‖Security Aspects and
Prospective Applications of RFID Systems‖ [13] gives some useful information.
First of all it should be mentioned that the short communication range of a few
centimetres, though it requires conscious user interaction, does not really ensure secure
communication.
There are different possibilities to attack the Near Field Communication technology.
On the one hand the different used devices can be manipulated physically. This may be the
removal of a tag from the tagged item or wrapping them in metal foil in order to shield the
RF signal. Another aspect is the violation of privacy. If proprietary information is stored on a
tag it is important to prevent from unauthorized read and write access. As outlined in [13]
read-only tags are secure against an unauthorized write access. In the case of rewritable tags
we have to assume that attackers may have mobile readers and the appropriate software
which enable unauthorized read and write access if the reader distance is normal. In this work
we want to focus on attacks with regard to the communication between two devices.
For detecting errors, NFC uses the cyclic redundancy check (CRC). This method allows
devices to check whether the received data has been corrupted.
In the following, we will consider different possible types of attacks on the NFC
communication. For most of these attacks there are countermeasures in order to avoid or at
least reduce the threats.
NFC technology
SNPIT & RC,UMRAKH Page 23
9.1 Eavesdropping
NFC offers no protection against eavesdropping. RF waves for the wireless data
transfer with an antenna enables attackers to pick up the transmitted Monitoring data. In
practice a malicious person would have to keep a longer distance in order not to get noticed.
The short range between initiator and target for a successful
communication is no significant problem, since attackers are not bound by the same
transmission limits. Consequently the maximum distance for a normal read sequence can be
exceeded. The question how close an attacker has to be located to retrieve an usable RF
signal is difficult to answer. As listed in [9], this is
depending on a ‖huge‖ number of parameters, such as:
 RF filed characteristic of the given sender device (i.e., antenna geometry, shielding
effect of the case, the PCB, the environment)
 Characteristic of the attacker’s antenna (i.e., antenna geometry, possibility to change
the position in all 3 dimensions)
 Quality of the attacker’s receiver
 Quality of the attacker’s RF signal decoder
 Setup of the location where the attack is performed (e.g., barriers like walls or metal,
noise floor level Power sent out by the NFC device.
Furthermore, eavesdropping is extremely affected by the communication mode.
That’s because, based on the active or passive mode, the transferred data is coded and
modulated differently (see Section 3.2). If data is transfered with stronger modulation it can
be attacked easier. Thus, a passive device, which does not generate it’s own RF field is much
harder to attack, than an active device. In order to let the reader presume the risk resulting
from eavesdropping, there are given rough distances in 9:
‖When a device is sending data in active mode, eavesdropping can be done up to a
distance of about 10 m, whereas when the 0 sending device is in passive mode, this distance
is significantly reduced to about 1 m.‖
NFC technology
SNPIT & RC,UMRAKH Page 24
9.2 Data Destruction
An attacker who aspires data destruction intends a corruption of the communication.
The effect is that a service is no longer available. Still, the attacker is not able to generate a
valid message. Instead of eavesdropping this is not a passive attack. This attack is relatively
easy to realize. One possibility to disturb the signal is the usage of a so called RFID Jammer.
There is no way to prevent such an attack, but it is possible to detect it. NFC devices
are able to receive and transmit data at the same time. That means, they can check the radio
frequency field and will notice the collision.
9.3 Data Modification
Unauthorized changing of data, which results in valid messages, is much more
complicated and demands a thorough understanding. As we will point out in the following,
data modification is possible only under certain conditions. In order to modify the transmitted
data an intruder has to concern single bits of the RF signal. As already mentioned in Section
5.2 data is send in different ways.
The feasibility of this attack, that means if it is possible to change a bit of value 0 to 1
or the other way around, is subject to the strength of the amplitude modulation.
If 100% modulation is used, it is possible to eliminate a pause of the RF signal, but
not to generate a pause where no pause has been. This would demand an impracticable exact
overlapping of the attackers signal with the original signal at the receiver’s antenna.
However, Near Field Communication technology uses modulation of 100% in
conjunction with the modified Miller coding which leads to 4 possible cases (see Figure 8.1).
The only case, where a bit might be changed by an attacker is, where a 1 is followed by
another 1. By filling the pause in two half bit of the RF signal the decoder receives the signal
of the third case. Due to the agreement of the preceding bit the decoder would verify a valid
one. The another three cases are not susceptible to such an attack.
NFC technology
SNPIT & RC,UMRAKH Page 25
Bit x-1 Bit x Modification of bit x to x-1 Feasible?
0
0
1
1
0
1
0
1
1
0
1
0
No
No
No
yes
Figure 9.1: Bit modification of the Modified Miller Code
For NFC, a modulation ratio of 10% is always used together with Manchester coding.
In contrast to the 100% modulation, where really no signal is send in a pause, here within a
pause the RF signal is e.g. 82% of the level of the full signal.
Let’s assume, an attacker may increase the existing RF signal about 18% during the whole
session, without being noticed by the decoder. Then, the attacker is able to change a zero to
one by increasing the RF signal during the first half of the signal period by another 18%, and
also may change a bit of value one to zero
by simply stopping to send anything.
Regarding the threat in summary: Except for one case, always Manchester coding
with 10% ASK is used for NFC data transfer. This represents the best possible conditions for
the malicious intention of modifying NFC data (compare Table 3.2). This way of transmitting
the data offers a modification attack on all bits. The only exception are active devices
transfering data at 106 kbps. In this case the usage of the modified Miller coding with a
modulation ratio of 100% accomplishes that only certain bits can be modified.
NFC technology
SNPIT & RC,UMRAKH Page 26
9.4 Data Insertion
This attack can only be implemented by an attacker, if there is enough time to send an
inserted message before the real device starts to send his answers. If a collision occurs the
data exchange would be stopped at once. In order to prevent such attacks the device should
try to answer with no delay. Alternatively, again checking the RF field and also the secure
