SlideShare a Scribd company logo
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NEAR FIELD COMMUNICATION (NFC)
Jeevan George Antony
Uni.Roll No: 12018124
Guided by: Mr. Arun Madhu
Assistant Professor
St. Joseph’s College of Engineering and Technology
August 7, 2015
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Overview 2
INTRODUCTION
Literature Survey - Applications Of NFC
NFC ARCHITECTURE
NFC - INITIATOR AND TARGET
NFC - COMMUNICATION MODES
NFC - OPERATING MODES
NFC - THREATS & DEFENSE
CONCLUSION
REFERENCES
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Introduction 3
Short range wireless communication technology which
validates two-way interaction between electronic devices
allowing contactless transactions and provides an ease to
connect devices with a single touch.
Based on the Radio Frequency Identification (RFID), it
uses magnetic field induction to enable communication
between electronic devices.
Designed for integration with mobile phones, which can
communicate with other phones (peer-to-peer) or read
information on tags and cards (reader).
It operates on 13.56 MHz frequency with data rate of up
to 424 kilobits per second at a distance of 10 centimeters.
Vulnerable to numerous kinds of attacks.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Literature Survey 4
Title
Near Field Communication (NFC)Technology and
Measurements White Paper Roland Minihold -06-2011
(1MA1825e)
Applications Of NFC:
Mobile payment.
Authentication, access control - store electronic keys, legit-
imations on NFC phones.
Data transfer between different NFC-units (peer-to-peer data
exchange) like NFC-smart phones, digital cameras, note-
books, etc.
Access to digital information, like Download maps from
smart poster to NFC phone.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC ARCHITECTURE 5
Figure 1: NFC ARCHITECTURE
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - INITIATOR AND TARGET 6
Initiator
NFC model involves two devices for the communication,
an initiator and a target.
Initiator starts communication and is typically an active
NFC device.it is responsible for energizing the target in
case the target device is a passive device
Target
Target device can either be an RFID tag based card or an
RFID based NFC device.They respond to the requests
generated by initiator in the form of responses.
Communication between devices takes place over a single
RF band which is shared by devices in half-duplex mode.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - COMMUNICATION MODES 7
ACTIVE AND PASSIVE
NFC interface operate in two different modes
An active device generates its own radio frequency (RF)
field, whereas a device in passive mode has to use
inductive coupling to transmit data.
For battery-powered devices,it is better to act in passive
mode.No internal power source is required in active mode.
In passive mode, a device can be powered by the RF field
of an active NFC device and transfers data using load
modulation.
Communication between two active devices is called
Active communication mode.
Communication between an active and a passive device is
called Passive communication mode.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - OPERATING MODES 8
Figure 2: Peer-To-Peer
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - OPERATING MODES ....Continuing.... 9
Figure 3: Reader/Writer Mode
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - OPERATING MODES ....Continuing.... 10
Figure 4: Tag Emulation Mode
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 11
Eavesdropping
The attacker can use bigger and powerful antennas than
the mobile devices to receive the communication.This
enables the attacker to eavesdrop an NFC communication
over greater distances.
Passive mode data transmission is comparatively difficult
to be attacked upon than Active mode communication.
Solution to this type of vulnerability is to use a secure
channel.
Communication over NFC channel should be
authentication based using the authentication and
encryption schemes.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 12
Data Modification
Here attacker changes the actual data with valid but
incorrect data.
The receiver in this case receives data manipulated by the
attacker during its transmission.
The best solution to defend against data modification
attacks is to use a secure channel for transmission and
reception of data.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 13
