Near field communication


Published on

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Nfc:13.56MHzBluetooth: 2.4 GHz radio frequency
  • Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another bluetooth enabled device via the OBEX protocol.Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos.A related hacking technique is called bluebugging, and it involves accessing the phone’s commands so that the hacker can actually make phone calls, add or delete contact info
  • Type 1 and type 2 tags are dual state and may be either read/write or read-only. Type 3 and Type 4 tags are read-only, data being entered at manufacture or using a special tag writer.
  • NFC data exchange format
  • In the near future NFC will be the frontrunner technology for data capture, data transfer and access control applications. NFC technology continues to evolve and develop new applications. It is going to bring revolution in mobile communications .There will be a significant spike in NFC activities in future.
  • Nokia play 360 with lumia
  • Near field communication

    2. 2. Outline Introduction. Related Technologies in wireless communication. NFC and Its Technical Features, modes of operation. Categories. Uses of NFC. NFC-Bluetooth integration. E-wallet. 2
    3. 3. 3 Radio Based Technologies Bluetooth technology is capable of forming small wireless networks between devices. Bluetooth enabled devices can be put into “discoverable” mode allowing them to announce their presence to other devices. RFID is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. Some tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost parallel reading of tags. Near Field Communication or NFC, is a short-range high frequency wireless communication technology which enables the exchange of data between devices over about a 10 centimeter (around 4 inches) distance.[ 3
    4. 4. What is NFC? NFC (Near Field Communication) is a wireless proximity communication technology. It was jointly developed by Sony and Philips. The NFC transmission runs helping duplex, i.e. that one of the two devices can send only in each case or receive at a time. It’s a tag, and a reader Based Technology. More point up authenticate of personal than RFID. 4
    5. 5. Technical Features IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication. NFC is based on RFID which is a system that communicates using radio waves between a reader and an electronic tag attached to an object. NFC Has A frequency of 13.56 MHz NFC has a short range and supports encryption NFC employs two different coding to transfer data. If an active device transfers data at 106 Kbit/s, a modified Miller coding is used. In all other cases Manchester coding is used. 5
    6. 6. Wireless Communication Technology Comparision Wi-Fi Bluetooth Infrared NFCRange 0 ~ 100 m 0 ~ 10 m 0~1m < 50 cmTransfer High Medium Medium Lowrate 54 Mbps 1 Mbps 424 kbpsSecurity Low High Low Very HighCost High Medium Medium Very Low 6
    7. 7. NFC vs. Bluetooth Bluetooth was invented in 1994 by Ericsson Company. . As far back as 2005, Nokia launched the Nokia 3220 with an NFC-modified back cover. But it was only really in 2007 with the Nokia 6131 NFC, that the tech started to make waves. Bluetooth didnt fail, it just didnt evolve. Failures in basic stack implementation like Buffer overflows. Numerous applications can exploit Bluetooth like Bluetooth scanner. Worms already exist like Pocket(Duts/Dust) and Symbian (Cabir) Bluetooth has the ability to handle data and voice transmissions at the same time which allows it to be used in a wide range of applications capabilities. NFC has the Ability to interact with passive devices and is secure and fast. There are a number of security risks associated with this technology, such as “Bluejacking” and “Bluebugging”. New Game for Hackers : Hackers are becoming increasingly interested in attacking Bluetooth devices. Bluetooth devices can also be targets of Denial of Service (DoS) attacks 7
    8. 8. What are the benefits of NFC? The NFC provides the following comprehensive list of benefits:• Intuitive: NFC interactions require no more than a simple touch.• Versatile: NFC is ideally suited to the broadest range ofindustries, environments, and uses.• Open and standards-based: The underlying layers of NFC technologyfollow universally implemented ISO, ECMA, and ETSI standards.• Technology-enabling: NFC facilitates fast and simple setup ofwireless technologies, such as Bluetooth, Wi-Fi.• Inherently secure: NFC transmissions are short range (from a touchto a few centimetres).• Interoperable: NFC works with existing contactless cardtechnologies.• Security-ready: NFC has built-in capabilities to support secureapplications. 8
    9. 9. Tags Passive entities. Tags are Unpowered chips having built-in radios and wireless reader. Finland became the world’s most NFC tagged city with 1500 NFC info tags installed. 9
