SlideShare a Scribd company logo
Near Field
Communication

Done By
Krishnaprasad K.A.
What is NFC?
NFC is a short range communication
technology that allows communications
to take place between devices that
either touch or momentarily held close
to each other.
It is based on Radio Frequency
Identification (RFID) technology.
It works via magnetic field induction
technology and operates on an
unlicensed radio frequency band.
Specifications
Two major specifications exist for NFC
technology:
– ISO/IEC 14443: It defines the ID cards used to
store information, such as that found in NFC tags.
– ISO/IEC 18000-3: It specifies the RFID
communication used by NFC devices.

Distance: 10 cm or less
Operates at rates ranging from 106kBit/s to
424 kBit/s.
USES OF NFC
Uses
NFC builds upon RFID systems by allowing two-way
communication between endpoints, where earlier systems
such as contactless smart cards were one-way only.
It has been used in devices such as Google Nexus, powered
with Ice Cream Sandwich, named with a feature called
"Android Beam" which was first introduced in Google Nexus.
Android Beam uses NFC to enable Bluetooth on both devices,
instantly pair them, and disable Bluetooth once complete
automatically on both devices. This only works between
Android devices version Jelly Bean and above.
The advantage of using WiFi Direct over Bluetooth is that it
is much faster than Bluetooth, having a speed of 300Mbit/s
for sharing large files.
Since unpowered NFC "tags" can also be read by NFC devices,
it is also capable of replacing earlier one-way applications.
Uses in Commerce
NFC devices can be used in contactless payment
systems, similar to those currently used in credit cards
and electronic ticket smartcards, and allow mobile
payment to replace or supplement these systems.
For example, Google Wallet allows consumers to store credit card and
store loyalty card information in a virtual wallet and then use an
NFC-enabled device at terminals that also accept MasterCard PayPass
transactions.
Germany, Austria, Finland, New Zealand, Italy, Iran and Turkey,
have trialed NFC ticketing systems for public transport. Vilnius fully
replaced paper tickets for public transportation with ISO/IEC 14443
Type A cards on July 1, 2013.
India is implementing NFC based transactions in box offices for
ticketing purposes.
A partnership of Google and Equity Bank in Kenya has introduced
NFC payment systems for public transport in the Capital city Nairobi
under the branding "Beba Pay"
Uses in Wifi and BT
NFC offers a low-speed connection with extremely
simple setup, and can be used to bootstrap more
capable wireless connections.
For example, the Android Beam software uses NFC to
complete the steps of enabling, pairing and establishing
a Bluetooth connection when doing a file transfer.
Nokia, BlackBerry and Sony have used NFC technology
to pair Bluetooth headsets, media players, and
speakers with one tap in its NFC-enabled devices.
The same principle can be applied to the configuration
of Wi-Fi networks.
Other Uses
NFC can be used in social networking situations, such as sharing
contacts, photos, videos or files, and entering multiplayer mobile
games. In the field of social networking NFC is very useful to
exchange contacts and other files.
The NFC Forum promotes the potential for NFC-enabled devices to act
as electronic identity documents and keycards. As NFC has a short
range and supports encryption, it may be more suitable than earlier,
less private RFID systems.
Smartphones equipped with NFC can be paired with NFC Tags or
stickers which can be programmed by NFC apps to automate
tasks.These programs can allow for a change of phone settings, a text
to be created and sent, an app to be launched, or any number of
commands to be executed, limited only by the NFC app and other apps
on the smartphone. These applications are perhaps the most practical
current uses for NFC since it does not rely on a company or
manufacturer but can be utilized immediately by anyone anywhere
with an NFC-equipped smartphone and an NFC tag.
Why NFC?
Wide Reach & Availability
Can be used in Various Situations
Very Easy to Use
Value Added Services
Compatible with existing RFID infrastructure
Comparison
Aspect