Data Corruption
The data transmitted over NFC interface can be modified
by an attacker if he/she can intercept it.
It can be considered as denial of service if the attacker
changes the data in an unrecognized format.
If the devices can detect the strength of an RF field and
the difference when there is some additional RF in the
same field then it can effectively counter this type of
threat.
A higher amount of power than the typical power of the
RF field is required to corrupt data being transmitted.
The increased power should be easily detected by the NFC
devices.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 14
Data Insertion
Unwanted data can be inserted in the form of messages by
an attacker into the data while being exchanged between
two devices.
The success of attacker in this manipulation depends upon
the duration of communication and the response time of
the receiving device.
A possible countermeasure is possible if the answering
device responds to the first device without a delay.
The best way to counter data insertion attack is by using
a secure channel for the communication.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats 15
Man-in-Middle Attack
A third party tricks the two legitimate parties to be the
other legitimate party and thus routing the communication
between the two parties to go through the third party.
A Man-in-Middle attack is practically impossible to be
carried out at short distance,i.e ¡10cm.
The active device should monitor the RF field for any
possible disturbance or attack scenario.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 16
Secure Channel for NFC
The best approach to guard against maximum attacks is to
use a secure channel between the communicating devices.
Diffie-Hellmann key agreement protocol can be used in
conjunction with RSA or Elliptic Curves to protect and
authenticate the channel between two communicating
devices.
The arrangement can be augmented with use of symmetric
key scheme like 3DES or AES. The arrangement can
provide confidentiality, integrity and authentication.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 17
Diffie-Hellmann key agreement protocol - method of
securely exchanging cryptographic keys over a public
channel- was one of the first public-key protocols
RSA- practical public-key cryptosystems - widely used for
secure data transmission
Elliptic curve cryptography - an approach to public-key
cryptography based on the algebraic structure of elliptic
curves over finite fields
Triple DES (3DES) - common name for the Triple Data
Encryption Algorithm symmetric-key block cipher
AES - also known as Rijndael - based on a combination of
both substitution and permutation, and is fast in both
software and hardware.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Conclusion 18
Secure channel implementations in NFC can protect against
maximum attacks. Communication over NFC channel is
protected against Man-in-Middle attack due to the small
distance of communication involved.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
References I 19
1 Naveed Ashraf Chattha. ”NFC - Vulnerabilities and De-
fense” - Short Paper, published in Information Assurance
and Cyber Security (CIACS), 2014 Conference on 12-13
June 2014, pp. 35-38 , publisher- IEEE.
2 ”Near Field Communication (NFC)Technology and Mea-
surements”-White Paper Roland Minihold-06-2011(1MA1825e)
3 ISO/IEC 18092. ”Near Field Communication - Interface
and Protocol,”-2004.
4 Near Field Communication’ - White Paper, Ecma/TC32-
TG19/2005/012, Internet: www.ecma international.org, 2005
[May. 24, 2014].
5 NFC-Near Field Communication, Reader/Writer Operating
Mode [May. 28, 2014].
Near Field
Communica-
tion
NFC
Jeevan George
Antony
References II 20
6 G. Avoine. Rfid: Adversary model and attacks on existing
protocols, EPFL, Station 14- Building INF, CH-1015 Lau-
sanne, Switzerland, Tech. Rep. LASEC-REPORT-2005-
001, Sep. 2005.
7 G. Hancke. Practical Attacks on Proximity Identification
System, in Proc. Symposium on Security and Privacy, pp.
328-333, May. 2006.
8 T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and
T. OHare, Vulnerabilities in first-generation RFID enabled
credit cards, in Proc. Conf. on Financial Cryptography and
data Security, pp. 1-22, Feb. 2007.
9 www.en.wikipedia.org/wiki/NearF ieldC ommunication.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Thank You!

