2. INTRODUCTION WHAT IS NFC HOW NFC IS WORK STANDARED BLOCK DIAGRAM AND EXPLANATION MODULATION SCHEME COMPARISION WITH BLUETOOTH COMPARE WITH OTHER WIRELESS TECHNOLOGY USES AND APPLICATION THREATS AND COUNTERMEASURES ADVANTAGE& DISADVANTAGE FUTURE DEVICES AND USE CONCLUSION
3. We know that connectivity technology between devices through wireless connection has increase one step ahead. Starting from infra red, Bluetooth, Wi-Fi. Now there is also the new connectivity technology called NFC (Near Field Communication).. NFC is the technologies to make our lives easily
4. Easy to use wireless communication interface for the last few centimeters Easy to use target selection, by simply holding two devices close to each other NFC is as easy as…. … a touch
5. Based on RFID technology at 13.56 MHz of radio spectrum Operating distance typical up to 10 cm Compatible with today’s field proven contactless RFID technology Data exchange rate today up to 424 kilobits/s RFID object 13.56MHz RF Link
6. NFC is based on RFID technology that uses magnetic field induction between electronic devices in close proximity. Two devices to communicate using NFC one device must have an NFC reader/writer one must have an NFC tag. The tag is essentially an integrated circuit containing data, connected to an antenna, that can be read or written by the reader.
7. Passive communication mode: The initiator device provides a carrier field and the target device answers by modulating the existing field. Active communication mode: Both Initiator and target device communicate by alternately generating their own fields.
8. The technology is a simple extension of the ISO/IEC14443 proximity- card standard (contactless card, RFID) that combines the interface of a smartcard and a reader into a single device. An NFC device can communicate with both existing ISO/IEC14443 smartcards and readers, as well as with other NFC devices, and is thereby compatible with contactless infrastructure already in use for public transportation and payment. NFC is primarily aimed at usage in mobile phones. By 2013, one in five phones will have NFC (predicted by Juniper Research). Japan is early adopter of NFC.
9. STATUS CONTROL HOST INTERFACE ANALOG CONTACT 8 BITCIRCUITARY PARALLEL HOST OUTPUT LESS SERIAL INTERFACE DRIVER UART UART SPI FIFO BUFFER
10. The analog circuitry handles the modulation and demodulation of analog signals RF level detector detects the presence of an external RF field at 13.56Mhz UART handles the protocol requirements for the communication schemes FIFO BUFFER allow a fast and convenient data transfer from the host to the UART and vice versa MICROCONTROLLER allows autonomous management of communication both on RF interface and with the host HOST INTERFACES are implemented to full fill different customer requirements
11. Possible supported data transfer rate are 106 Kbps,212Kpbs,424kbps BAUD RATE Active Passive 106Kbps Modified miller 100%,ASK Manchester,10%,ASK 212 Kbps Manchester,10%,ASK Manchester,10%,ASK 424KBps Manchester,10%,ASK Manchester,10%,ASK
12. NFC employs two different coding to transfer data. If an active device transfers data at 106 Kbit/s, a modified miller coding with 100% modulation is used. In all other cases Manchester coding is used with a modulation Manchester code ratio of 10%. NFC devices are able to receive and transmit data at the same time. Thus, they can check for potential collisions if the received signal frequency does not match with the transmitted signals frequency Modified miller code
13. Well, NFC comes to fill a slightly different gap than Bluetooth, so no its not aiming to replace Bluetooth (though it might I would say). Its aim is actually rather than different, and that is to complement Bluetooth and fix everything thats bad about it – i.e. the long discovery / pairing process. contrast to Bluetooth
14. The maximum data transfer rate of NFC (424 Kbit/s) is slower than that of Bluetooth V2.1 (2.1 Mbit/s). NFC requires low power similarly Bluetooth However, when NFC works with an unpowered device (e.g. on a phone that may be turned off, a contactless smart credit card, a smart poster, etc.), the NFC power consumption is greater than that of Bluetooth V4.0 Low Energy.
15. There are currently three main uses of NFC: Card emulation: The NFC device behaveslike an existing contactless card Reader mode: The NFC device is active and reads a passive RFID tag, for example for interactive advertising P2P mode: Two NFC devices communicating together and exchanging information.
16. NFC also allows users toconduct transactions forcontactless, access digitalcontent and connect with anelectronic device only with asingle touch.
17. Smart Key - for mobile local payment payment Peer to Peer communication,NFC Virtual Connector - either directly or by establishing wireless links Low cost solution to distribute info / services -e.g. by passive loops embedded in paper media
18. THREATS Man in the middle attack Eavesdropping data modification COUNTERMEASURES USE SECURE CHANNEL USE ACTIVE-PASSIVE MODE USE106KBPS
19. Very simple to use NFC uses are practically limitless. NFC devices is automatically established quickly NFC particularly suitable for crowded areas Inherently Secure Work with in existing technology
20. Data transfer rate is small compared to blue tooth and other wireless communications No protection in eavesdropping No protection in data modification Relay attack
21. On November 15, 2010 Eric Schmidt announced at the Web 2.0 Summit that the Android will support NFC starting from version 2.3("Gingerbread"). The first Android handset which supports this technology is the Nexus S. On January 25, 2011, Bloomberg published are port stating that Apple was actively pursuing development of a mobile payment system employing NFC. Near Field Communications World stated on March 21, 2011 that Sonim Technologies will add NFC to its XP3300 Force device later this year.
22. NFC is the efficient technologies for communications with short ranges NFC is compatible with existing RFID infrastructures. Current and anticipated applications of NFC include the collection and exchange of information, access controls, contact-less payments and transactions, transport fares, loyalty and coupons data exchange and social media Providing secure channel will avoid the draw backs such as eavesdropping or data modification. . With this flexible technology, the service innovations and applications are limitless.