NFC

Bluetooth

Bluetooth
Low Energy

RFID
Compatible

ISO 18000 – 3

Active

Active

Standardisation
body

ISO/IEC

Bluetooth SIG

Bluetooth SIG

Network
Standard

ISO 13157

Network Type

Point to Point

WPAN

WPAN

Range

Less than 0.2
m

~ 100 m

~ 50 m

Frequency

13.56 MHz

2.4-2.5 GHz

2.4-2.5 GHz

Bit rate

424 Kbit/s

2.1Mbit/s

1 Mbit/s

Set up time

Less than 0.1 s

Less than 6 s

Less than
0.006s

IEEE 802.15.1 IEEE 802.15.1
SECURITY ASPECTS
Eavesdropping
The RF signal for the wireless data transfer can be
picked up with antennas. The distance from which an
attacker is able to eavesdrop the RF signal depends on
numerous parameters, but is typically a small number
of metres.
Also, eavesdropping is highly affected by the
communication mode. A passive device that doesn't
generate its own RF field is much harder to eavesdrop
on than an active device.
An attacker can typically eavesdrop within 10m and 1m
for active devices and passive devices, respectively. With
the use of a patch loop antenna it is possible to place a
receiver close to the target and disguise it. This is much
like ATM skimming in that it needs to be near the
location however in this case no contact with the device
Data Modification
It is easy to destroy data by using a jammer. There is no way currently
to prevent such an attack. However, if NFC devices check the RF field
while they are sending, it is possible to detect attacks.
It is much more difficult to modify data in such a way that it appears
to be valid to users. To modify transmitted data, an intruder has to
deal with the single bits of the RF signal. The feasibility of this attack,
(i.e., if it is possible to change the value of a bit from 0 to 1 or the
other way around), is amongst others subject to the strength of the
amplitude modulation.
If data is transferred with the modified Miller coding and a
modulation of 100%, only certain bits can be modified. A modulation
ratio of 100% makes it possible to eliminate a pause of the RF signal,
but not to generate a pause where no pause has been. Thus, only a 1
that is followed by another 1 might be changed. Transmitting
Manchester-encoded data with a modulation ratio of 10% permits a
modification attack on all bits.
Walk Off
Lawfully opened access to a secure NFC function or
data is protected by time-out closing after a period of
inactivity. Attacks may happen despite provisions to
shut down access to NFC after the bearer has become
inactive.
The known concepts described primarily do not address
the geometric distance of a fraudulent attacker using a
lost communication entity against lawful access from
the actual location of the registered bearer.
Additional features to cover such an attack scenario
dynamically shall make use of a second wireless
authentication factor that remains with the bearer in
case of the lost NFC communicator. Relevant
approaches are described as an electronic leash or its
equivalent, a wireless key.
Future Aspects
Vehicle Ignition
– A NFC enabled vehicle can be unlocked and started just by
tapping the User’s NFC device onto the vehicle, thus
removing the need of keys. It can also be used to
communicate between the device and the vehicle and also
find the health of vehicle by using specific apps

Unlocking Door
– Smart keyless doors can be made by implementing NFC
technology into doors, where a single tap of the device onto
the door would unlock it eradicating the need of a key to
open it.
Nfc kp561997 kv2_kalpakkam

More Related Content

What's hot

near field communication
near field communicationnear field communication
near field communication
Chitrabengani
 
Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)
Shashank Lochan
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
Salomon Thomas
 
2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paperBoni
 
Near-field communication
Near-field communicationNear-field communication
Near-field communication
VISHNU VISWANATHAN
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
JEEVAN GEORGE ANTONY
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
avtechno
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by Logesh
Logesh Kumar
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technologyshrien_sahi
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
Vaibhav Srivastav
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Shane Turner
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real WorldRobert Labancz
 
NFC (Near Field Communication)
NFC (Near Field Communication)NFC (Near Field Communication)
NFC (Near Field Communication)Pushpak Elleedu
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Pavan Kumar B S
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
Ankur Sharma
 
NFC documation
NFC documationNFC documation
NFC documation
Saiprasad
 

What's hot (20)

Project
ProjectProject
Project
 
near field communication
near field communicationnear field communication
near field communication
 
Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
 
2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper2008 02 - ecma international nfc white paper
2008 02 - ecma international nfc white paper
 
nfc report file
nfc report filenfc report file
nfc report file
 
Near-field communication
Near-field communicationNear-field communication
Near-field communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
LALIT NFC
LALIT NFCLALIT NFC
LALIT NFC
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by Logesh
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013Nfc security shane_turner_spring2013
Nfc security shane_turner_spring2013
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real World
 
NFC (Near Field Communication)
NFC (Near Field Communication)NFC (Near Field Communication)
NFC (Near Field Communication)
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NFC documation
NFC documationNFC documation
NFC documation
 

Viewers also liked

It nfc presentation
It nfc presentationIt nfc presentation
It nfc presentation
Peerapat Kruarattikan
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesBabu Kumar
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
Vivek Prasad
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Tejasvi Kurusetti
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
Salomon Thomas
 
Near field communication
Near field communicationNear field communication
Near field communication
Sanchit Chopra
 
