SlideShare a Scribd company logo
1
1
Abstract - In the area of building automation, many sensor
or actuator devices are tiny embedded systems which are
installed throughout the building. The sensors gather
information about the current environment (e.g., the
temperature, number of people in a room, etc.) and the
actuators interact with the environment (e.g., controlling
lights, heating, or door access). A central unit controls these
devices (wirelessly or by wire), therefore all devices need at
least a unique id throughout the system, and in many cases
some more configuration or authentication data. New or
replaced devices have to be registered with the central unit in
order to enable correct control. Thus, the person installing a
new device has to prepare it in terms of at least setting an id
before it can be connected to the network. This can be tedious
work, especially for untrained workers. This paper proposes
adding an NFC module as an enhancement for standard
devices. The devices can then be configured on site using a
standard smart phone running an appropriate application.
This eliminates the need to preconfigure devices using a
programmer tool. The presented application enables (first-
time or re-) configuration of wireless embedded devices. The
prototype features an ATmega 328P micro-controller from
Atmel and a M24SR02-Y NFC chip from STMicroelectronics.
I. INTRODUCTION1
Today more and more devices in buildings are connected
and can be controlled from a central unit. Typical controlled
devices are sensors (collecting information about the
environment) or actuators (directly interacting with the
environment).
In the context of building automation, sensors can be
temperature sensors, movement sensors, light sensors,
humidity sensors, light barriers, pressure sensors, etc.
Actuators can be lights, locks on doors or windows, small
motors actually opening doors or windows (like in the case
of a fire, in order to act as a smoke outlet), thermostats
(lowering or increasing room temperature), etc. The devices
usually consist of a micro-controller, a communication unit
(like a transceiver or a network connection), some memory, a
power management unit, and, depending on its purpose,
some sensor or actuator unit.
The devices then communicate wirelessly (e.g., using a
low-power protocol like ZigBee, KNX, Wireless HART, or
EnOcean) or weirdly (e.g., using power line communication
(PLC) or even dedicated cables) with a central control unit.
This unit mainly takes input data from the sensor devices
and sends commands to the actuator devices. If the location
of a sensor device is known then the received sensor value
can be put into a greater context; e.g., the current
temperatures of all rooms in a whole building can be
collected and the current state be used to make decisions on
whether some actuators (like thermostats or window-
openers) should be put into action. For this, of course the
location of those actuators has to be known, too, and the
actuators be individually approached.
Therefore, a broadcast structure will not suffice for such
a setup. For communication, at least a unique id for each
device is required so it can be accessed individually.
.
A. Existing Operation of Devices
If a building is to be equipped with lots of sensors or
actuators, a problem arises in terms of configuring all
these devices. The devices need at least a unique id, and in
many cases, it is important to take note of the location of
the device (like the room number or even an exact
position). In order to avoid tampering with wirelessly
connected devices it is advisable to use some kind of secure
communication, usually by use of cryptographic keys and
algorithms.
The configuration use case occurs throughout the whole
life cycle of a sensor or actuator device:
o deploy, when a device is installed for the first
time
o repairs, when a device is being replaced and a
new device has to take over the same id and
configuration
o reconfiguration, when a device is being moved to
Wireless sensor/actuator device configuration
by NFC
SANDEEP P M PROF.
MADHUKARA S
ECE Dept, S.J.C.I.T CHIKBALLAPURA ASSISTANT
PROFESSOR
Sandeep.pm.sp37@gmail.com ECE Dept, S.J.C.I.T CHIKBALLAPURA
madhukara2008@gmail.com
a new location
o deactivation, when a device is being taken down
and unregistered
In all these situations except the very first installation a
secure communication is required to ensure authorized
access only.
Albeit the embedded devices do have a way of
communication (usually a transceiver for wireless devices
or a cable connection for others), this cannot be used for
initial configuration. One of the reasons is the fact that the
new device would not be reachable due to a yet unknown
or even undefined id. Another reason is that most such
communication is performed securely, i.e., based on
cryptographic algorithms and keys; without being given
the keys the device would therefore not be able to
participate in secure communication, and of course it
would be out of the question to allow insecure initial
communication.
B.Proposed operation of devices
This paper proposes a new manual configuration
schema for sensor and actuator devices. Instead of using
small displays, keypads, switches or cables for
configuration, we propose using Near Field
Communication (NFC). NFC is a short range wireless
protocol supported by many different devices today,
including smart phones. NFC chips are cheap because of
their wide distribution. Therefore, sensors and actuators
can be extended with a NFC chip without increasing the
production costs much. These extended devices can be
configured using any NFC writer, including many smart
phones . An application on the smart phone then manages
the different sensors and actuators and their configuration,
making a specific portable configuration device unnecessary
Fig.1.1 A smart phone connecting to a sensor device via