More Related Content

What's hot

Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
DILIN RAJ DS
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
deepak171991
 
Near field communication
Near field communicationNear field communication
Near field communication
Himanshu Khandelwal
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
Jagadish Mohanty
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
Dilum Bandara
 
Near-field communication
Near-field communicationNear-field communication
Near-field communication
VISHNU VISWANATHAN
 
near field communication
near field communicationnear field communication
near field communication
Chitrabengani
 
wireless communication
wireless communicationwireless communication
wireless communication
Sakshi Bhargava
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
Neha Singh
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Tejasvi Kurusetti
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technology
Ishtdeep Hora
 
On Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicesOn Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devices
cgvwzq
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Pavan Kumar B S
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
Salomon Thomas
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
Mehvish Mushtaq
 
Near field communication
Near field communicationNear field communication
Near field communication
PRADEEP Cheekatla
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
shrien_sahi
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
mahima28
 
Nfc technology
Nfc technologyNfc technology
Nfc technology
manasvi sarkar
 

What's hot (20)

Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Near-field communication
Near-field communicationNear-field communication
Near-field communication
 
near field communication
near field communicationnear field communication
near field communication
 
wireless communication
wireless communicationwireless communication
wireless communication
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technology
 
On Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicesOn Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devices
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Nfc technology
Nfc technologyNfc technology
Nfc technology
 

Viewers also liked

Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
Deepak Kl
 
Near field communication
Near field communicationNear field communication
Near field communication
divyasolanki101
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Seminar Links
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
Vivek Prasad
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
Ankur Sharma
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
Harisankar U K
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability Initiative
NFC Forum
 
Near field communication
Near field communication Near field communication
Near field communication
Paurnima Pawar
 
Near field communication
Near field communicationNear field communication
Near field communication
Jwal Dakwala
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
Rohde & Schwarz North America
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
Sanu Varghese
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
Maarten Weyn
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
ronak1207
 
Nfc
NfcNfc
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new business
Josef Noll
 
Nfc
NfcNfc
Near field communication
Near field communicationNear field communication
Near field communication
Nithin Krishna
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
mahima28
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
NFC Forum
 

Viewers also liked (20)

Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability Initiative
 
Near field communication
Near field communication Near field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Nfc
NfcNfc
Nfc
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new business
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
 

Similar to NEAR FIELD COMMUNICATION (NFC)

Near field communication
Near field communicationNear field communication
Near field communication
Vaibhav Chandak
 
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
IJCI JOURNAL
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
Editor IJMTER
 
Security in NFC
Security in NFCSecurity in NFC
Security in NFC
do vietanh
 
Near field communication
Near field communicationNear field communication
Near field communication
anshu kumari
 
Near field communication
Near field communicationNear field communication
Near field communication
Dipen Jain
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
Naveen Sampath
 
Nfc
NfcNfc
Nfc
Nfc Nfc
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
Chetan Chaudhari
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
IJECEIAES
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
GHADA SALEH
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
IRJET Journal
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primer
amsanjeev
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
Vasanth Krupa
 
Nfc power point
Nfc power pointNfc power point
Nfc power point
Rajeev Verma
 
nfc
nfcnfc
Near field communication
Near field communicationNear field communication
Near field communication
Nagesh Mishra
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
Aman Kumar Dutt
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdf
SibenConor
 

Similar to NEAR FIELD COMMUNICATION (NFC) (20)

Near field communication
Near field communicationNear field communication
Near field communication
 
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Security in NFC
Security in NFCSecurity in NFC
Security in NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
Nfc
NfcNfc
Nfc
 
Nfc
Nfc Nfc
Nfc
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primer
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Nfc power point
Nfc power pointNfc power point
Nfc power point
 
nfc
nfcnfc
nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdf
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 

NEAR FIELD COMMUNICATION (NFC)

