2. Introduction
• NFC (Near Field Communication)
is a short-range high frequency wireless
communication technology.
• It provides intuitive, simple,safe and secure
communication between electronic devices.
• “Contactless technology” : short distance
communication
NFC trademark
logo
3. Basic Features:
• Communication between
two NFC enabled handsets is
started and completed with a
simple proximity wave or
touch of the two devices to
each other at a distance
of about 4 cm.
• The communication can also
imply in the form of an NFC
Tag.
4. to share and
receive
information
and to make
fast and secure
mobile
payments
interact with
other NFC
enabled
devices
• NFC enabled mobile handsets enable
users:
5. • NFC devices operates at 13.56 MHz
• It can transfer data at up to 424 Kbits/second
• The technology is built up on the existing RFID
(Radio Frequency Identification) standard.
• RFID is an auto Identification method that
transmits the ID of an object(Tag) wirelessly by
radio waves (to Readers) .
6. Working
• It works on the simple principle of inductive
coupling.
• When current flows through the NFC chip, a
magnetic field is generated.
• This field induces electricity within the second
device or an NFC tag.
• The second device generates a magnetic field of
its own which is then detected by the first device.
• It registers this RF field and decodes it.
7. NFC allows for a simple data exchange between two devices
by way of physical touch.
NFC requires an initiator and a target.
Initiator generates a Radio frequency Field(RF) with a range
of about 4 cm.
The target picks up the RF field and receives the data it
contains.
8. • Communication is also possible between an NFC device
and an unpowered NFC chip, called a “tag”.
• NFC tags contain data and are typically read-only
• NFC tags are traditionally embedded into pieces of card,
paper or flat pieces of plastic.
• N-Mark is used to identify the position over an NFC tag
where the consumer can align an NFC-enabled device
to initiate an NFC interaction.
NFC Tags:
9. Reader/writer mode
It simply read information stored on inexpensive NFC
tags embedded in smart posters and displays
Peer-to-Peer mode
Two NFC devices can exchange data. For example you
can exchange data such as virtual business cards or
digital photos.
Card Emulation mode
Card emulation mode enables NFC-enabled devices to
act like smart card to make payments.
10. NFC VS BLUETOOTH
Security
• Distance
• Set-up time
• Power
• Frequency
• Consumer
experience
NFC
• ~10 cm
• <0.1 sec
• <15 mA
• 13.56 MHz
• Touch, wave,
simply
connect
Bluetooth
• ~1 m
• <6 sec
• <15mA
• 2.4-2.5GHz
• Configuration
needed
11. • Intuitive
• Versatile
• Open and standard
based
• Inherently secure
• Technology-
enabling
• Interoperable
• Security-ready
Benefits:
12. Benefits
Intuitive: NFC interactions require no more than a simple touch
Versatile: NFC is ideally suited to the broadest range of industries,
environments, and uses
Open and standards-based: The underlying layers of NFC
technology follow universally implemented ISO, ECMA,
and ETSI standards
Technology-enabling: NFC facilitates fast and simple setup of
wireless technologies, such as Bluetooth, WiFi, etc.)
Inherently secure: NFC transmissions are short range (from a touch
to a few centimeters)
Interoperable: NFC works with existing contactless card
technologies
• Security-ready: NFC has built-in capabilities to support secure
applications
14. • NFC Enables Electronic Door Locks
• NFC and Healthcare: NFC-enabled devices with their simple
instructions (“just touch”), allow patients of every age to
monitor their health status.
• Tap & pay for movie tickets –adopted by PVR
15. NFC enabled desktop with wireless charging
• ASUS M70AD is world’s first NFC-enabled Desktop
• Charger tray supports Qi inductive power standard
even when computer is shut down
16. Security Aspects:
• Eavesdropping: The RF signal for the wireless data
transfer can be picked up with antennas. An attacker
can typically eavesdrop within 10m and 1m for active
devices
• Data modification: It is easy to destroy data by using
a jammer.
• Relay attack: Forward request of the reader to the victim
and relay back its answer to the reader in real time.
17. Solutions:
• NFC specific key agreement
Set of keys unique for NFC transactions
Therefore reduces the computational requirements significantly
• Secure Channel for NFC
Establishing a secure channel between two NFC devices is clearly the best
approach to protect against eavesdropping and any kind of data modification
attack.
A standard key agreement protocol like Diffie-Hellmann Elliptic Curves could be
applied to establish a shared secret between two devices
• Chip Modification
The NFC chip can be modified to constantly check its RF field while it is
transmitting data.
The power required to attack is much larger than the power of the NFC signal.
Hence the chip will be able to identify an attacking signal instantly
18. 1983
• The first patent to be associated with the abbreviation RFID was
granted to Charles Walton.
2004
• Nokia, Philips and Sony established the Near Field Communication
(NFC) Forum.
2011
• First mobile phone( Nokia 6131) with NFC released by NOKIA.
2010
• Samsung Nexus S: First Android NFC phone.
2011
• NFC support becomes part of the Symbian mobile operating system
and Blackberry OS.
History of NFC
19.
20. Conclusion:
• NFC improves the user experience of mobile services and
makes service initiation more convenient.
• Customers will benefit by faster checkouts, shorter and
quicker lines and the eventual elimination of needing to
carry a wallet at all.
• NFC smart phones will replace credit cards, social
security cards, birth certificates, licenses, and even
passports.
• Users will be able to purchase tickets online and just
walk past a scanner without slowing down or the need
to keep track of tickets.