SlideShare a Scribd company logo
1 of 17
By
G.Satya Machindra
(19891A0579)
CONTENTS
• WHAT IS NFC
• Evolution of NFC Technology
• How NFC Works
• NFC Communication Modes
• NFC Uses
• NFC Applications
• Comparison with Bluetooth
• NFC issues
• NFC security
• Conclusion and Future Scope
WHAT IS NFC
• NFC, is one of the latest wireless communication technologies. As a short-
range wireless connectivity technology.
• NFC offers safe yet simple communication between electronic devices.It
enables exchange of data between devices over a distance of 4 cm or less.
• NFC operates at 13.56 MHz and rates ranging from 106 kbit/s to 848 kbit/s.
Evolution of NFC
• In 2006, the Nokia 6131 phone was the first device to provide NFC
functionality.
• In 2010, the Samsung NEXUS S became the first Android with NFC support.
• In 2011, RIM became the first company certified by MasterCard to provide the
PayPass functionality on their devices worldwide.
How NFC works
• NFC is based on RFID (Radio-Frequency IDentification) technology that
uses magnetic field induction between electronic devices in close
proximity.
• For two devices to communicate using NFC, one device must have an NFC
reader/writer and one must have an NFC tag.
• The tag is essentially an integrated circuit containing data, connected to an
antenna, that can be read or written by the reader.
NFC Communication Modes
• Passive Communication Mode: The Initiator device provides a carrier field
and the target device answers by modulating the existing field. In this
mode, the Target device may draw its operating power from the Initiator-
provided electromagnetic field, thus making the Target device
a transponder.
• Active Communication Mode: Both Initiator and Target device
communicate by alternately generating their own fields. A device
deactivates its RF field while it is waiting for data. In this mode, both
devices typically have power supplies.
• A device that can generate its own radio frequency field is called an active
device whereas a device which needs to use inductive coupling for data
transmission is called a passive device.
• Active communication mode occurs when the operation is
conducted between two active devices and passive communication mode
happens when the operation happens between an active and a passive device.
NFC employs two different coding to
transfer data:
• NFC employs two different coding to transfer data. If an active device
transfers data at 106 kbit/s
• In all other cases Manchester coding is used with a modulation ratio of
10%.
• NFC devices are able to receive and transmit data at the same time.
• Thus, they need to check the radio frequency field and can detect a
collision if the received signal matches the transmitted signal's modulated
frequency band.
NFC Uses , There are currently three
main uses of NFC:
• Card emulation: The NFC device behaves like an existing contactless .
• cardReader mode: The NFC device is active and reads a passive RFID tag,
for example for interactive advertising.
• P2P mode: Two NFC devices communicating together and exchanging
information.
NFC Applications
• Mobile ticketing in public transport: an extension of the existing
contactless infrastructure, such as Mobile Phone Boarding Pass.
• Mobile paymentSmart poster: the mobile phone is used to read RFID tags
on outdoor billboards.
• Bluetooth pairing: in the future, pairing of Bluetooth 2.1 devices with NFC
support will be as easy as bringing them close together and accepting the
pairing.
Comparison with Bluetooth
• NFC and Bluetooth are both short-range communication technologies
which are integrated into mobile phones.
• To avoid a complicated configuration process, NFC can be used for the set-
up of wireless technologies, such as Bluetooth.
• NFC sets up faster than standard Bluetooth, but is not much faster
than Bluetooth low energy.
• With NFC, instead of performing manual configurations to identify devices,
the connection between two NFC devices is automatically established
quickly — in less than a tenth of a second.
NFC security issues
• One of the most important and considerable aspects of Near Field
Communication is the security issue.
• However this type of short range wireless communication which is limited to
few centimeters and the technology is user aware interaction but still this
awareness does not guarantee a safe and secure communication, because there
may be are different types of threads toward NFC communication.
• One of the major threads is that the communicator
device has been manipulated physically where this can be done in different ways
as follows;
• By removing a tag from the tagged device
• By wrapping the tag of the tagged device in a metal foil to shield the RF signal
• By many other possible physical manipulation
NFC security
• NFC Specific key Agreement : Along with standard key agreement mechanism in
NFC protocol, there is a possibility to implement an NFC specific key agreement
where this agreement the computational requirement and theoretically
increases the communication security.
• This specific key agreement is not part of ISO standard and it just works with
100% modulation.
• During sending random bits of 0 or 1, each single device listens to the RF
field. The scheme is so that if the devices send a zero, the sum of the signals will
become zero and if both of them send 1’s then the sum of the signals will be the
doubleRF signal.
Conclusion
• NFC is a new technology developed over RFID, in a way that it consists of an
interface and protocol are based on RFID which makes NFC device to a part of
this standard and compatible with existing RFID technology.
• It enables a contactless, wireless communication between portable devices
close to each other less than 4 centimeters touching them physically.
• NFC supports data rate of 106 kbps for the minimum and 212
kbps and 424kbps at the maximum.
Future scope
• As the future work, it seems that in many applications of NFC, the ASK
modulation technique is applied.
• Therefore this could be suggested that by using MATLAB, the other
techniques can be applied in the model of NFC .
• So it is possible to think on and developing new application that still does not
exist. Beside as the applications are growing then security issue comes to
importance first and still there could be new techniques to be defined in order to
accessing the attackers to the ongoing information between communicating
parties.
THANK YOU