2008 07 - ss - near field communication
2008 07 - ss - near field communication2008 07 - ss - near field communication
2008 07 - ss - near field communicationBoni
 
Near field communication
Near field communicationNear field communication
Near field communicationNithin Krishna
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability Initiative
NFC Forum
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
Rohde & Schwarz North America
 
Near field communication
Near field communication Near field communication
Near field communication
Siddharth Dc
 
Nfc
Nfc Nfc
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
Venkat Alagarsamy
 
Near field communication
Near field communicationNear field communication
Near field communicationNagesh Mishra
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
DILIN RAJ DS
 
Near field communication new
Near field communication newNear field communication new
Near field communication newSanu Varghese
 
Nfc kdr
Nfc kdrNfc kdr
Nfc kdr
Shahul Hameed
 

Viewers also liked (20)

It nfc presentation
It nfc presentationIt nfc presentation
It nfc presentation
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slides
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
2008 07 - ss - near field communication
2008 07 - ss - near field communication2008 07 - ss - near field communication
2008 07 - ss - near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
10.1
10.110.1
10.1
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability Initiative
 
Nfc
NfcNfc
Nfc
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
 
Near field communication
Near field communication Near field communication
Near field communication
 
Nfc
Nfc Nfc
Nfc
 
Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
Nfc kdr
Nfc kdrNfc kdr
Nfc kdr
 

Similar to Nfc kp561997 kv2_kalpakkam

Near field communication
Near field communicationNear field communication
Near field communicationVaibhav Chandak
 
Near field communication
Near field communicationNear field communication
Near field communication
anshu kumari
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
Aditya Singh
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
Sabiha M
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
Neha Singh
 
Near field communication
Near field communicationNear field communication
Near field communicationDipen Jain
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationYesha Kava
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)GHADA SALEH
 
Near field communication
Near field communicationNear field communication
Near field communication
Rahul Patil
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariSandip Murari
 
NFC
NFCNFC
Near field commmunication
Near field commmunicationNear field commmunication
Near field commmunication
ashwani27sep
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02student
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
student
 
Nfc technology
Nfc  technologyNfc  technology
Nfc technology
Deepak Raj
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
mahima28
 

Similar to Nfc kp561997 kv2_kalpakkam (20)

Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
NFC tech
NFC techNFC tech
NFC tech
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
 
NFC
NFCNFC
NFC
 
Nfc
NfcNfc
Nfc
 
Near field commmunication
Near field commmunicationNear field commmunication
Near field commmunication
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
Nfc technology
Nfc  technologyNfc  technology
Nfc technology
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Nfc kp561997 kv2_kalpakkam