NFC
C. Related Work
The approach of NFC or RFID tags being used for
configuring sensor network devices is not yet that common.
However, the potential of some chip less RFID tags in term
of sensing. Two configurations of chip less sensor tags are
studied and experimented. The first configuration is based
on a chip less RFID tag coded in frequency domain and
transformed into a sensor thanks to a deposit of a
nanomaterial that exhibits high sensitivity to humidity. One
of the advantages of such a transformation is to combine
both identification and sensing in the same and unique
device. Very interesting sensitivity is observed in practice.
The second configuration is based on the use of frequency
coded tag where sensing capability consists in measuring a
flight time. Then several sensors located on an object in
preselected positions are used in order to monitor the
deformation of the object and Shrestha et al. chip less RF
identification (RFID) sensor system platform consisting of
passive chip less RFID sensor tags and specialized reader
has been developed for cyber centric monitoring
applications. The sensor tags are fabricated on a flexible
substrate, and the tag identification (ID) generation circuit
consists of micro strip transmission lines. Two tag
configurations are presented. The first configuration (conf-I)
consists of an antenna and an integrated sensor. The
second configuration (conf-II) consists of an antenna, ID
generation circuit, and a sensor. Use chip less RFID tags
instead of full embedded systems as sensing units. Surpass
and Yoshigoe propose to use NFC as a transmission method
for Wireless sensor networks.
Explored the idea to use NFC for configuration and
encryption key download onto wireless devices when
connecting to previously unknown public Wi-Fi hotspots a
Wi-Fi hotspot authentication system that relies on a Near
Field Communications (NFC) sidechannel to address the
security issues of Wi-Fi configuration and access in public
locations. The proposed solution defines an architecture
that simplifies Wi-Fi access point configuration for the end
user, while simultaneously increasing user security and
privacy in public networks. This is achieved by embedding
network and security information in NFC enabled devices
(e.g. tags) that allow the user to connect to secure wireless
networks without a preestablished relationship.
II. PROTOTYPE
The prototype system consists of two parts:
o A Smarthomatic sensor device which is was
expanded by adding an NFC chip
o An NFC application for Android smart phones
(see Section II-D)
1
3
The first part is implemented using an environment
sensor from the smarthomatic house automation system, the
NFC chip M24SR02-Y from STMicroelectronics and an
Android mobile phone application. The environment
sensor and the NFC chip are described thoroughly in the
next two sections, followed by the prototype description
and the application overview.
A. Smarthomatic Smarthomatic is an open-source house
automation system developed by Uwe Freeze. The design
goals for the project are:
o keep it simple (complexity only when necessary)
o make it similar (differences only when necessary)
o make it easy to build up
o make it cheap
A basic Smarthomatic system consists of a base station
connected to a host computer through RS232, and some
sensor and actuator devices. The base station receives and
transmits Advanced Encryption Standard (AES) encrypted
radio packets from and to the sensors/actuators. The PCBs
and the firmware’s for the base station and all
smarthomatic devices are freely available under the
General Public License (GPL). At the moment, the
following sensors/actuators are available:
o environment sensor for measuring light,
temperature, pressure, and humidity
o a power switch actuator for switching 230V devices
o a RGB dimmer for three Light Emitting Diodes
(LEDs)
o a Soil Moisture Meter
The devices are configured by flashing the
configuration data into the EEPROM using an In-System
Programmer (ISP), an external device connected to a host
computer and the micro-controller
Figure 2.2 Pin layout of a M24SR02-Y NFC chip from
STMicroelectronics .
For the prototype system, the M24SR02-Y NFC chip from
STMicroelectronics is selected. It implements a NFC/RFID
tag with 2Kbit EEPROM. In addition to the radio
interface the M24SR02-Y features an I2C interface
working at up to 1MHz transmission clock. It is
compatible to the I2C interface of the ATmega 328P. The
tag supports NFC Forum Type 4 tag operations based on
the ISO/IEC 14443 standard. The 2kbit memory on the
M24SR02-Y can be read/written from the radio interface,
but also from the I2C interface.
B. Prototype At a first step the prototype is implemented
on a pin board.
Figure 2.1 Prototype systems on a pin board. The yellow
wire on the far-right side is the NFC antenna. The
two seven segment displays show the configured sensor
id.
Figure 2.1 shows this pin board. The ATmega 328P is
placed at the top of it. The ATmega runs the extended
firmware of an smarthomatic environment sensor. The larger
structure on the right is the M24SR02-Yin an SMD package
adapter. The NFC antenna is the yellow cable on the right
side of the M24SR02-Y. The two seven segment displays
show the currently configured network id of the
environment sensor. It changes every time a new id is
configured through the NFC tag.
III. APPLICATION
The mobile phone application for configuring the
smarthomatic sensors through NFC is written for the
Android Operating System (OS). Android and Apples IOS,
are the most widely spread smart phone OSs today. Java is
the programming language for most Android applications
and a lot of support material is available on the Internet.
Because of the low barrier for application development,
Android is chosen as the OS for the prototype application.
The application itself is clearly structured. The main