    10. 10. Modes of Communication There are two modes: Passive communication mode: The initiator device provides a carrier fields and the target device answers by modulating the existing field. In this mode, the target device may draw its operating power from the initiator- provided electromagnetic field, thus making the target device a transponder. Active communication mode: Both initiator and target device communicate by alternately generating their own fields. A device deactivates its RF field while it is waiting for data. In this mode, both devices typically have power supplies. 10
    11. 11. Why do I Need NFC? The major advantage of NFC over other wireless communication technology is NFC offers a low-speed connection with extremely simple setup which is very quick. Security related features. Versatility. Cheap. A single tag costs around 5 cents. 11
    12. 12. Operational Modes Reader/Writer Mode(Proximity Coupling Device):This mode allow the user to retrieve additional information. Peer-to-Peer: This mode allow two NFC enabled devices to establish a bidirectional connection to exchange contacts, Bluetooth pairing information or any other kind of data. Card Emulation (Proximity Inductive Coupling Card, PICC):This mode is useful for payment and ticketing applications for example. 12
    13. 13. Uses of NFC Connect electronic devices . Access digital content, using a wireless device such as a mobile phone to read a “smart” poster embedded with an RF tag,url etc. Make contactless transactions, including those for payment, access and ticketing. Exchange of information such as schedules, maps, business card and coupon delivery in a few hundred milliseconds; Pay for items just by waving your phone over the NFC capable devices. Transferring images, posters for displaying and printing It could, for example, replace the pairing step of establishing connections. NFC can be used in social networking situations, such as sharing contacts, photos, videos or files ,and entering multiplayer mobile games. Reading information and “picking up” special offers, coupons and discounts from smart posters or smart billboards 14
    14. 14. Uses of NFC 15
    15. 15. Categories of NFC Touch and Go: Applications such as access control or transport/event ticketing, where the user needs only to bring the device storing the ticket or access code close to the reader. Also, for simple data capture applications, such as picking up an Internet URL from a smart label on a poster. Touch and Confirm: Applications such as mobile payment where the user has to confirm the interaction by entering a password or just accepting the transaction. Touch and Connect: Linking two NFC-enabled devices to enable peer to peer transfer of data such as downloading music, exchanging images or synchronizing address books. Touch and Explore: NFC devices may offer more than one possible function. The consumer will be able to explore a devices capabilities to find out which functionalities and services are offered. Eg-url tags 16
    16. 16. Why not NFC!!! Currently, there are not many NFC devices and NFC tag based system available. Some Security threats like: Ghost and Leech, using an RFID reader to steal or transmit the victim’s credentials to a fake RFID card. This is an attack that extends the range (normally a few centimetres) of a “tap and pay” transaction, letting an attacker basically pick your virtual pocket. Attackers can buy used RFID readers to assist in pulling off this attack. Collin Mulliner’s Python NDEF library, tools for reading and writing NFC tags. Mulliner has demonstrated phishing, fuzzing, and spoofing attacks against mobile phones with NFC. The library was developed for use against a specific NFC-enabled phone, but the greater availability of new Android-based NFC phones will make it easier to update in the future. Limited range 17
    17. 17. NFC, A Future Technology New generations of iPhone, iPod and iPad products would reportedly be equipped with NFC capability which would enable small-scale monetary transactions May 2011, Google announced Google Wallet, an Android application that will make use of NFC to make payments at stores Microsoft announced that all Windows Phone 8 devices will make use of the NFC technology. Controller of the Wii U home console will have install a NFC function 18
    18. 18. NFC enabled phones Nexus S, Samsung Galaxy SII , Samsung Galaxy note HTC Amaze 4G Nokia C7 BlackBerry Torch 9810/9860 19
    19. 19. Example Use CasesDownload media content from poster Send links to friendsPurchase a product from a poster 20
    20. 20. NFC-Bluetooth Integration It could, for example, replace the pairing step of establishing Bluetooth connections. 21
    21. 21. Buzzing Technology 22
    22. 22. Thank You! 23