More Related Content

What's hot

optical space division multiplexing
optical space division multiplexingoptical space division multiplexing
optical space division multiplexingmohammedalimahdi
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Javed Khan
 
Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).MANIRAFASHA Cedrick
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt finalLohit Dalal
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 

What's hot (20)

4G Technology
4G Technology4G Technology
4G Technology
 
optical space division multiplexing
optical space division multiplexingoptical space division multiplexing
optical space division multiplexing
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)
 
Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).Evolution of wireless communication systems (1 G to 5G).
Evolution of wireless communication systems (1 G to 5G).
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Wearable system introduction (2)
Wearable system   introduction (2)Wearable system   introduction (2)
Wearable system introduction (2)
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
3g & 4g technology
3g & 4g technology3g & 4g technology
3g & 4g technology
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
6lowpan introduction
6lowpan introduction6lowpan introduction
6lowpan introduction
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Ch5
Ch5Ch5
Ch5
 

Similar to Everything You Need to Know About NFC Technology and Its Uses

Similar to Everything You Need to Know About NFC Technology and Its Uses (20)

Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
 
Near field communication - Data transmission
Near field communication - Data transmissionNear field communication - Data transmission
Near field communication - Data transmission
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC
NFCNFC
NFC
 
Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATION
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
Nfc
NfcNfc
Nfc
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MoreNear Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much More
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
nfc
nfcnfc
nfc
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Everything You Need to Know About NFC Technology and Its Uses