channel can be used to protect against attacks.
9.5 Man-in-the-Middle-Attack
In the classical Man-in-the-Middle Attack, two parties which want to talk to each
other, called Alice and Bob, are tricked into a three party conversation by an attacker Eve.
This is shown in Figure 8.1.
Alice Bob
Eve
Figure 8.1 Man-in-the-Middle Setup
Alice and Bob must not be aware of the fact that they are not talking to each other, but
that they are both sending and receiving data from Eve. Such a setup is the classical threat in
unauthenticated key agreement protocols like Diffie-Hellmann protocol. Alice and Bob want
to agree on a secret key, which they then use for a secure channel. However, as Eve is in the
middle, it is possible for Eve to establish a key with Alice and another key with Bob. When
Alice and Bob later use their key to secure data, Eve is able to eavesdrop on the
communication and also to manipulate data being transferred.
NFC technology
SNPIT & RC,UMRAKH Page 27
How would that work when the link between Alice and Bob is an NFC link?
Assuming that Alice uses active mode and Bob would be in passive mode, we have the
following situation. Alice generates the RF field and sends data to Bob. In case Eve is close
enough, she can eavesdrop the data sent by Alice. Additionally she must actively disturb the
transmission of Alice to make sure that Bob doesn’t receive the data. This is possible for Eve,
+but this can also be detected by Alice. In case Alice detects the disturbance, Alice can stop
the key agreement protocol. Let’s assume Alice does not check for active disturbance and so
the protocol can continue. In the next step Eve needs to send data to Bob. That’s already a
problem, because the RF field generated by Alice is still there, so Eve has to generate a
second RF field. This however, causes two RF fields to be active at the same time. It is
practically impossible to perfectly align these two RF fields. Thus, it is practically impossible
for Bob to understand data sent by Eve. Because of this and the possibility of Alice to detect
the attack much earlier we conclude that in this setup a Man-in-the-Middle attack is
practically impossible.
The only other possible setup is that Alice uses active mode and Bob uses active
mode, too. In this case Alice sends some data to Bob. Eve can list and Eve again must disturb
the transmission of Alice to make sure that Bob does not receive the data. At this point Alice
could already detect the disturbance done by Eve and stop the protocol. Again, let us assume
that Alice does not do this check and the protocol continues. In the next step Eve would need
to send data to Bob. At first sight this looks better now, because of the active-active
communication Alice has turned off the RF field. Now Eve turns on the RF field and can
send the data. The problem here now is that also Alice is listening as she is expecting an
answer from Bob. Instead she will receive the data sent by Eve and can again detect a
problem in the protocol and stop the protocol. It is impossible in this setup for Eve to send
data either to Alice or Bob and making sure that this data is not received by Bob or Alice,
respectively.
We claim that due to the above given reasons it is practically infeasible to mount a Man-in-
the-Middle attack in a real-word scenario.
NFC technology
SNPIT & RC,UMRAKH Page 28
10.USES AND APPLICATIONS
NFC technology is currently mainly aimed at being used with mobile phones. There are three
main use cases for NFC:
 card emulation: the NFC device behaves like an existing contactless card
 reader mode: the NFC device is active and read a passive RFID tag, for example for
interactive advertising
 P2P mode: two NFC devices are communicating together and exchanging
information.
Plenty of applications are possible, such as:
 Mobile ticketing in public transport — an extension of the existing contactless
infrastructure.
 Mobile payment — the device acts as a debit/ credit payment card.
 Smart poster — the mobile phone is used to read RFID tags on outdoor billboards in
order to get info on the move.
 Bluetooth pairing — in the future pairing of Bluetooth 2.1 devices with NFC support
will be as easy as bringing them close together and accepting the pairing. The process
of activating Bluetooth on both sides, searching, waiting, pairing and authorization
will be replaced by a simple "touch" of the mobile phones.
.
NFC technology
SNPIT & RC,UMRAKH Page 29
11.FUTURE APPLICATION
 Electronic ticketing — airline tickets, concert/event tickets, and others
 Electronic money
 Travel cards
 Identity documents
 Mobile commerce
 Electronic keys — car keys, house/office keys, hotel room keys, etc.
 NFC can be used to configure and initiate other wireless network connections such as
Bluetooth , Wi-Fi or Ultra-wideband.
 NFC for Health Monitoring in Daily Life .
NFC technology
SNPIT & RC,UMRAKH Page 30
12. CONCLUSION
In summary, Near Field Communication is an efficient technology for
communications with short ranges. It offers an intuitive and simple way to transfer data
between electronic devices. A significant advantages of this technique is the compatibility
with existing RFID infrastructures. Additionally, it would bring benefits to the setup of
longer-range wireless technologies, such as Bluetooth ,Wifi .
NFC is based on existing contactless infrastructure around the world that is
already in use by millions of people on a daily basis. NFC is not a fashionable nice-to-have
technology, but actually a technology that makes peoples lives easier – easier to pay for
goods and services, easier to use public transport, and easier to share data between devices.
NFC technology
SNPIT & RC,UMRAKH Page 31
Bibliography
[1] ISO/IEC 18092(ECMA-340): Information technology – Telecommunications and
information exchange between systems - Near Field Communication - Interface and Protocol
(NFCIP-1). First Edition, 2004-04-01.
[2] Ecma International: Standard ECMA-340, Near Field Communication Interface and
Protocol (NFCIP-1), December 2004,
URL: http://www.ecma international.org/publications/standards/Ecma- 340.htm.
[3] ETSI TS 102 190 V1.1.1: Near Field Communication
(NFC) IP-1; Interface and Protocol (NFCIP-1) 2003-03,
URL: http://www.etsi.org.
[4] ISO/IEC 21481: Information technology Telecommunications and information exchange
between systems Near Field Communication Interface and Protocol -2 (NFCIP-2). January
2005.
[5] Ecma International: Standard ECMA-352, Near Field Communication Interface and
Protocol -2 (NFCIP-2), December 2003, URL: http://www.ecmainternational.
org/publications/files/ECMA-ST/Ecma-352.pdf.
[6] ETSI TS 102 312, V1.1.1: Electromagnetic compatibility and
Radio spectrum Matters (ERM);Normalized Site Attenuation (NSA)
and validation of a fully lined anechoic chamber up to 40 GHz 2004- 05, URL:
http://www.etsi.org.
[7] ISO/IEC 14443: Identification cards - Contactless integrated circuit cards - Proximity
cards. 2001, URL: www.iso.ch.
[8] ISO/IEC 15693: Identification cards - Contactless integrated circuit cards - Vicinity cards
[9] www.google.com
[10]www.nfcfouram.com
[11]www.nfcworld.com