  • 2. What is NFC? NFC is a short range communication technology that allows communications to take place between devices that either touch or momentarily held close to each other. It is based on Radio Frequency Identification (RFID) technology. It works via magnetic field induction technology and operates on an unlicensed radio frequency band.
  • 3. Specifications Two major specifications exist for NFC technology: – ISO/IEC 14443: It defines the ID cards used to store information, such as that found in NFC tags. – ISO/IEC 18000-3: It specifies the RFID communication used by NFC devices. Distance: 10 cm or less Operates at rates ranging from 106kBit/s to 424 kBit/s.
  • 5. Uses NFC builds upon RFID systems by allowing two-way communication between endpoints, where earlier systems such as contactless smart cards were one-way only. It has been used in devices such as Google Nexus, powered with Ice Cream Sandwich, named with a feature called "Android Beam" which was first introduced in Google Nexus. Android Beam uses NFC to enable Bluetooth on both devices, instantly pair them, and disable Bluetooth once complete automatically on both devices. This only works between Android devices version Jelly Bean and above. The advantage of using WiFi Direct over Bluetooth is that it is much faster than Bluetooth, having a speed of 300Mbit/s for sharing large files. Since unpowered NFC "tags" can also be read by NFC devices, it is also capable of replacing earlier one-way applications.
  • 6. Uses in Commerce NFC devices can be used in contactless payment systems, similar to those currently used in credit cards and electronic ticket smartcards, and allow mobile payment to replace or supplement these systems. For example, Google Wallet allows consumers to store credit card and store loyalty card information in a virtual wallet and then use an NFC-enabled device at terminals that also accept MasterCard PayPass transactions. Germany, Austria, Finland, New Zealand, Italy, Iran and Turkey, have trialed NFC ticketing systems for public transport. Vilnius fully replaced paper tickets for public transportation with ISO/IEC 14443 Type A cards on July 1, 2013. India is implementing NFC based transactions in box offices for ticketing purposes. A partnership of Google and Equity Bank in Kenya has introduced NFC payment systems for public transport in the Capital city Nairobi under the branding "Beba Pay"
  • 7. Uses in Wifi and BT NFC offers a low-speed connection with extremely simple setup, and can be used to bootstrap more capable wireless connections. For example, the Android Beam software uses NFC to complete the steps of enabling, pairing and establishing a Bluetooth connection when doing a file transfer. Nokia, BlackBerry and Sony have used NFC technology to pair Bluetooth headsets, media players, and speakers with one tap in its NFC-enabled devices. The same principle can be applied to the configuration of Wi-Fi networks.
  • 8. Other Uses NFC can be used in social networking situations, such as sharing contacts, photos, videos or files, and entering multiplayer mobile games. In the field of social networking NFC is very useful to exchange contacts and other files. The NFC Forum promotes the potential for NFC-enabled devices to act as electronic identity documents and keycards. As NFC has a short range and supports encryption, it may be more suitable than earlier, less private RFID systems. Smartphones equipped with NFC can be paired with NFC Tags or stickers which can be programmed by NFC apps to automate tasks.These programs can allow for a change of phone settings, a text to be created and sent, an app to be launched, or any number of commands to be executed, limited only by the NFC app and other apps on the smartphone. These applications are perhaps the most practical current uses for NFC since it does not rely on a company or manufacturer but can be utilized immediately by anyone anywhere with an NFC-equipped smartphone and an NFC tag.
  • 9. Why NFC? Wide Reach & Availability Can be used in Various Situations Very Easy to Use Value Added Services Compatible with existing RFID infrastructure
  • 10. Comparison Aspect NFC Bluetooth Bluetooth Low Energy RFID Compatible ISO 18000 – 3 Active Active Standardisation body ISO/IEC Bluetooth SIG Bluetooth SIG Network Standard ISO 13157 Network Type Point to Point WPAN WPAN Range Less than 0.2 m ~ 100 m ~ 50 m Frequency 13.56 MHz 2.4-2.5 GHz 2.4-2.5 GHz Bit rate 424 Kbit/s 2.1Mbit/s 1 Mbit/s Set up time Less than 0.1 s Less than 6 s Less than 0.006s IEEE 802.15.1 IEEE 802.15.1
  • 12. Eavesdropping The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters, but is typically a small number of metres. Also, eavesdropping is highly affected by the communication mode. A passive device that doesn't generate its own RF field is much harder to eavesdrop on than an active device. An attacker can typically eavesdrop within 10m and 1m for active devices and passive devices, respectively. With the use of a patch loop antenna it is possible to place a receiver close to the target and disguise it. This is much like ATM skimming in that it needs to be near the location however in this case no contact with the device
  • 13. Data Modification It is easy to destroy data by using a jammer. There is no way currently to prevent such an attack. However, if NFC devices check the RF field while they are sending, it is possible to detect attacks. It is much more difficult to modify data in such a way that it appears to be valid to users. To modify transmitted data, an intruder has to deal with the single bits of the RF signal. The feasibility of this attack, (i.e., if it is possible to change the value of a bit from 0 to 1 or the other way around), is amongst others subject to the strength of the amplitude modulation. If data is transferred with the modified Miller coding and a modulation of 100%, only certain bits can be modified. A modulation ratio of 100% makes it possible to eliminate a pause of the RF signal, but not to generate a pause where no pause has been. Thus, only a 1 that is followed by another 1 might be changed. Transmitting Manchester-encoded data with a modulation ratio of 10% permits a modification attack on all bits.
  • 14. Walk Off Lawfully opened access to a secure NFC function or data is protected by time-out closing after a period of inactivity. Attacks may happen despite provisions to shut down access to NFC after the bearer has become inactive. The known concepts described primarily do not address the geometric distance of a fraudulent attacker using a lost communication entity against lawful access from the actual location of the registered bearer. Additional features to cover such an attack scenario dynamically shall make use of a second wireless authentication factor that remains with the bearer in case of the lost NFC communicator. Relevant approaches are described as an electronic leash or its equivalent, a wireless key.
  • 15. Future Aspects Vehicle Ignition – A NFC enabled vehicle can be unlocked and started just by tapping the User’s NFC device onto the vehicle, thus removing the need of keys. It can also be used to communicate between the device and the vehicle and also find the health of vehicle by using specific apps Unlocking Door – Smart keyless doors can be made by implementing NFC technology into doors, where a single tap of the device onto the door would unlock it eradicating the need of a key to open it.