  • 2. CONTENTS • WHAT IS NFC • Evolution of NFC Technology • How NFC Works • NFC Communication Modes • NFC Uses • NFC Applications • Comparison with Bluetooth • NFC issues • NFC security • Conclusion and Future Scope
  • 3. WHAT IS NFC • NFC, is one of the latest wireless communication technologies. As a short- range wireless connectivity technology. • NFC offers safe yet simple communication between electronic devices.It enables exchange of data between devices over a distance of 4 cm or less. • NFC operates at 13.56 MHz and rates ranging from 106 kbit/s to 848 kbit/s.
  • 4. Evolution of NFC • In 2006, the Nokia 6131 phone was the first device to provide NFC functionality. • In 2010, the Samsung NEXUS S became the first Android with NFC support. • In 2011, RIM became the first company certified by MasterCard to provide the PayPass functionality on their devices worldwide.
  • 5. How NFC works • NFC is based on RFID (Radio-Frequency IDentification) technology that uses magnetic field induction between electronic devices in close proximity. • For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag. • The tag is essentially an integrated circuit containing data, connected to an antenna, that can be read or written by the reader.
  • 6. NFC Communication Modes • Passive Communication Mode: The Initiator device provides a carrier field and the target device answers by modulating the existing field. In this mode, the Target device may draw its operating power from the Initiator- provided electromagnetic field, thus making the Target device a transponder. • Active Communication Mode: Both Initiator and Target device communicate by alternately generating their own fields. A device deactivates its RF field while it is waiting for data. In this mode, both devices typically have power supplies.
  • 7. • A device that can generate its own radio frequency field is called an active device whereas a device which needs to use inductive coupling for data transmission is called a passive device. • Active communication mode occurs when the operation is conducted between two active devices and passive communication mode happens when the operation happens between an active and a passive device.
  • 8. NFC employs two different coding to transfer data: • NFC employs two different coding to transfer data. If an active device transfers data at 106 kbit/s • In all other cases Manchester coding is used with a modulation ratio of 10%. • NFC devices are able to receive and transmit data at the same time. • Thus, they need to check the radio frequency field and can detect a collision if the received signal matches the transmitted signal's modulated frequency band.
  • 9. NFC Uses , There are currently three main uses of NFC: • Card emulation: The NFC device behaves like an existing contactless . • cardReader mode: The NFC device is active and reads a passive RFID tag, for example for interactive advertising. • P2P mode: Two NFC devices communicating together and exchanging information.
  • 10. NFC Applications • Mobile ticketing in public transport: an extension of the existing contactless infrastructure, such as Mobile Phone Boarding Pass. • Mobile paymentSmart poster: the mobile phone is used to read RFID tags on outdoor billboards. • Bluetooth pairing: in the future, pairing of Bluetooth 2.1 devices with NFC support will be as easy as bringing them close together and accepting the pairing.
  • 11. Comparison with Bluetooth • NFC and Bluetooth are both short-range communication technologies which are integrated into mobile phones. • To avoid a complicated configuration process, NFC can be used for the set- up of wireless technologies, such as Bluetooth. • NFC sets up faster than standard Bluetooth, but is not much faster than Bluetooth low energy. • With NFC, instead of performing manual configurations to identify devices, the connection between two NFC devices is automatically established quickly — in less than a tenth of a second.
  • 12. NFC security issues • One of the most important and considerable aspects of Near Field Communication is the security issue. • However this type of short range wireless communication which is limited to few centimeters and the technology is user aware interaction but still this awareness does not guarantee a safe and secure communication, because there may be are different types of threads toward NFC communication.
  • 13. • One of the major threads is that the communicator device has been manipulated physically where this can be done in different ways as follows; • By removing a tag from the tagged device • By wrapping the tag of the tagged device in a metal foil to shield the RF signal • By many other possible physical manipulation
  • 14. NFC security • NFC Specific key Agreement : Along with standard key agreement mechanism in NFC protocol, there is a possibility to implement an NFC specific key agreement where this agreement the computational requirement and theoretically increases the communication security. • This specific key agreement is not part of ISO standard and it just works with 100% modulation. • During sending random bits of 0 or 1, each single device listens to the RF field. The scheme is so that if the devices send a zero, the sum of the signals will become zero and if both of them send 1’s then the sum of the signals will be the doubleRF signal.
  • 15. Conclusion • NFC is a new technology developed over RFID, in a way that it consists of an interface and protocol are based on RFID which makes NFC device to a part of this standard and compatible with existing RFID technology. • It enables a contactless, wireless communication between portable devices close to each other less than 4 centimeters touching them physically. • NFC supports data rate of 106 kbps for the minimum and 212 kbps and 424kbps at the maximum.
  • 16. Future scope • As the future work, it seems that in many applications of NFC, the ASK modulation technique is applied. • Therefore this could be suggested that by using MATLAB, the other techniques can be applied in the model of NFC . • So it is possible to think on and developing new application that still does not exist. Beside as the applications are growing then security issue comes to importance first and still there could be new techniques to be defined in order to accessing the attackers to the ongoing information between communicating parties.