Weitere ähnliche Inhalte

Was ist angesagt?

Near field communication
Near field communicationNear field communication
Near field communicationNithin Krishna
 
Near field communication
Near field communicationNear field communication
Near field communicationNagesh Mishra
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariSandip Murari
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Tejasvi Kurusetti
 
Nfc technology
Nfc  technologyNfc  technology
Nfc technologyDeepak Raj
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) ADITYA GUPTA
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationYesha Kava
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirMohammed Mudassir
 
NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities NFC Forum
 
Near field communication
Near field communicationNear field communication
Near field communicationJwal Dakwala
 

Was ist angesagt? (20)

Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
Nfc in android
Nfc in androidNfc in android
Nfc in android
 
NFC
NFCNFC
NFC
 
NFC tech
NFC techNFC tech
NFC tech
 
Near field communication
Near field communicationNear field communication
Near field communication
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
 
Webinar on Insider's Insight into NFC
Webinar on Insider's Insight into NFCWebinar on Insider's Insight into NFC
Webinar on Insider's Insight into NFC
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc technology
Nfc  technologyNfc  technology
Nfc technology
 
Nfc
NfcNfc
Nfc
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC) NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed Mudassir
 
NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 

Andere mochten auch

RFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTRFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTCPqD
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)ADARSH KUMAR
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...ST_World
 
NFC Technology
NFC TechnologyNFC Technology
NFC TechnologyNeha Singh
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
Trf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparisonTrf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparisonHà Thanh
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Lp 2010 operation-theory
Lp 2010 operation-theoryLp 2010 operation-theory
Lp 2010 operation-theoryNguyen Duc Anh
 
Near Field Communication & Android
Near Field Communication & AndroidNear Field Communication & Android
Near Field Communication & Androidromemore
 
Ask Contactless Terminals
Ask Contactless TerminalsAsk Contactless Terminals
Ask Contactless Terminalsclaren65
 
Contactless (Proximity) Smartcards
Contactless (Proximity) SmartcardsContactless (Proximity) Smartcards
Contactless (Proximity) SmartcardsAnshuman Sinha
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primeramsanjeev
 
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationNeed NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationHamed M. Sanogo
 

Andere mochten auch (20)

RFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTRFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoT
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)
 
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...Track 4   session 5 - st dev con 2016 - simplifying the setup and use of iot ...
Track 4 session 5 - st dev con 2016 - simplifying the setup and use of iot ...
 
Nfc
NfcNfc
Nfc
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
wireless communication
wireless communicationwireless communication
wireless communication
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Trf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparisonTrf7960 and trf7970 a comparison
Trf7960 and trf7970 a comparison
 
NFC- Standards and Security
NFC- Standards and SecurityNFC- Standards and Security
NFC- Standards and Security
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Lp 2010 operation-theory
Lp 2010 operation-theoryLp 2010 operation-theory
Lp 2010 operation-theory
 
Rfid簡報
Rfid簡報Rfid簡報
Rfid簡報
 
Near Field Communication & Android
Near Field Communication & AndroidNear Field Communication & Android
Near Field Communication & Android
 
Ask Contactless Terminals
Ask Contactless TerminalsAsk Contactless Terminals
Ask Contactless Terminals
 
Contactless (Proximity) Smartcards
Contactless (Proximity) SmartcardsContactless (Proximity) Smartcards
Contactless (Proximity) Smartcards
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primer
 
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of InnovationNeed NFC RFID-Tomorrow Is Today in This Constant State of Innovation
Need NFC RFID-Tomorrow Is Today in This Constant State of Innovation
 

Ähnlich wie Nfc technology

NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY IJCI JOURNAL
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESIRJET Journal
 
Near field communication
Near field communicationNear field communication
Near field communicationVaibhav Chandak
 
Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONPrandeep Shekhawat
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationAman Kumar Dutt
 
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPENFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPEIJCI JOURNAL
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)GHADA SALEH
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)Aditya Singh
 
Near field communication
Near field communicationNear field communication
Near field communicationanshu kumari
 
NFC: Connect, Transact, and Charge
NFC: Connect, Transact, and ChargeNFC: Connect, Transact, and Charge
NFC: Connect, Transact, and ChargeNFC Forum
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfSibenConor
 
Near field communication
Near field communicationNear field communication
Near field communicationBindu U
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)Bharat Kachhwaha
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full PresentationDILIN RAJ DS
 

Ähnlich wie Nfc technology (20)

Nfc
NfcNfc
Nfc
 
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
Nfc Nfc
Nfc
 
Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATION
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
 
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPENFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC: Connect, Transact, and Charge
NFC: Connect, Transact, and ChargeNFC: Connect, Transact, and Charge
NFC: Connect, Transact, and Charge
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdf
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Nfc technology

