Near field communication (NFC) is a short-range wireless technology that allows data exchange between devices over distances of about 10 cm or less. It operates at 13.56 MHz and supports data rates up to 424 kbps. NFC aims to enable contactless transactions and data sharing between mobile or handheld devices. Common applications include ticketing, payment, and device pairing. While convenient, NFC has security limitations as data can potentially be intercepted via eavesdropping. Establishing a secure channel is recommended for transmitting sensitive information.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
On Relaying NFC Payment Transactions using Android devicescgvwzq
NFC (Near Field Communication) defines the set of RFID standards designed to bidirectionally communicate via wireless and interchange data point-to-point between devices in proximity, normally a few centimeters (up to 10cm). Services that use NFC communications as contactless payments are exponentially growing: Public transport, parkings, fast supermarket cashers, vending machines and even NFC-capable credit/debit cards.In this talk, we investigate relay attacks in NFC-capable credit/debit cards. This attack exploits the communication proximity principle in NFC, which is shown to be non secure. Although a lot of attack countermeasures exist, they do not face with this attack vector since up to date special hardware was required to perform it. However, the story is rewritten with the NFC-capable mobile devices available in the market.
This work shows how nowadays a relay attack in NFC-capable credit/debit cards is possible using an NFC-capable Android device without further modifications (i.e., no root permissions, custom firmware, or custom OS are required). A PoC app implementing the attack is shown in the talk, as well as distributed relay attack scenarios that might become real before long.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
On Relaying NFC Payment Transactions using Android devicescgvwzq
NFC (Near Field Communication) defines the set of RFID standards designed to bidirectionally communicate via wireless and interchange data point-to-point between devices in proximity, normally a few centimeters (up to 10cm). Services that use NFC communications as contactless payments are exponentially growing: Public transport, parkings, fast supermarket cashers, vending machines and even NFC-capable credit/debit cards.In this talk, we investigate relay attacks in NFC-capable credit/debit cards. This attack exploits the communication proximity principle in NFC, which is shown to be non secure. Although a lot of attack countermeasures exist, they do not face with this attack vector since up to date special hardware was required to perform it. However, the story is rewritten with the NFC-capable mobile devices available in the market.
This work shows how nowadays a relay attack in NFC-capable credit/debit cards is possible using an NFC-capable Android device without further modifications (i.e., no root permissions, custom firmware, or custom OS are required). A PoC app implementing the attack is shown in the talk, as well as distributed relay attack scenarios that might become real before long.
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...nwgong
In this paper we describe the design and implementation of a new versatile, scalable and cost-effective sensate surface. The system is based on a new conductive inkjet technology, which allows capacitive sensor electrodes and different types of RF antennas to be cheaply printed onto a roll of flexible substrate that may be many meters long. By deploying this surface on (or under) a floor it is possible to detect the presence and whereabouts of users through both passive and active capacitive coupling schemes. We have also incorporated GSM and NFC electromagnetic radiation sensing and piezoelectric pressure and vibration detection. We report on a number of experiments which evaluate sensing performance based on a 2.5m x 0.3m hardware test-bed. We describe some potential applications for this technology and highlight a number of improvements we have in mind.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...nwgong
In this paper we describe the design and implementation of a new versatile, scalable and cost-effective sensate surface. The system is based on a new conductive inkjet technology, which allows capacitive sensor electrodes and different types of RF antennas to be cheaply printed onto a roll of flexible substrate that may be many meters long. By deploying this surface on (or under) a floor it is possible to detect the presence and whereabouts of users through both passive and active capacitive coupling schemes. We have also incorporated GSM and NFC electromagnetic radiation sensing and piezoelectric pressure and vibration detection. We report on a number of experiments which evaluate sensing performance based on a 2.5m x 0.3m hardware test-bed. We describe some potential applications for this technology and highlight a number of improvements we have in mind.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
Near Field Communications (NFC) is an evolution of contactless data exchange which is being employed in mobile phone applications for data exchange and payment processing, among other applications. This presentation covers the evolution and technical details of this communications protocol along with compliance testing requirements.
Learn more: http://wireless-connectivity-test.com
NFC, short for Near Field Communication, is a short range wireless RFID technology that makes use of interacting electromagnetic radio fields instead of the typical direct radio transmissions used by technologies such as Bluetooth. It is meant for applications where a physical touch, or close to it, is required in order to maintain security. NFC is planned for use in mobile phones for, among other things, payment, in conjunction with an electronic wallet
Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
In This presentation we will go through
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
NFC is wireless technology which provides communication between two mobile phones which
contain NFC tags, using short range radio waves. It uses the magnetic field induction for this purpose. Both devices can communicate with each other using NFC technology when they touch each other or brought very close to each other. It requires short range of approximately ten centimeters to perform the exchange of information between two devices.
We can do payment using our NFC enabled phone by swiping it out in front of the phone reader and then the purchase price will automatically paid from credit card or debit card. Our mobile phone can be used in place of wallet, credit cards, debit cards etc. We don’t need to carry our credit card or debit card with us. But with these advantages, we will have to face disadvantages too. There are some security threats to NFC technology, which should be prevented.
