Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
In This presentation we will go through
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
2. Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
References
3. Near Field Communication is a
short range high frequency
wireless communication
technology. Which enables the
exchange of data between
devices over a distance of up to
10 centimeters.
4. In 2004, NFC Forum was formed by Nokia,
Philips, Sony, to set standards for NFC .
Every NFC enabled device will have “N-
Mark” trademark ,developed by NFC Forum.
In 2006
First mobile phone( nokia 6131) with NFC
released by NOKIA.
In 2010
First android phone SAMSUNG NEXUS S
with NFC support released.
NFC trademark
logo
5. It operates within the globally available and unlicensed radio
frequency band of 13.56 MHZ with a bandwidth of 14 KHZ .
Supported data rates: 106, 212 and 424 Kbit/s .
For two devices (Active/Passive) to communicate using NFC, one
device must have an NFC reader/writer and one must have an
NFC tag
6. 1.Active mode of communication 2.Passive mode of communication
Type 1: Read and rewrite capable
Type 2: Anti collision support, rewritable or read only
Type 3: Data collision protection, high speed, large memory
Type 4: Data collision protection, setting can’t be changed
by user
7.
8.
9. NFC applications can be split into the following three basic categories
Touch and Go
Touch and Confirm
Touch and Connect
10.
11. The communication range of NFC is limited to a few centimeters.
NFC alone does not ensure secure communications.
Applications may use higher-layer cryptographic protocols to
establish a secure channel.
customers, who will need to protect their personal devices and
data with passwords, keypad locks, and anti-virus software.
13. The RF signal for the wireless data transfer can be picked up with
antennas.
The distance from which an attacker is able to eavesdrop the RF
signal depends on numerous parameters.
Eavesdropping
14. It is relatively easy to destroy data by using an RFID jammer.
There is no way currently to prevent such an attack. However, if
NFC devices check the RF field while they are sending, it is
possible to detect attacks.
Data modification:
16. High convenience to the user, because the data exchange is
done by bringing two mobiles together.
Reduces cost of electronic issuance .
Secure communication.
No special software.
No manual configuration and settings.
No search and pair procedure.
17. It is slow when compared to Bluetooth.
Power consumption is comparatively more .
The system has the limitation that it can be operated only
with devices under a short range i.e around 10 cm.
The data transfer rate is very less at about 106kbps, 212
kbps and 424kbps.
18. Mobile handsets are the primary target for NFC and soon NFC
will be implemented in most handheld devices. Even though
NFC have the shortest range among radio frequency
technologies, combining them with existing technologies like
Bluetooth or Infrared can increase its range of applications.