  • 1. Gujarat Technological University SITARAMBHAI NARANJI PATEL INSTITUTE OF TECHNOLOGY & RESEARCH CENTRE, UMRAKH Computer Science & Engineering Department SEMINAR REPORT ON NFC TECHNOLOGY In Partial Fulfillment for the Award of Bachelor of Engineering In Computer Science & Engineering SUBMITTED BY Pandya Kinjal D UNDER THE GUIDANCE OF Prof .Bhavesh Patel Year 2013-14
  • 2. Gujarat Technological University SITARAMBHAI NARANJI PATEL INSTITUTE OF TECHNOLOGY & RESEARCH CENTRE, UMRAKH Computer Science & Engineering Department Certificate This is to certify that the Seminar report entitled “NFC Technology” which is being submitted by Kinjal Pandya(110490131030 ) for the partial fulfillment of the award of the degree “Bachelor of Engineering (Computer Science & Engineering)” of “Gujarat Technological University, Ahmedabad” is a record of the candidates own work carried out by him/her under my supervision and guidance. The matter embodied in this report has not been submitted for the award of any other degree. Date: Guide H.O.D Prof.Bhavesh Patel Prof. Dhaval A. Jadhav
  • 3. NFC technolgy SNPIT & RC,UMRAKH Acknowledgement It gives me a great sense of pleasure to present the B.E Seminar Prof.Bhavesh Patel for his constant support and guidance throughout the course of our work. His sincerity, thoroughness and perseverance have been a constant source of inspiration for me. It is only his cognizant efforts that mine endeavour have seen light of the day. I also do not like to miss the opportunity to acknowledge the contribution of all dignitary Staff-members of SNPIT&RC for their kind assistance and cooperation during the development of our Seminar report. Last but not the least, I acknowledge my friends for their contribution in the completion of the seminar report. Apart from the efforts of me, the success of this project depends largely on the encouragement and guidelines of many others. I take this opportunity to express my gratitude to the people who have been instrumental in the successful completion of this report. Kinjal Pandya (110490131030)
  • 4. NFC technolgy SNPIT & RC,UMRAKH Abstract Near Field Communication Technology NFC is one of the latest wireless communication technologies. As a short-range wireless connectivity technology, NFC offers safe — yet simple and intuitive — communication between electronic devices. Users of NFC-enabled devices can simply point or touch their devices to other NFC-enabled elements in the environment to communicate with them, making application and data usage easy and convenient. With NFC technology, communication occurs when an NFC-compatible device is brought within a few centimeters of another NFC device or an NFC tag. The big advantage of the short transmission range is that it inhibits eavesdropping on NFC-enabled transactions. NFC technology opens up exciting new usage scenarios for mobile devices. Keywords: NFC Modes, NFC and RFID, NFC over Bluetooth, Security Issues, Protection measure
  • 5. NFC technolgy SNPIT & RC,UMRAKH INDEX NO CONTENTS PAGE NO Abstract 1. Introduction 1 2 Standards and Compatibility 3 3 Near Field & Far Field 4 4 NFC Technical Architecture 5 5 . Technology Overview 9 6 Unique Feature 16 7 Operating Mode 17 8 Comparison with other Technologies 18 9 Security Aspects 21 10 User and Application 27 11 Future Application 28 12 Conclusion 29 13 Bibliography 30
  • 6. NFC technology SNPIT & RC,UMRAKH Page 1 1.INTRODUCTION Near Field Communication (NFC) is a technology for contactless short-range communication. Based on the Radio Frequency Identification (RFID), it uses magnetic field induction to enable communication between electronic devices. The number of short-range applications for NFC technology is growing continuously, appearing in all areas of life. Especially the use in conjunction with mobile phones offers great opportunities. One of the main goals of NFC technology has been to make the benefits of short-range contactless communications available to consumers globally. The existing radio frequency (RF) technology base has so far been driven by various business needs, such as logistics and item tracking. While the technology behind NFC is found in existing applications, there has been a shift in focus — most notably, in how the technology is used and what it offers to consumers. With just a point or a touch, NFC enables effortless use of the devices and gadgets we use daily. Here are some examples of what a user can do with an NFC mobile phone in an NFC-enabled environment:  Download music or video from a smart poster.  Exchange business cards with another phone.  Pay bus or train fare.  Print an image on a printer.  Use a point-of-sale terminal to pay for a purchase, the same way as with a standard contactless credit card.  Pair two Bluetooth devices.  An NFC-enabled phone functions much like standard contactless smart cards that are used worldwide in credit cards and in tickets for public transit systems. Once an application, such as a credit card application, has been securely provisioned to the NFC-enabled phone, the customer can pay by simply waving the phone at a point-of- sale reader. The NFC phone also offer enhanced security, enabling the user to protect the secure applications through the phone's user interface features.
  • 7. NFC technology SNPIT & RC,UMRAKH Page 2
  • 8. NFC technology SNPIT & RC,UMRAKH Page 3 2.Standards and Compatibility Near Field Communication is an open platform technology, developed by Philips and Sony. NFC, described by NFCIP-1 (Near Field Communication Interface and Protocol 1), is standardized in ISO 18092 [1], ECMA 340[2] as well as in ETSI TS 102 190[3]. These standards specify the basic capabilities, such as the transfer speeds, the bit encoding schemes, modulation, the frame architecture, and the transport protocol. Furthermore, the active and passive NFC modes are described and the conditions that are required to prevent collisions during initialization. Todays NFC devices do not only implement NFCIP-1, but also NFCIP-2, which is defined in ISO 21481 [4], ECMA 352 [5] and ETSI TS 102 312[6]. NFCIP-2 allows for selecting one of three operating modes: • NFC data transfer (NFCIP-1), • proximity coupling device (PCD), defined in ISO 14443 [7], and • vicinity coupling device (VCD), defined in ISO 15693 [8]. NFC devices have to provide these three functions in order to be compatible with the main international standards for smartcard interoperability, ISO 14443 (proximity cards, e.g. Philip’s Mifare), ISO 15693 (vicinity cards) and to Sonys FeliCa contactless smart card system. Hence, as a combination of smartcard and contactless interconnection technologies, NFC is compatible with today’s field proven RFID-technology. That means, it is providing compatibility with the millions of contactless smartcards and scanners that already exist worldwide.
  • 9. NFC technology SNPIT & RC,UMRAKH Page 4 3. NEAR FIELD AND FAR FIELD The terms ―far field‖ and ―near field‖ describe the fields around an antenna or, more generally, any electromagnetic-radiation source .The names imply that two regions with a boundary between them exist around an antenna. Actually, as many as three regions and two boundaries exist. These boundaries are not fixed in space. Instead, the boundaries move closer to or farther from an antenna, depending on both the radiation frequency and the amount of error an application can tolerate. To talk about these quantities, we need a way to describe these regions and boundaries.A brief scan of reference literature yields the terminology in Figure 1. The terms apply to the two- and three-region models.
  • 10. NFC technology SNPIT & RC,UMRAKH Page 5 4.NFC Technical Architecture  RF Layer a) Analog Specification:  Defines the radio frequency characteristics of an NFC Forum device.e.g. shape and strength of RF fields.  Determines the operating range of devices. b)Digital Protocol Specification:  Implementation Specification for digital aspect of ISO/IEC 18092 & ISO/IEC 14443.  Define the building block for the communication.