NFC technology uses RFID (Radio Frequency Identification) for data/information exchange between two devices over a short distance like Bluetooth and Wi-Fi technology. NFC enabled smartphone users can make transactions and access information with only a simple touch. NFC devices can send and receive data simultaneously. So this technology has a very bright future scope. Since it is a new technology, so NFC enabled mobile users need to be educated on how it will work for them to make payment or exchange any information. But there is a requirement of a protected infrastructure for NFC technology so that it could be widely adopted all over the world. This technology has several advantages over other wireless technology because it provides bidirectional communication for exchanging information.
For example if someone have a laptop and cell phone equipped with NFC, then he/she can easily download data from Internet into the cell phone by simply touching
the cell phone with laptop. Like that you may take pictures by the cell phone and if you want to show those pictures to your friends on big screen then you may just touch your phone with TV and show them. Or if you want to print those pictures then by touching the cell phone with NFC equipped printer will give you the prints of those pictures. This principle works with any kind of
devices equipped with NFC to communicate with each other.
It’s operating frequency is 13.56MHz. Working distance with compact standard antennas is up to 10 cm. The rate of transfer of data is around 106 to 424 Kbit/s. For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag.
NFC traces its roots back to radio-frequency identification, or RFID. RFID allows a reader to send radio waves to a passive electronic tag for identification, authentication and tracking.
2004 Nokia, Philips and Sony established the Near Field Communication (NFC) Forum.
2006 Initial specifications for NFC Tags.
2006 Nokia 6131 was the first NFC phone.
2009 In January, NFC Forum released Peer-to-Peer standards to transfer contact, URL, initiate Bluetooth, etc.
2010 Samsung Nexus S: First Android NFC phone shown.
2013 Samsung and Visa announce major partnership to develop mobile payments
NFC was approved as an ISO/IEC standard on December 8, 2003 and later as an ECMA standard.
ISO/IEC 18092 / ECMA-340 - Near Field Communication Interface and Protocol-1 (NFCIP).
ISO/IEC 21481 / ECMA-352 - Near Field Communication Interface and Protocol-2 (NFCIP-2).
NFC incorporates a variety of existing standards including ISO/IEC 14443.
In addition, the NFC Forum has defined a common data format called NFC Data Exchange Format (NDEF).
As with proximity card technology, near-field communication uses magnetic induction between two loop antennas located within each other's near field, effectively forming an air-core transformer.
NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target.
This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require batteries.
NFC peer-to-peer communication is possible, provided both devices are powered.
Most of the RF energy is concentrated in the allowed ±7 kHz bandwidth range, but the full spectral envelope may be as wide as 1.8 MHz when using ASK modulation
NFC is a set of short-range wireless technologies, typically requiring a distance of 10 cm or less.
NFC operates at 13.56 MHz on ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to 424 kbit/s.
It operates within the globally available and unlicensed radio frequency ISM band of 13.56 MHz.
Theoretical working distance with compact standard antennas: up to 20 cm (practical working distance of about 4 cm).
Supported data rates: 106, 212 or 424 kbit/s (the bit rate 848 kbit/s is not compliant with the standard ISO/IEC 18092).
NFC devices are able to receive and transmit data at the same time.
The 'digital wallet' exists in the cloud, and it is not tethered to one specific device such as a mobile phone, but accessible from a variety of devices such as laptop, iPad, ultrabook or even Xbox.
http://en.wikipedia.org/wiki/Near_field_communication
http://electronics.howstuffworks.com/near-field-communication6.htm
http://en.wikipedia.org/wiki/List_of_NFC-enabled_mobile_devices
http://www.techradar.com/news/phone-and-communications/what-is-nfc-and-why-is-it-in-your-phone-948410
http://near-field.blogspot.in/p/pros-cons.html
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
Near Field Communications - NFC - Uses, Applications, Cost and Much MorePraful Manjunath
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.
See More!!
2. Designed for short distance communication (up to 10 cm)
NFC or Near Field Communication is a short range high
frequency wireless communication technology
It’s a contactless card and a contactless reader in one chip
It operates at 13.56 MHz
It’s designed for low bandwidth (max speed is 424 kBaud)
Applications aimed for are
Ticketing
Payment
Device Pairing
2
Short Range
13.56MHz
RF Link
3. NFC is mainly aimed for mobile or handheld
devices.
NFC is an extension of Radio frequency
identification or RFID technology
RFID is mainly used for tracking and
identification by sending radio waves
4. In 2004,NFC Forum was formed by Nokia,
Philips, Sony, to set standards for NFC. Every
NFC enabled device will have “N-Mark” trade
mark, developed by NFC forum.
N-Mark Trade mark
5. In 2006
First mobile phone (nokia 6131) with NFC
released by NOKIA.
6. In 2010
First android phone SAMSUNG NEXUS S with
NFC support released
7. Near Field Communication is based on
inductive coupling.
NFC works using magnetic induction between
two loop antennas located within each other’s
‘near field’.
8. Operating frequency 13.56 Mhz.
Data rate 106 kbit/s to 424 kbit/s
NFC use an initiator and a target.
