Nfc

2,325 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,325
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
117
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Nfc

  1. 1. NFC Applications and Security
  2. 2. WHAT IS NFC ? NFC stands for Near Field Communication. NFC is a short-range wireless connectivity technology that provides intuitive, simple, and safe communication between electronic devices. It is a wireless communication interface with a working distance limited to about 10 cm.
  3. 3.  It works on the simple principle of inductive coupling.  When current flows through the NFC chip, a magnetic field is generated.  This field induces electricity within the second device or an NFC tag.  The second device generates a magnetic field of its own which is then detected by the first device.  It registers this RF field and decodes it.
  4. 4. NFC STANDARDS  Operates at 13.56 MHz  Can send data at a rate of 106, 212 or 424 kb per second.
  5. 5. MODES OF OPERATION READ MODE PEER-TO-PEER CARD EMULATION SIMPLY READS AN NFC TAG TWO NFC ENABLED DEVICES CAN EXCHANGE INFORMATION. PHONE CAN ACT AS A CARD TO MAKE PAYMENTS
  6. 6. PRESENT AND PROTOTYPED
  7. 7. • Make payments with a wave or a touch anywhere contactless card readers have been deployed. • Read information and “pick up” special offers and discounts from smart posters or smart billboards. • Store tickets to access transportation gates, parking garages or get into events. • Store personal information that will allow secure building access. • Take a picture and transfer it to an NFC-enabled printer or monitor. • Share business cards with other NFC-enabled phones.
  8. 8. AT PARKING METERS
  9. 9. NFC POWERING AN E-PAPER.
  10. 10. NFC RINGS
  11. 11. SECURITY • Whenever radio frequencies are involved, there's a potential security risk. • Even though NFC transmissions must take place over very short ranges, it's possible to pick up transmissions from much further away. • It's harder to detect transmissions from passive components. Even so, an eavesdropper could detect signals from about a meter away with the right equipment. • Data can be stolen or corrupted by an attacker easily By creating an RF field of the same frequency as that of the sender. By changing bits 1 to 0 or vice versa in a signal. By modulating carrier signal with a pause in the original signal.
  12. 12. SOLUTIONS • NFC specific key agreement Set of keys unique for NFC transactions This one does not require any asymmetric cryptography. Therefore reduces the computational requirements significantly • Secure Channel for NFC  Establishing a secure channel between two NFC devices is clearly the best approach to protect against eavesdropping and any kind of data modification attack.  A standard key agreement protocol like Diffie-Hellmann Elliptic Curves could be applied to establish a shared secret between two devices • Chip Modification The NFC chip can be modified to constantly check its RF field while it is transmitting data.  The power required to attack is much larger than the power of the NFC signal. Hence the chip will be able to identify an attacking signal instantly
  13. 13. CONCLUSION • NFC is not more insecure than other related technologies. It offers options for encrypting data on the application layer the same way as Wi-Fi or Bluetooth, but additionally provides safety through the requirement of very close physical proximity. • At present, the NFC technology has reached a level where commercial launch preparation can begin and should be established. • Reliability and usability of NFC applications are probably the most striking advantages of the NFC technology and therefore important keys to its success.
  14. 14. • When compared to alternative technologies, NFC offers great advantages. • It is very likely that the NFC technology will play a big role in our future everyday life.

×