  • 11. NFC technology SNPIT & RC,UMRAKH Page 6  Mode Switch a) NFC Activities Specification:  Defines the activities required to set up communication in an interoperable manner, based on the building blocks of the digital protocol specification..e.g., polling cycles, when to perform collision detection.  Reader /Writer Mode a)NFC Data Exchange Format(NDEF):  Message coding format used by NFC Referance Applications.  Allows multiple NDEF message.  Allows messages to be divide in to chunk. b)Record Type Defination(RTD):  Define how to construct records in NDEF messages.  Record may contain other records.  Each record has a type,indicating what is contain.  Record type are extensiable-they may be defined by NFC fourm specification(reference applications)or by other bodies(using domain name).
  • 12. NFC technology SNPIT & RC,UMRAKH Page 7 c)Type 1-4 Tag Operation  Define how to read and write NDEF data from/to a tag.  Type 1 tag: Type 1 Tags are cost effective and ideal for many NFC applications.  Based on ISO-14443A standard  Read and rewrite capable; also users can configure the tag to be only read.  96 bytes of memory, expandable up to 2 kB  Communication speed 106 kbits/s  No data collision protection  Type 2 tag: Type 2 Tags are similar to Type 1 Tags and are derived from the NXP/Philips MIFARE Ultralight tag.  Based on ISO-14443A standard  Read and rewrite capable; also users can configure the tag to be read-only  96 bytes of memory, expandable up to 2 kB  Communication speed 106 kbits/s  Anticollision support  Compatible produts available in the market — NXP MIFARE Ultralight  Type 3 tag: Type 3 Tags are derived from the nonsecure parts of Sony FeliCa tags. These tags are costlier than Types 1 and 2.  Based on the Japanese Industrial Standard (JIS) X 6319-4
  • 13. NFC technology SNPIT & RC,UMRAKH Page 8  Preconfigured at manufacture to be either read and rewritable, or read-only  Variable memory, up to 1 MB per service  Supports two communication speeds: 212 or 424 kbits/s  Anticollision support  Compatible products available in the market Sony FeliCa  Type 4 tag: Type 4 Tags are similar to Type 1 Tags and are derived from the NXP DESFire tag.  Based on ISO-14443A standard  Preconfigured at manufacture to be either read and rewritable, or read-only  Variable memory, up to 32 kB per service  Supports three different communication speeds: 106, 212, or 424 kbits/s  Anticollision support  Compatible products available in the market NXP DESFire, SmartMX-JCOP  Peer to Peer Mode
  • 14. NFC technology SNPIT & RC,UMRAKH Page 9 a)Logical Link Control Protocol(LLCP):  Link activication,supervision,Deactivication  Asynchronuns balanced mode  Protocol Multiplication  Connectionless Transport  Connection oriented Transport. b)Simple NDEF Exchange Protocol(SNEP):  Protocol to allow the exchange of NDEF messages in peer mode.  Analougs to tag operation specification. C)Protocol Binding  Provides the standard binding (e.g. Port Number) to NFC forum register protocol. Allow interoperable use of register Protocols.
  • 15. NFC technology SNPIT & RC,UMRAKH Page 10 5. Technology Overview NFC operates in the standard, globally available 13.56MHz frequency band. Possible supported data transfer rates are 106, 212 and 424 kbps and there is potential for higher data rates. The technology has been designed for communications up to a distance of 20 cm, but typically it is used within less than 10 cm. This short range is not a disadvantage, since it aggravates eavesdropping. ESSENTIAL SPECIFICATIONS:  Like ISO/IEC 14443, NFC communicates via magnetic field induction, where two loop antennas are located within each other’s near field, effectively forming an air-core transformer. It operates within the globally available and unlicensed radio frequency ISM band of 13.56 MHz. Most of the RF energy is concentrated in the allowed 14 kHz bandwidth range, but the full spectral envelope may be as wide as 1.8 MHz when using the ASK modulation.  Working distance with compact standard antennas: up to 20 cm  Supported data rates: 106, 212, 424 or 848 kbit/s 5.1 Communication Modes: Active and Passive The NFC interface can operate in two different modes: active and passive. An active device generates its own radio frequency (RF) field, whereas a device in passive mode has to use inductive coupling to transmit data. For battery-powered devices, like mobile phones, it is better to act in passive mode. In contrast to the active mode, no internal power source is required. In passive mode, a device can be powered by the RF field of an active NFC device and transfers data using load modulation. Hence, the protocol allows for card emulation, e.g., used for ticketing applications, even when the mobile phone is turned off. This yields to two possible cases, which are described in Table 5.1. The communication between two active devices case is called active communication mode, whereas the communication between an active and a passive device is called passive communication mode.
  • 16. NFC technology SNPIT & RC,UMRAKH Page 11 Communication Mode Description Active Two active devices communicate with each other.Each device has to generate its own RF field,if it wants to send data. The RF field is alternately generated by one of the two devices. Passive In this mode the communication takes place between an active and a passive device. The passive device has no battery and uses the RF field generated by the active device. Table 5.1: Communication Configurations In general, at most two devices communicate with each other at the same time. However, as defined in [2], §11.2.2.3, in passive mode the initiator (see Section 3.3) is able to communicate with multiple targets. This is realized by a time slot method, which is used to perform a Single Device Detection (SDD). The maximal number of time slots is limited to 16. A target responds in a random chosen time slot that may lead to collision with the response of another target. In order to reduce the collisions, a target may ignore a polling request set out by the initiator. If the initiator receives no response, it has to send the polling request again. 5.2 Coding and Modulation The distinction between active and passive devices specifies the way data is transmitted. Passive devices encode data always with Manchester coding and a 10%ASK1. Instead, for active devices one distinguishes between the modified Miller coding with 100% modulation if the data rate is 106 kbps, and the Manchester coding using a modulation ratio of 10% if the data rate is greater than 106 kbps. As we will discuss later the modulation ratio, defined in [1] is of high importance for the security of the NFC data transfer.
  • 17. NFC technology SNPIT & RC,UMRAKH Page 12 Active Device Passive Device 106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK 212 kBaud Manchester, 10% ASK Manchester, 10% ASK 424 kBaud Manchester, 10% ASK Manchester, 10% ASK Table 5.2: Coding and Modulation at different transfer speeds [10] NFC devices are able to receive and transmit data at the same time. Thus, they need to check the radio frequency field and can detect a collision if the received signal does not match with the transmitted signal.
  • 18. NFC technology SNPIT & RC,UMRAKH Page 13 5.2.1 Manchester Code The Manchester coding depends on two possible transitions at the midpoint of a period. A low-to-high transition expresses a 0 bit, whereas a high-to-low transition stands for a 1 bit. Consequently, in the middle of each bit period there is always a transition. Transitions at the start of a period are not considered. Figure 5.1: Manchester Code 5.2.2 Modified Miller Code The Modified Miller bit coding defines ONE and ZERO by the position of a pulse during one bit period. The pulse is a transition from HIGH to LOW, followed by a period of LOW, followed by a transition to HIGH. The bit representation is illustrated in Figure 14. For a ONE the pulse shall occur in the second half of the bit period; the transition from HIGH to LOW shall be in the middle of the bit period. For a ZERO a pulse shall occur at the beginning of the bit period with the following exception. In case a ZERO bit follows a ONE bit, no pulse shall occur during this ZERO. Figure 5.2: Modified Miller Code