Initiator actively generates an RF field that can
power a passive target.
WPAN (wireless personal area network)is used
in this technology
9.
10. In active mode, both devices with NFC chip
generates an electromagnetic field and
exchange data.
In passive mode, there is only one active device
and other uses that field to exchange
information.
11. NFC application can be split into three basic
categories:
a. Touch and Go---ticketing
b. Touch and Confirm---mobile payment
c. Touch and Connect---to enable peer to peer
transfer of data
12. Nexus S
Google Nexus S 4G
Samsung Galaxy S II
Samsung Galaxy Note
Galaxy Nexus
Nokia 6212 Classic
Nokia 6131 NFC
13. 1) Coil in the first smart phone sets up a current that is picked up a second
smart phone or reader.
2) The second smart phone receives the “induced current” from the first,
recognizes it as a valid signal and offers a connection.
3) The first cell phone accepts the connection and begins the transaction.
14. 1) Coil in the smart phone sets up a current that is picked up by the smart tag
2) The smart tag receives the “induced current” from the cell phone, recognizes
it as a valid signal and offers a connection to the cell phone.
3) The cell phone accepts the connection and begins the transaction
15. Advantage of NFC
1. Two-way data communication
2. Security level is high due to encoding system
3. High recognition speed, and low recognition error
16. Make payments or use coupons via devices,
instead of credit or debit cards
Transfer files and share documents
Download information about objects, services
or places from “smart posters”
Display electronic identity documents, like air
travel boarding passes
17. There are dedicated roles
Initiator and Target
Any data transfer is a message and reply pair.
17
Initiator Target
Message
Reply
• There are dedicated modes of operation
– Active and Passive
– Active means the device generates an RF field
– Passive means the device uses the RF field generated by the other
device
18. The VCO produce frequency modulated signal
at the transmitter and phase locked loop
demodulated the signal at receiver.
19. 19
Active Passive
106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK
212 kBaud Manchester, 10% ASK Manchester, 10% ASK
424 kBaud Manchester, 10% ASK Manchester, 10% ASK
Active Passive
Initiator Possible Not Possible
Target Possible Possible
20. I am sorry, but NFC is not secure against
eavesdropping .
From how far away is it possible to eavesdrop?
Depends….
RF field of sender
Equipment of attacker
….
Does Active versus Passive mode matter?
Yes
In active mode the modulation is stronger (in particular at 106 kBaud)
In passive mode eavesdropping is harder.
Countermeasure
Secure Channel
20
21. Eavesdropping:-
NFC by itself can not protect against eavesdropping.
An attacker can use an antenna to also receive the
transmitted signals.
Data Corruption:-
Data corruption can be achieved by transmitting valid
frequencies of the data spectrum at a correct time. The
correct time can be calculated if attacker has a good
understanding of the used modulation scheme and
coding.
22. Data modification and Insertion :-
An attacker can insert massage into the data
exchange between two devices. But this is
possible only in case the answering device needs
a very long time to answer.
For the modified miller encoding with 100% ASK
this attack is feasible for certain bits and
impossible for other bits. But for Manchester
coding with 10% ASK this attack is feasible on all
bits.
23. Eavesdropping:-
Data transmitted in possible mode is significantly
harder to be eavesdropping on, but just using the
passive mode is probably not sufficient for most
applications which transmit sensitive data.
Only real solution is to establish a secure channel
between the two devices.
24. Data corruption:-
NFC devices can count this attack because they
can check the RF field while they are transmitting
data .
If an NFC device does this, it will be able to detect
the attack. The power which is needed to corrupt
the data is significantly bigger, than the power
which can be detected by the device.
This every such attack should be detectable.
25. Data modification and Insertion:-
By using 100k baud in active mode it gets impossible
for an attacker to modify the data transmitted.
NFC device should check the RF field while sending
which means the sending device could continuously
check for such an attack and could stop the data
transmission when an attack is detected.
Establishing an secure channel between in two
devices.
26. 26
1 Bit
1. Half-Bit 2. Half-Bit
100
0
Coded “0” Coded “1”
Modified Miller
Coding, 100%
ASK
Manchester
Coding, 10%
ASK
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
34. Eavesdropping
No protection
Use a Secure Channel
Data Modification
No protection
Use Secure Channel
Man in the Middle Attack
Very good protection if
Alice uses 106 kBaud
Alice uses Active – Passive mode
Alice checks for disturbance
Alice checks for suspicious answers from Bob
34
NFC Intro
Eaves-
dropping
Conclusion
Data
Modification
Man-in-the-
Middle
Contents
37. RFID Difference Barcode
$0.5/1 unit. Price $0.005/1 unit.
More than 216 . High
capacity
Storage capacity
27 .
Low capacity(about 20
letter)
Radio frequency. How to use Visible light(infrared ray)
Possible.(by using
satellite or mobile radio
communication network)
Information
understanding
in real time
Impossible.
Long distance. Distance with reader Close distance.
Read + write. Read/write capacity Only read.
Virtually none. Once up
and running, the system is
completely automated.
Human Capital
Large requirements.
Laborers must scan each
tags.
High. Durability Low.
High. Security Low.