activity is displayed at the start of the application. It
presents no real information, but through selecting the
typical Android application menu the user can choose
between showing all sensor/actuator devices stored in the
database and adding a device. Figure 5 shows the activity
to add a device.
Figure3.1 shows the moment configuring the wireless
network id, the type of the device, its location, and a
128/256-bit key can be stored into the application
database. After storing the data, it can be transferred to the
sensor/actuator by just holding the phone directly above it.
The information about the configured devices can be
exported into a CSV file. An example file is displayed in
Table II. All the configured information can be exported
and for example important in a central database.
Table 1 show the different configuration data sizes for three
smarthomatic devices. Configuration data for these devices
consist among others of:
sensor data and transmitting it.
1
5
IVFUTURE SCOPE
 NFC SD and SIM Cards For
those who want to use near field communication
technology but don’t currently have an NFC
compatible smartphone, there are other ways to
enable NFC on your phone without trading it in for
an expensive new model. Both SIM and SD cards
can be equipped with NFC chips, and some
companies currently offer or are preparing to offer
these options so more customers can start using
NFC technology.
 SD Cards An SD
card serves as a memory card for your smartphone.
Purchasing an SD card with NFC technology
stored on it lets you pop it into your phone’s SD
card slot and start waving your smartphone at
registers or over smart posters. The drawback of
this technology is the range of phones it can work
with. Those with a metallic SD card slot won’t
work; however, those with a non-metallic slot
should work just fine with the NFC SD card.
 SIM Cards SIM
cards with NFC chips embedded on them are soon
to be a worldwide standard, making them more
accessible and compatible than SD card versions of
NFC technology. The SIM card does raise security
concerns, however. It could be stolen or possibly
hacked to collect and use sensitive financial
information. As the standards for this technology
are developed, companies aim to create increased
security that prevents these potential problems
fromoccurring.
 Set-up and Usage Once
you’ve purchased an SD or SIM card for your
smartphone, turn off your phone and insert the
card. Turn the phone back on and search the
smartphone’s marketplace for apps compatible with
NFC technology. To work you’ll need to wave the
area with the SD or SIM card over the card reader,
which can prove a little trickier to hit than with
smartphones that come preinstalled with NFC
chips. Removing the card will disable your NFC
access.
V CONCLUSION
A smart supermarket shopping system based on NFC has
advantages including high reliability, real-time interactions,
convenience of installation and maintenance as well as high
efficiency. However, there is still a long way to go before it
is widely put into use. The problems now focus on the super
intendance of e-tags and lack of research in NFC terminals.
With the development of mobile communication
technologies, the way of life will become more intelligent,
the system of mobile payment will be ameliorated too. The
future of NFC payment is still bright and the applications
supporting NFC will continue to turn up with the maturation
of the market.
In the near future, part of people's lives is certain to be
occupied with wide spread emergence of the NFC
technology, particularly with respect to mobile payment. It is
an industry worth continued attention
REFERENCES
[1] J. Haase, G. Zucker and M. Alahmad, Energy efficient building
automation: a survey paper on approaches and technologies for
optimized building operation, in Industrial Electronics Society,
IECON 2014 - 40th Annual Conference of the IEEE, Oct. 2014, pp.
5350–5356.
[2] E. Perret, R. Nair, E. Bel Kamel, A. Vena and S. Tedjini, Chipless
rfid tags for passive wireless sensor grids, in General Assembly and
Scientific Symposium (URSI GASS), 2014 XXXIth URSI, Aug. 2014,
pp. 1–4.
[3] D. Serfass and K. Yoshigoe, Wireless sensor networks using
android virtual devices and near field communication peer-to-peer
emulation, in Southeastcon, 2012 Proceedings of IEEE, Mar. 2012,
pp. 1–6.
[4] A. Matos, D. Romao and P. Trezentos, Secure hotspot
authentication through a near field communication side-channel, in
Wireless and Mobile Computing, Networking and Communications
(WiMob), 2012 IEEE 8th International Conference on, Oct. 2012,
pp. 807–814.
[5] K. Gravogl, J. Haase,and C. Grimm, Choosing thebest wireless
protocol forTypical applications, in 24th International Conference
on Architecture of Computing Systems (ARCS),2011.
[6] S. Shrestha, M. Balachandran, M. Agarwal, V. Phoha, and K.
Varahramyan, A chipless rfid sensor system for cyber centric
monitoring applications, Microwave Theory and Techniques, IEEE
Transactions on, vol. 57, no. 5, May 2009, ISSN: 0018-9480, pp.
1303–130.
[7] W. Diffie and M. E. Hellman, New directions in cryptography,
Information Theory, IEEE Transactions on, vol. 22, no. 6,1976,
pp. 644–654.
[8] U. Freese, Smarthomatic,
http://www.smarthomatic.org/,21.06.2015.
[9] Atmel, Data sheet atmega48pa/88pa/168pa/328p,
http://www.atmel.com/doc8161.pdf.
[10] V. Coskun, K. Ok, and B. Ozdenizci, Near Field Communication
(NFC): From Theory to Practice. John Wiley & Sons, 2011.
Wireless sensor or actuator device configuration by NFC 2017-18
DEPT. OF ECE, SJCIT
Page 30
[11] STMicroelectronics, Data sheet dynamic nfc/rfid tag ic
m24sr02-y, http: / /www . st . com
[12] N. F. Forum, Type 4 tag operation specification: technical
specification, http: / / apps4android . org / nfc - specifications /
NFCForum-TS-Type-4-Tag_2.0.pdf.
[13] Bitesmanufaktur GmbH, Iso14443 - openpcd, http : / / www .
openpcd.org/ISO14443, 2014.