  • 19. NFC technology SNPIT & RC,UMRAKH Page 14 5.3 Initiator and Target Furthermore, it is important to observe the role allocation of initiator and target. The initiator is the one who wishes to communicate and starts the communication. The target receives the initiator’s communication request and sends back a reply. This concept prevents the target from sending any data without first receiving a message. Regarding the passive communication mode, the passive device acts always as NFC target. Here the active device is the initiator, responsible for generating the radio field. In the case of an active configuration in which the RF field is alternately generated, the roles of initiator and target are strictly assigned by the one who starts the communication. By default all devices are NFC targets, and only act as NFC initiator device if it is required by the application. In the case of two passive devices communication is not possible (see Table 3.3). Initiator Target Active Possible Possible Passive Not Possible Possible Table 5.3: Possible Combinations Active/Passive with Initiator/Target ([9]) 5.4 Collision Avoidance Usually misunderstandings are rather rare, since the devices have to be placed in direct proximity. The protocol proceeds from the principle: listen before talk. If the initiator wants to communicate, first, it has to make sure that there is no external RF field, in order not to disturb any other NFC communication. It has to wait silently as long as another RF field is detected, before it can start the communication, after an accurately defined guard-time ([2], §11.1). If the case occurs that two or more targets answer at exactly the same time, a collision will be detected by the initiator.
  • 20. NFC technology SNPIT & RC,UMRAKH Page 15 5.5 General Protocol flow As shown in Figure 5.3 the general protocol flow can be divided into the initialization and transport protocol. The initialization comprises the collision avoidance and selection of targets, where the initiator determines the communication mode (active or passive) and chooses the transfer speed. As defined in [2], §12, the transport protocol is divided in three parts: • Activation of the protocol, which includes the Request for Attributes and the Parameter Selection. • The data exchange protocol, and • The deactivation of the protocol including the Deselection and the Release. During one transaction, the mode (active and passive) and the role (initiator and target) does not change until the communication is finished. Though, the data transfer speed may be changed by a parameter change procedure. For further details the reader may refer to the standards [1] or [2].
  • 21. NFC technology SNPIT & RC,UMRAKH Page 16 Figure 5.3: General initialization and transport protocol ([2])
  • 22. NFC technology SNPIT & RC,UMRAKH Page 17 6. UNIQUE FEATURES What makes the communication between the devices so easy is that the NFC protocol provides some features not found in other general-purpose protocols. First of all, it is a very short-range protocol. It supports communication at distances measured in centimeters . The devices have to be literally almost touched to establish the link between them. This has two important consequences: 1) The devices can rely on the protocol to be inherently secured since the devices must be placed very close to each other. It is easy to control whether the two devices communicate by simply placing them next to each other or keeping them apart. 2) The procedure of establishing the protocol is inherently familiar to people: you want something to communicate – touch it. This allows for the establishment of the network connection between the devices be completely automated and happen in a transparent manner. The whole process feels then like if devices recognize each other by touch and connect to each other once touched. Another important feature of this protocol is the support for the passive mode of communication. This is very important for the battery-powered devices since they have to place conservation of the energy as the first priority. The protocol allows such a device, like a mobile phone, to operate in a power-saving mode – the passive mode of NFC communication. This mode does not require both devices to generate the RF field and allows the complete communication to be powered from one side only. Of course, the device itself will still need to be powered internally but it does not have to ―waste‖ the battery on powering the RF communication interface. Also, the protocol can be used easily in conjunction with other protocols to select devices and automate connection set-up. As was demonstrated in the examples of use above, the parameters of other wireless protocols can be exchanged allowing for automated set-up of other, longer-range, connections. The difficulty in using long-range protocols like Bluetooth or Wireless Ethernet is in selecting the correct device out of the multitude of devices in the range and providing the right parameters to the connection. Using NFC the whole procedure is simplified to a mere touch of one device to another.
  • 23. NFC technology SNPIT & RC,UMRAKH Page 18 7.OPERATING MODES OF NFC NFC is a proximity coupling technology closely linked to the standard of proximity smart cards as specified in ISO 14443. NFC Devices are capable of three different operating modes: o PEER-TO-PEER MODE (NFC): This mode is the classic NFC mode, allowing data connection for up to 424 kBit/sec. The electromagnetic properties and the protocol (NFCIP-1) is standardized in ISO 18092 and ECMA 320/340. o READER/WRITER MODE (PCD): NFC devices can be used as a reader/writer for tags and smart cards. In this case the NFC device acts as an initiator and the passive tag is the target. In reader/writer mode data rates of 106 kBit/sec are possible. o TAG EMULATION MODE (PICC): In this mode the NFC device emulates an ISO 14443 smart card or a smart card chip integrated in the mobile devices is connected to the antenna of the NFC module. This is an advantage of NFC technology as already existing reader infrastructures do not need to be replaced. The smart card chip used for tag emulation is also referred to as secure element.
  • 24. NFC technology SNPIT & RC,UMRAKH Page 19 8.Comparison with other Technologies 8.1 NFC and RFID The heritage of earlier standards gives NFC compatibility benefits with existing RFID applications, such as access control or public transport ticketing – it is often possible to operate with old infrastructure, even if the RFID card is replaced with an NFC-enabled mobile phone, for example. This is possible because of NFC’s capability to emulate RFID tags (―card interface mode‖). NFC hardware can include a secure element for improved security in critical applications such as payments. For example, a credit card could be integrated into a mobile phone and used over NFC. NFCIP-1 is an NFC-specific communication mode, defined in the ECMA-340 standard. This mode is intended for peer-to- peer data communication between devices. In this mode, NFC is comparable to other short- range communic Basically, the technologies Radio Frequency Identification and Near Field Communication use the same working standards. However, the essential extension of RFID is the communication mode between two active devices. In addition to contactless smart cards (ISO 14443 [7]), which only support communication between powered devices and passive tags, NFC also provides peer-to-peer communication. Thus, NFC combines the feature to read out and emulate RFID tags, and furthermore, to share data between electronic devices that both have active power.