More Related Content

What's hot

border security using gsm
border security using gsmborder security using gsm
border security using gsmbharath naidu
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
Gyanendra Prakash
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
Bllu
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
Iaetsd Iaetsd
 
WSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in IndustryWSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in Industry
ijtsrd
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
Brockanurag
 
IRJET- Home Surveillance Without using CCTV Camera
IRJET-  	  Home Surveillance Without using CCTV CameraIRJET-  	  Home Surveillance Without using CCTV Camera
IRJET- Home Surveillance Without using CCTV Camera
IRJET Journal
 
IRJET- Intruder Detection Security System
IRJET- Intruder Detection Security SystemIRJET- Intruder Detection Security System
IRJET- Intruder Detection Security System
IRJET Journal
 
Bi directional visitor counter
Bi directional visitor counter Bi directional visitor counter
Bi directional visitor counter
JanhviThombre
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)PRADEEP Cheekatla
 
ZigBee Based Wireless Sensor Network
ZigBee Based Wireless Sensor NetworkZigBee Based Wireless Sensor Network
ZigBee Based Wireless Sensor Network
Anand Agrawal
 
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...ASHOKKUMAR RAMAR
 
Home automation using dtmf
Home automation using dtmfHome automation using dtmf
Home automation using dtmf
Pratik Gupta
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
Student
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiver
zaidinvisible
 
Smart Home Automation by LDCE student
Smart Home Automation by LDCE studentSmart Home Automation by LDCE student
Smart Home Automation by LDCE studentMitul Lakhani
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
Amulya Anu
 

What's hot (19)

border security using gsm
border security using gsmborder security using gsm
border security using gsm
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
 
wins ABHIppt - Copy
wins ABHIppt - Copywins ABHIppt - Copy
wins ABHIppt - Copy
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
 
WSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in IndustryWSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in Industry
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
IRJET- Home Surveillance Without using CCTV Camera
IRJET-  	  Home Surveillance Without using CCTV CameraIRJET-  	  Home Surveillance Without using CCTV Camera
IRJET- Home Surveillance Without using CCTV Camera
 
IRJET- Intruder Detection Security System
IRJET- Intruder Detection Security SystemIRJET- Intruder Detection Security System
IRJET- Intruder Detection Security System
 
Bi directional visitor counter
Bi directional visitor counter Bi directional visitor counter
Bi directional visitor counter
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
 
ZigBee Based Wireless Sensor Network
ZigBee Based Wireless Sensor NetworkZigBee Based Wireless Sensor Network
ZigBee Based Wireless Sensor Network
 
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
INDUSTRIAL SECURITY SYSTEM PROJECTS ABSTRACT:Industrial safety measures syste...
 
Home automation using dtmf
Home automation using dtmfHome automation using dtmf
Home automation using dtmf
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiver
 
Smart Home Automation by LDCE student
Smart Home Automation by LDCE studentSmart Home Automation by LDCE student
Smart Home Automation by LDCE student
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 

Similar to actuator device configuration by NFC

Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd Iaetsd
 
Near field communication
Near field communicationNear field communication
Near field communication
Bindu U
 
Sensor id overview_ppt
Sensor id overview_pptSensor id overview_ppt
Sensor id overview_ppt
Angelo Primiani
 
Electrical Appliances Control using Wi-Fi and Laptop
Electrical Appliances Control using Wi-Fi and LaptopElectrical Appliances Control using Wi-Fi and Laptop
Electrical Appliances Control using Wi-Fi and Laptop
IRJET Journal
 
Design and implementation smart home alarm system with zig bee transceiver
Design and implementation smart home alarm system with zig bee transceiverDesign and implementation smart home alarm system with zig bee transceiver
Design and implementation smart home alarm system with zig bee transceiver
zaidinvisible
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
ijasuc
 
How NFC tag sensor device RF technology is used? -- C&T RF Antennas Inc
How NFC tag sensor device RF technology is used? -- C&T RF Antennas IncHow NFC tag sensor device RF technology is used? -- C&T RF Antennas Inc
How NFC tag sensor device RF technology is used? -- C&T RF Antennas Inc
Antenna Manufacturer Coco
 
Anam rajkumar sarvesh
Anam rajkumar sarveshAnam rajkumar sarvesh
Anam rajkumar sarvesh
shailesh yadav
 
Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626
shailesh yadav
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network
IJERA Editor
 
AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0
AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0
AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0devsunit
 
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET Journal
 
14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialer14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialer
a_subramaniyam
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paperAnwar Al Ahdab
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
IRJET Journal
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
Deepshika Reddy
 

Similar to actuator device configuration by NFC (20)

Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Sensor id overview_ppt
Sensor id overview_pptSensor id overview_ppt
Sensor id overview_ppt
 
Electrical Appliances Control using Wi-Fi and Laptop
Electrical Appliances Control using Wi-Fi and LaptopElectrical Appliances Control using Wi-Fi and Laptop
Electrical Appliances Control using Wi-Fi and Laptop
 
Design and implementation smart home alarm system with zig bee transceiver
Design and implementation smart home alarm system with zig bee transceiverDesign and implementation smart home alarm system with zig bee transceiver
Design and implementation smart home alarm system with zig bee transceiver
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
How NFC tag sensor device RF technology is used? -- C&T RF Antennas Inc
How NFC tag sensor device RF technology is used? -- C&T RF Antennas IncHow NFC tag sensor device RF technology is used? -- C&T RF Antennas Inc
How NFC tag sensor device RF technology is used? -- C&T RF Antennas Inc
 
Anam rajkumar sarvesh
Anam rajkumar sarveshAnam rajkumar sarvesh
Anam rajkumar sarvesh
 
Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626Anam rajkumar sarvesh k10779,k10626
Anam rajkumar sarvesh k10779,k10626
 
Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network Dynamic Communication of Wireless Sensor Network
Dynamic Communication of Wireless Sensor Network
 
AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0
AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0
AUTONOMOUS CONTROL TECHNIQUES FOR HOME AUTOMATION v1.0
 
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring FunctionIRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
IRJET- Review on RFID based Audio Tour Guide with NFC Monitoring Function
 
Versuch 3 mel-p_so_c-cy3271-good
Versuch 3 mel-p_so_c-cy3271-goodVersuch 3 mel-p_so_c-cy3271-good
Versuch 3 mel-p_so_c-cy3271-good
 
14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialer14983184 industrial-security-system-using-auto-dialer
14983184 industrial-security-system-using-auto-dialer
 
Smart home project technical paper
Smart home project technical paperSmart home project technical paper
Smart home project technical paper
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 