  • 25. NFC technology SNPIT & RC,UMRAKH Page 20 8.2 Comparison with Bluetooth and Infrared Compared to other short-range communication technologies, which have been integrated into mobile phones, NFC simplifies the way consumer devices interact with one another and obtains faster connections. The problem with infrared, the oldest wireless technology introduced in 1993, is the fact that a direct line of sight is required, which reacts sensitively to external influences such as light and reflecting objects. The significant advantage over Bluetooth is the shorter set-up time. Instead of performing manual configurations to identify the other’s phone, the connection between two NFC devices is established at once (<0,1s). Table 8.1 points out these different capabilities of NFC, Bluetooth and infrared. All these protocols are point-to-point protocols. Bluetooth also supports point-tomultipoint communications. With less than 10 cm, NFC has the shortest range. This provides a degree of security and makes NFC suitable for crowded areas. The data transfer rate of NFC (424 kbps) is slower than Bluetooth (721 kbps), but faster than infrared (115 kbps). In contrast to Bluetooth and infrared NFC is compatible to RFID. .
  • 26. NFC technology SNPIT & RC,UMRAKH Page 21 NFC Benefits of NFC Bluetooth IrDa Network Type Point-to-point Easy set-up, pairing=bringing close Point to multipoint Point to point Range <0.1m Safe, suitable for crowded areas 10m 1m Speed 424 kbps (1Mbpscoming) 721 kbps 115 kbps Set-up time <0.1 s Fast transactions e.g. . for public transport 6 s 0.5 s Modes Active-active, active-passive Reader mode and card-like mode Active-active Active-active Compatible with RF ID Yes Can work with existing infrastructure No No Costs Low Affordable for most devices Moderate Low Table 8.1: NFC compared with Bluetooth and IrDa [12]
  • 27. NFC technology SNPIT & RC,UMRAKH Page 22 9.Security Aspects In this seminar, we want to analyze the security of NFC. In this context two very interesting papers have been published. In [9] Ernst Haselsteiner and Klemens Breits discuss some threats and solution for the security of NFC, and also the paper‖Security Aspects and Prospective Applications of RFID Systems‖ [13] gives some useful information. First of all it should be mentioned that the short communication range of a few centimetres, though it requires conscious user interaction, does not really ensure secure communication. There are different possibilities to attack the Near Field Communication technology. On the one hand the different used devices can be manipulated physically. This may be the removal of a tag from the tagged item or wrapping them in metal foil in order to shield the RF signal. Another aspect is the violation of privacy. If proprietary information is stored on a tag it is important to prevent from unauthorized read and write access. As outlined in [13] read-only tags are secure against an unauthorized write access. In the case of rewritable tags we have to assume that attackers may have mobile readers and the appropriate software which enable unauthorized read and write access if the reader distance is normal. In this work we want to focus on attacks with regard to the communication between two devices. For detecting errors, NFC uses the cyclic redundancy check (CRC). This method allows devices to check whether the received data has been corrupted. In the following, we will consider different possible types of attacks on the NFC communication. For most of these attacks there are countermeasures in order to avoid or at least reduce the threats.
  • 28. NFC technology SNPIT & RC,UMRAKH Page 23 9.1 Eavesdropping NFC offers no protection against eavesdropping. RF waves for the wireless data transfer with an antenna enables attackers to pick up the transmitted Monitoring data. In practice a malicious person would have to keep a longer distance in order not to get noticed. The short range between initiator and target for a successful communication is no significant problem, since attackers are not bound by the same transmission limits. Consequently the maximum distance for a normal read sequence can be exceeded. The question how close an attacker has to be located to retrieve an usable RF signal is difficult to answer. As listed in [9], this is depending on a ‖huge‖ number of parameters, such as:  RF filed characteristic of the given sender device (i.e., antenna geometry, shielding effect of the case, the PCB, the environment)  Characteristic of the attacker’s antenna (i.e., antenna geometry, possibility to change the position in all 3 dimensions)  Quality of the attacker’s receiver  Quality of the attacker’s RF signal decoder  Setup of the location where the attack is performed (e.g., barriers like walls or metal, noise floor level Power sent out by the NFC device. Furthermore, eavesdropping is extremely affected by the communication mode. That’s because, based on the active or passive mode, the transferred data is coded and modulated differently (see Section 3.2). If data is transfered with stronger modulation it can be attacked easier. Thus, a passive device, which does not generate it’s own RF field is much harder to attack, than an active device. In order to let the reader presume the risk resulting from eavesdropping, there are given rough distances in 9: ‖When a device is sending data in active mode, eavesdropping can be done up to a distance of about 10 m, whereas when the 0 sending device is in passive mode, this distance is significantly reduced to about 1 m.‖
  • 29. NFC technology SNPIT & RC,UMRAKH Page 24 9.2 Data Destruction An attacker who aspires data destruction intends a corruption of the communication. The effect is that a service is no longer available. Still, the attacker is not able to generate a valid message. Instead of eavesdropping this is not a passive attack. This attack is relatively easy to realize. One possibility to disturb the signal is the usage of a so called RFID Jammer. There is no way to prevent such an attack, but it is possible to detect it. NFC devices are able to receive and transmit data at the same time. That means, they can check the radio frequency field and will notice the collision. 9.3 Data Modification Unauthorized changing of data, which results in valid messages, is much more complicated and demands a thorough understanding. As we will point out in the following, data modification is possible only under certain conditions. In order to modify the transmitted data an intruder has to concern single bits of the RF signal. As already mentioned in Section 5.2 data is send in different ways. The feasibility of this attack, that means if it is possible to change a bit of value 0 to 1 or the other way around, is subject to the strength of the amplitude modulation. If 100% modulation is used, it is possible to eliminate a pause of the RF signal, but not to generate a pause where no pause has been. This would demand an impracticable exact overlapping of the attackers signal with the original signal at the receiver’s antenna. However, Near Field Communication technology uses modulation of 100% in conjunction with the modified Miller coding which leads to 4 possible cases (see Figure 8.1). The only case, where a bit might be changed by an attacker is, where a 1 is followed by another 1. By filling the pause in two half bit of the RF signal the decoder receives the signal of the third case. Due to the agreement of the preceding bit the decoder would verify a valid one. The another three cases are not susceptible to such an attack.
  • 30. NFC technology SNPIT & RC,UMRAKH Page 25 Bit x-1 Bit x Modification of bit x to x-1 Feasible? 0 0 1 1 0 1 0 1 1 0 1 0 No No No yes Figure 9.1: Bit modification of the Modified Miller Code For NFC, a modulation ratio of 10% is always used together with Manchester coding. In contrast to the 100% modulation, where really no signal is send in a pause, here within a pause the RF signal is e.g. 82% of the level of the full signal. Let’s assume, an attacker may increase the existing RF signal about 18% during the whole session, without being noticed by the decoder. Then, the attacker is able to change a zero to one by increasing the RF signal during the first half of the signal period by another 18%, and also may change a bit of value one to zero by simply stopping to send anything. Regarding the threat in summary: Except for one case, always Manchester coding with 10% ASK is used for NFC data transfer. This represents the best possible conditions for the malicious intention of modifying NFC data (compare Table 3.2). This way of transmitting the data offers a modification attack on all bits. The only exception are active devices transfering data at 106 kbps. In this case the usage of the modified Miller coding with a modulation ratio of 100% accomplishes that only certain bits can be modified.