actuator device configuration by NFC

  • 1. 1 1 Abstract - In the area of building automation, many sensor or actuator devices are tiny embedded systems which are installed throughout the building. The sensors gather information about the current environment (e.g., the temperature, number of people in a room, etc.) and the actuators interact with the environment (e.g., controlling lights, heating, or door access). A central unit controls these devices (wirelessly or by wire), therefore all devices need at least a unique id throughout the system, and in many cases some more configuration or authentication data. New or replaced devices have to be registered with the central unit in order to enable correct control. Thus, the person installing a new device has to prepare it in terms of at least setting an id before it can be connected to the network. This can be tedious work, especially for untrained workers. This paper proposes adding an NFC module as an enhancement for standard devices. The devices can then be configured on site using a standard smart phone running an appropriate application. This eliminates the need to preconfigure devices using a programmer tool. The presented application enables (first- time or re-) configuration of wireless embedded devices. The prototype features an ATmega 328P micro-controller from Atmel and a M24SR02-Y NFC chip from STMicroelectronics. I. INTRODUCTION1 Today more and more devices in buildings are connected and can be controlled from a central unit. Typical controlled devices are sensors (collecting information about the environment) or actuators (directly interacting with the environment). In the context of building automation, sensors can be temperature sensors, movement sensors, light sensors, humidity sensors, light barriers, pressure sensors, etc. Actuators can be lights, locks on doors or windows, small motors actually opening doors or windows (like in the case of a fire, in order to act as a smoke outlet), thermostats (lowering or increasing room temperature), etc. The devices usually consist of a micro-controller, a communication unit (like a transceiver or a network connection), some memory, a power management unit, and, depending on its purpose, some sensor or actuator unit. The devices then communicate wirelessly (e.g., using a low-power protocol like ZigBee, KNX, Wireless HART, or EnOcean) or weirdly (e.g., using power line communication (PLC) or even dedicated cables) with a central control unit. This unit mainly takes input data from the sensor devices and sends commands to the actuator devices. If the location of a sensor device is known then the received sensor value can be put into a greater context; e.g., the current temperatures of all rooms in a whole building can be collected and the current state be used to make decisions on whether some actuators (like thermostats or window- openers) should be put into action. For this, of course the location of those actuators has to be known, too, and the actuators be individually approached. Therefore, a broadcast structure will not suffice for such a setup. For communication, at least a unique id for each device is required so it can be accessed individually. . A. Existing Operation of Devices If a building is to be equipped with lots of sensors or actuators, a problem arises in terms of configuring all these devices. The devices need at least a unique id, and in many cases, it is important to take note of the location of the device (like the room number or even an exact position). In order to avoid tampering with wirelessly connected devices it is advisable to use some kind of secure communication, usually by use of cryptographic keys and algorithms. The configuration use case occurs throughout the whole life cycle of a sensor or actuator device: o deploy, when a device is installed for the first time o repairs, when a device is being replaced and a new device has to take over the same id and configuration o reconfiguration, when a device is being moved to Wireless sensor/actuator device configuration by NFC SANDEEP P M PROF. MADHUKARA S ECE Dept, S.J.C.I.T CHIKBALLAPURA ASSISTANT PROFESSOR Sandeep.pm.sp37@gmail.com ECE Dept, S.J.C.I.T CHIKBALLAPURA madhukara2008@gmail.com
  • 2. a new location o deactivation, when a device is being taken down and unregistered In all these situations except the very first installation a secure communication is required to ensure authorized access only. Albeit the embedded devices do have a way of communication (usually a transceiver for wireless devices or a cable connection for others), this cannot be used for initial configuration. One of the reasons is the fact that the new device would not be reachable due to a yet unknown or even undefined id. Another reason is that most such communication is performed securely, i.e., based on cryptographic algorithms and keys; without being given the keys the device would therefore not be able to participate in secure communication, and of course it would be out of the question to allow insecure initial communication. B.Proposed operation of devices This paper proposes a new manual configuration schema for sensor and actuator devices. Instead of using small displays, keypads, switches or cables for configuration, we propose using Near Field Communication (NFC). NFC is a short range wireless protocol supported by many different devices today, including smart phones. NFC chips are cheap because of their wide distribution. Therefore, sensors and actuators can be extended with a NFC chip without increasing the production costs much. These extended devices can be configured using any NFC writer, including many smart phones . An application on the smart phone then manages the different sensors and actuators and their configuration, making a specific portable configuration device unnecessary Fig.1.1 A smart phone connecting to a sensor device via NFC C. Related Work The approach of NFC or RFID tags being used for configuring sensor network devices is not yet that common. However, the potential of some chip less RFID tags in term of sensing. Two configurations of chip less sensor tags are studied and experimented. The first configuration is based on a chip less RFID tag coded in frequency domain and transformed into a sensor thanks to a deposit of a nanomaterial that exhibits high sensitivity to humidity. One of the advantages of such a transformation is to combine both identification and sensing in the same and unique device. Very interesting sensitivity is observed in practice. The second configuration is based on the use of frequency coded tag where sensing capability consists in measuring a flight time. Then several sensors located on an object in preselected positions are used in order to monitor the deformation of the object and Shrestha et al. chip less RF identification (RFID) sensor system platform consisting of passive chip less RFID sensor tags and specialized reader has been developed for cyber centric monitoring applications. The sensor tags are fabricated on a flexible substrate, and the tag identification (ID) generation circuit consists of micro strip transmission lines. Two tag configurations are presented. The first configuration (conf-I) consists of an antenna and an integrated sensor. The second configuration (conf-II) consists of an antenna, ID generation circuit, and a sensor. Use chip less RFID tags instead of full embedded systems as sensing units. Surpass and Yoshigoe propose to use NFC as a transmission method for Wireless sensor networks. Explored the idea to use NFC for configuration and encryption key download onto wireless devices when connecting to previously unknown public Wi-Fi hotspots a Wi-Fi hotspot authentication system that relies on a Near Field Communications (NFC) sidechannel to address the security issues of Wi-Fi configuration and access in public locations. The proposed solution defines an architecture that simplifies Wi-Fi access point configuration for the end user, while simultaneously increasing user security and privacy in public networks. This is achieved by embedding network and security information in NFC enabled devices (e.g. tags) that allow the user to connect to secure wireless networks without a preestablished relationship. II. PROTOTYPE The prototype system consists of two parts: o A Smarthomatic sensor device which is was expanded by adding an NFC chip o An NFC application for Android smart phones (see Section II-D)
  • 3. 1 3 The first part is implemented using an environment sensor from the smarthomatic house automation system, the NFC chip M24SR02-Y from STMicroelectronics and an Android mobile phone application. The environment sensor and the NFC chip are described thoroughly in the next two sections, followed by the prototype description and the application overview. A. Smarthomatic Smarthomatic is an open-source house automation system developed by Uwe Freeze. The design goals for the project are: o keep it simple (complexity only when necessary) o make it similar (differences only when necessary) o make it easy to build up o make it cheap A basic Smarthomatic system consists of a base station connected to a host computer through RS232, and some sensor and actuator devices. The base station receives and transmits Advanced Encryption Standard (AES) encrypted radio packets from and to the sensors/actuators. The PCBs and the firmware’s for the base station and all smarthomatic devices are freely available under the General Public License (GPL). At the moment, the following sensors/actuators are available: o environment sensor for measuring light, temperature, pressure, and humidity o a power switch actuator for switching 230V devices o a RGB dimmer for three Light Emitting Diodes (LEDs) o a Soil Moisture Meter The devices are configured by flashing the configuration data into the EEPROM using an In-System Programmer (ISP), an external device connected to a host computer and the micro-controller Figure 2.2 Pin layout of a M24SR02-Y NFC chip from STMicroelectronics . For the prototype system, the M24SR02-Y NFC chip from STMicroelectronics is selected. It implements a NFC/RFID tag with 2Kbit EEPROM. In addition to the radio interface the M24SR02-Y features an I2C interface working at up to 1MHz transmission clock. It is compatible to the I2C interface of the ATmega 328P. The tag supports NFC Forum Type 4 tag operations based on the ISO/IEC 14443 standard. The 2kbit memory on the M24SR02-Y can be read/written from the radio interface, but also from the I2C interface. B. Prototype At a first step the prototype is implemented on a pin board. Figure 2.1 Prototype systems on a pin board. The yellow wire on the far-right side is the NFC antenna. The two seven segment displays show the configured sensor id. Figure 2.1 shows this pin board. The ATmega 328P is placed at the top of it. The ATmega runs the extended firmware of an smarthomatic environment sensor. The larger structure on the right is the M24SR02-Yin an SMD package adapter. The NFC antenna is the yellow cable on the right side of the M24SR02-Y. The two seven segment displays show the currently configured network id of the environment sensor. It changes every time a new id is configured through the NFC tag. III. APPLICATION The mobile phone application for configuring the smarthomatic sensors through NFC is written for the Android Operating System (OS). Android and Apples IOS, are the most widely spread smart phone OSs today. Java is the programming language for most Android applications and a lot of support material is available on the Internet.