  • 31. NFC technology SNPIT & RC,UMRAKH Page 26 9.4 Data Insertion This attack can only be implemented by an attacker, if there is enough time to send an inserted message before the real device starts to send his answers. If a collision occurs the data exchange would be stopped at once. In order to prevent such attacks the device should try to answer with no delay. Alternatively, again checking the RF field and also the secure channel can be used to protect against attacks. 9.5 Man-in-the-Middle-Attack In the classical Man-in-the-Middle Attack, two parties which want to talk to each other, called Alice and Bob, are tricked into a three party conversation by an attacker Eve. This is shown in Figure 8.1. Alice Bob Eve Figure 8.1 Man-in-the-Middle Setup Alice and Bob must not be aware of the fact that they are not talking to each other, but that they are both sending and receiving data from Eve. Such a setup is the classical threat in unauthenticated key agreement protocols like Diffie-Hellmann protocol. Alice and Bob want to agree on a secret key, which they then use for a secure channel. However, as Eve is in the middle, it is possible for Eve to establish a key with Alice and another key with Bob. When Alice and Bob later use their key to secure data, Eve is able to eavesdrop on the communication and also to manipulate data being transferred.
  • 32. NFC technology SNPIT & RC,UMRAKH Page 27 How would that work when the link between Alice and Bob is an NFC link? Assuming that Alice uses active mode and Bob would be in passive mode, we have the following situation. Alice generates the RF field and sends data to Bob. In case Eve is close enough, she can eavesdrop the data sent by Alice. Additionally she must actively disturb the transmission of Alice to make sure that Bob doesn’t receive the data. This is possible for Eve, +but this can also be detected by Alice. In case Alice detects the disturbance, Alice can stop the key agreement protocol. Let’s assume Alice does not check for active disturbance and so the protocol can continue. In the next step Eve needs to send data to Bob. That’s already a problem, because the RF field generated by Alice is still there, so Eve has to generate a second RF field. This however, causes two RF fields to be active at the same time. It is practically impossible to perfectly align these two RF fields. Thus, it is practically impossible for Bob to understand data sent by Eve. Because of this and the possibility of Alice to detect the attack much earlier we conclude that in this setup a Man-in-the-Middle attack is practically impossible. The only other possible setup is that Alice uses active mode and Bob uses active mode, too. In this case Alice sends some data to Bob. Eve can list and Eve again must disturb the transmission of Alice to make sure that Bob does not receive the data. At this point Alice could already detect the disturbance done by Eve and stop the protocol. Again, let us assume that Alice does not do this check and the protocol continues. In the next step Eve would need to send data to Bob. At first sight this looks better now, because of the active-active communication Alice has turned off the RF field. Now Eve turns on the RF field and can send the data. The problem here now is that also Alice is listening as she is expecting an answer from Bob. Instead she will receive the data sent by Eve and can again detect a problem in the protocol and stop the protocol. It is impossible in this setup for Eve to send data either to Alice or Bob and making sure that this data is not received by Bob or Alice, respectively. We claim that due to the above given reasons it is practically infeasible to mount a Man-in- the-Middle attack in a real-word scenario.
  • 33. NFC technology SNPIT & RC,UMRAKH Page 28 10.USES AND APPLICATIONS NFC technology is currently mainly aimed at being used with mobile phones. There are three main use cases for NFC:  card emulation: the NFC device behaves like an existing contactless card  reader mode: the NFC device is active and read a passive RFID tag, for example for interactive advertising  P2P mode: two NFC devices are communicating together and exchanging information. Plenty of applications are possible, such as:  Mobile ticketing in public transport — an extension of the existing contactless infrastructure.  Mobile payment — the device acts as a debit/ credit payment card.  Smart poster — the mobile phone is used to read RFID tags on outdoor billboards in order to get info on the move.  Bluetooth pairing — in the future pairing of Bluetooth 2.1 devices with NFC support will be as easy as bringing them close together and accepting the pairing. The process of activating Bluetooth on both sides, searching, waiting, pairing and authorization will be replaced by a simple "touch" of the mobile phones. .
  • 34. NFC technology SNPIT & RC,UMRAKH Page 29 11.FUTURE APPLICATION  Electronic ticketing — airline tickets, concert/event tickets, and others  Electronic money  Travel cards  Identity documents  Mobile commerce  Electronic keys — car keys, house/office keys, hotel room keys, etc.  NFC can be used to configure and initiate other wireless network connections such as Bluetooth , Wi-Fi or Ultra-wideband.  NFC for Health Monitoring in Daily Life .
  • 35. NFC technology SNPIT & RC,UMRAKH Page 30 12. CONCLUSION In summary, Near Field Communication is an efficient technology for communications with short ranges. It offers an intuitive and simple way to transfer data between electronic devices. A significant advantages of this technique is the compatibility with existing RFID infrastructures. Additionally, it would bring benefits to the setup of longer-range wireless technologies, such as Bluetooth ,Wifi . NFC is based on existing contactless infrastructure around the world that is already in use by millions of people on a daily basis. NFC is not a fashionable nice-to-have technology, but actually a technology that makes peoples lives easier – easier to pay for goods and services, easier to use public transport, and easier to share data between devices.
  • 36. NFC technology SNPIT & RC,UMRAKH Page 31 Bibliography [1] ISO/IEC 18092(ECMA-340): Information technology – Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1). First Edition, 2004-04-01. [2] Ecma International: Standard ECMA-340, Near Field Communication Interface and Protocol (NFCIP-1), December 2004, URL: http://www.ecma international.org/publications/standards/Ecma- 340.htm. [3] ETSI TS 102 190 V1.1.1: Near Field Communication (NFC) IP-1; Interface and Protocol (NFCIP-1) 2003-03, URL: http://www.etsi.org. [4] ISO/IEC 21481: Information technology Telecommunications and information exchange between systems Near Field Communication Interface and Protocol -2 (NFCIP-2). January 2005. [5] Ecma International: Standard ECMA-352, Near Field Communication Interface and Protocol -2 (NFCIP-2), December 2003, URL: http://www.ecmainternational. org/publications/files/ECMA-ST/Ecma-352.pdf. [6] ETSI TS 102 312, V1.1.1: Electromagnetic compatibility and Radio spectrum Matters (ERM);Normalized Site Attenuation (NSA) and validation of a fully lined anechoic chamber up to 40 GHz 2004- 05, URL: http://www.etsi.org. [7] ISO/IEC 14443: Identification cards - Contactless integrated circuit cards - Proximity cards. 2001, URL: www.iso.ch. [8] ISO/IEC 15693: Identification cards - Contactless integrated circuit cards - Vicinity cards [9] www.google.com [10]www.nfcfouram.com [11]www.nfcworld.com