  • 4. Because of the low barrier for application development, Android is chosen as the OS for the prototype application. The application itself is clearly structured. The main activity is displayed at the start of the application. It presents no real information, but through selecting the typical Android application menu the user can choose between showing all sensor/actuator devices stored in the database and adding a device. Figure 5 shows the activity to add a device. Figure3.1 shows the moment configuring the wireless network id, the type of the device, its location, and a 128/256-bit key can be stored into the application database. After storing the data, it can be transferred to the sensor/actuator by just holding the phone directly above it. The information about the configured devices can be exported into a CSV file. An example file is displayed in Table II. All the configured information can be exported and for example important in a central database. Table 1 show the different configuration data sizes for three smarthomatic devices. Configuration data for these devices consist among others of: sensor data and transmitting it.
  • 5. 1 5 IVFUTURE SCOPE  NFC SD and SIM Cards For those who want to use near field communication technology but don’t currently have an NFC compatible smartphone, there are other ways to enable NFC on your phone without trading it in for an expensive new model. Both SIM and SD cards can be equipped with NFC chips, and some companies currently offer or are preparing to offer these options so more customers can start using NFC technology.  SD Cards An SD card serves as a memory card for your smartphone. Purchasing an SD card with NFC technology stored on it lets you pop it into your phone’s SD card slot and start waving your smartphone at registers or over smart posters. The drawback of this technology is the range of phones it can work with. Those with a metallic SD card slot won’t work; however, those with a non-metallic slot should work just fine with the NFC SD card.  SIM Cards SIM cards with NFC chips embedded on them are soon to be a worldwide standard, making them more accessible and compatible than SD card versions of NFC technology. The SIM card does raise security concerns, however. It could be stolen or possibly hacked to collect and use sensitive financial information. As the standards for this technology are developed, companies aim to create increased security that prevents these potential problems fromoccurring.  Set-up and Usage Once you’ve purchased an SD or SIM card for your smartphone, turn off your phone and insert the card. Turn the phone back on and search the smartphone’s marketplace for apps compatible with NFC technology. To work you’ll need to wave the area with the SD or SIM card over the card reader, which can prove a little trickier to hit than with smartphones that come preinstalled with NFC chips. Removing the card will disable your NFC access. V CONCLUSION A smart supermarket shopping system based on NFC has advantages including high reliability, real-time interactions, convenience of installation and maintenance as well as high efficiency. However, there is still a long way to go before it is widely put into use. The problems now focus on the super intendance of e-tags and lack of research in NFC terminals. With the development of mobile communication technologies, the way of life will become more intelligent, the system of mobile payment will be ameliorated too. The future of NFC payment is still bright and the applications supporting NFC will continue to turn up with the maturation of the market. In the near future, part of people's lives is certain to be occupied with wide spread emergence of the NFC technology, particularly with respect to mobile payment. It is an industry worth continued attention REFERENCES [1] J. Haase, G. Zucker and M. Alahmad, Energy efficient building automation: a survey paper on approaches and technologies for optimized building operation, in Industrial Electronics Society, IECON 2014 - 40th Annual Conference of the IEEE, Oct. 2014, pp. 5350–5356. [2] E. Perret, R. Nair, E. Bel Kamel, A. Vena and S. Tedjini, Chipless rfid tags for passive wireless sensor grids, in General Assembly and Scientific Symposium (URSI GASS), 2014 XXXIth URSI, Aug. 2014, pp. 1–4. [3] D. Serfass and K. Yoshigoe, Wireless sensor networks using android virtual devices and near field communication peer-to-peer emulation, in Southeastcon, 2012 Proceedings of IEEE, Mar. 2012, pp. 1–6. [4] A. Matos, D. Romao and P. Trezentos, Secure hotspot authentication through a near field communication side-channel, in Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on, Oct. 2012, pp. 807–814. [5] K. Gravogl, J. Haase,and C. Grimm, Choosing thebest wireless protocol forTypical applications, in 24th International Conference on Architecture of Computing Systems (ARCS),2011. [6] S. Shrestha, M. Balachandran, M. Agarwal, V. Phoha, and K. Varahramyan, A chipless rfid sensor system for cyber centric monitoring applications, Microwave Theory and Techniques, IEEE Transactions on, vol. 57, no. 5, May 2009, ISSN: 0018-9480, pp. 1303–130. [7] W. Diffie and M. E. Hellman, New directions in cryptography, Information Theory, IEEE Transactions on, vol. 22, no. 6,1976, pp. 644–654. [8] U. Freese, Smarthomatic, http://www.smarthomatic.org/,21.06.2015. [9] Atmel, Data sheet atmega48pa/88pa/168pa/328p, http://www.atmel.com/doc8161.pdf. [10] V. Coskun, K. Ok, and B. Ozdenizci, Near Field Communication (NFC): From Theory to Practice. John Wiley & Sons, 2011. Wireless sensor or actuator device configuration by NFC 2017-18 DEPT. OF ECE, SJCIT Page 30 [11] STMicroelectronics, Data sheet dynamic nfc/rfid tag ic m24sr02-y, http: / /www . st . com [12] N. F. Forum, Type 4 tag operation specification: technical specification, http: / / apps4android . org / nfc - specifications / NFCForum-TS-Type-4-Tag_2.0.pdf.
  • 6. [13] Bitesmanufaktur GmbH, Iso14443 - openpcd, http : / / www . openpcd.org/ISO14443, 2014.