  • 1. Near Field Communica- tion NFC Jeevan George Antony NEAR FIELD COMMUNICATION (NFC) Jeevan George Antony Uni.Roll No: 12018124 Guided by: Mr. Arun Madhu Assistant Professor St. Joseph’s College of Engineering and Technology August 7, 2015
  • 2. Near Field Communica- tion NFC Jeevan George Antony Overview 2 INTRODUCTION Literature Survey - Applications Of NFC NFC ARCHITECTURE NFC - INITIATOR AND TARGET NFC - COMMUNICATION MODES NFC - OPERATING MODES NFC - THREATS & DEFENSE CONCLUSION REFERENCES
  • 3. Near Field Communica- tion NFC Jeevan George Antony Introduction 3 Short range wireless communication technology which validates two-way interaction between electronic devices allowing contactless transactions and provides an ease to connect devices with a single touch. Based on the Radio Frequency Identification (RFID), it uses magnetic field induction to enable communication between electronic devices. Designed for integration with mobile phones, which can communicate with other phones (peer-to-peer) or read information on tags and cards (reader). It operates on 13.56 MHz frequency with data rate of up to 424 kilobits per second at a distance of 10 centimeters. Vulnerable to numerous kinds of attacks.
  • 4. Near Field Communica- tion NFC Jeevan George Antony Literature Survey 4 Title Near Field Communication (NFC)Technology and Measurements White Paper Roland Minihold -06-2011 (1MA1825e) Applications Of NFC: Mobile payment. Authentication, access control - store electronic keys, legit- imations on NFC phones. Data transfer between different NFC-units (peer-to-peer data exchange) like NFC-smart phones, digital cameras, note- books, etc. Access to digital information, like Download maps from smart poster to NFC phone.
  • 5. Near Field Communica- tion NFC Jeevan George Antony NFC ARCHITECTURE 5 Figure 1: NFC ARCHITECTURE
  • 6. Near Field Communica- tion NFC Jeevan George Antony NFC - INITIATOR AND TARGET 6 Initiator NFC model involves two devices for the communication, an initiator and a target. Initiator starts communication and is typically an active NFC device.it is responsible for energizing the target in case the target device is a passive device Target Target device can either be an RFID tag based card or an RFID based NFC device.They respond to the requests generated by initiator in the form of responses. Communication between devices takes place over a single RF band which is shared by devices in half-duplex mode.
  • 7. Near Field Communica- tion NFC Jeevan George Antony NFC - COMMUNICATION MODES 7 ACTIVE AND PASSIVE NFC interface operate in two different modes An active device generates its own radio frequency (RF) field, whereas a device in passive mode has to use inductive coupling to transmit data. For battery-powered devices,it is better to act in passive mode.No internal power source is required in active mode. In passive mode, a device can be powered by the RF field of an active NFC device and transfers data using load modulation. Communication between two active devices is called Active communication mode. Communication between an active and a passive device is called Passive communication mode.
  • 8. Near Field Communica- tion NFC Jeevan George Antony NFC - OPERATING MODES 8 Figure 2: Peer-To-Peer
  • 9. Near Field Communica- tion NFC Jeevan George Antony NFC - OPERATING MODES ....Continuing.... 9 Figure 3: Reader/Writer Mode
  • 10. Near Field Communica- tion NFC Jeevan George Antony NFC - OPERATING MODES ....Continuing.... 10 Figure 4: Tag Emulation Mode
  • 11. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 11 Eavesdropping The attacker can use bigger and powerful antennas than the mobile devices to receive the communication.This enables the attacker to eavesdrop an NFC communication over greater distances. Passive mode data transmission is comparatively difficult to be attacked upon than Active mode communication. Solution to this type of vulnerability is to use a secure channel. Communication over NFC channel should be authentication based using the authentication and encryption schemes.
  • 12. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 12 Data Modification Here attacker changes the actual data with valid but incorrect data. The receiver in this case receives data manipulated by the attacker during its transmission. The best solution to defend against data modification attacks is to use a secure channel for transmission and reception of data.
  • 13. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 13 Data Corruption The data transmitted over NFC interface can be modified by an attacker if he/she can intercept it. It can be considered as denial of service if the attacker changes the data in an unrecognized format. If the devices can detect the strength of an RF field and the difference when there is some additional RF in the same field then it can effectively counter this type of threat. A higher amount of power than the typical power of the RF field is required to corrupt data being transmitted. The increased power should be easily detected by the NFC devices.
  • 14. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 14 Data Insertion Unwanted data can be inserted in the form of messages by an attacker into the data while being exchanged between two devices. The success of attacker in this manipulation depends upon the duration of communication and the response time of the receiving device. A possible countermeasure is possible if the answering device responds to the first device without a delay. The best way to counter data insertion attack is by using a secure channel for the communication.
  • 15. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats 15 Man-in-Middle Attack A third party tricks the two legitimate parties to be the other legitimate party and thus routing the communication between the two parties to go through the third party. A Man-in-Middle attack is practically impossible to be carried out at short distance,i.e ¡10cm. The active device should monitor the RF field for any possible disturbance or attack scenario.
  • 16. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 16 Secure Channel for NFC The best approach to guard against maximum attacks is to use a secure channel between the communicating devices. Diffie-Hellmann key agreement protocol can be used in conjunction with RSA or Elliptic Curves to protect and authenticate the channel between two communicating devices. The arrangement can be augmented with use of symmetric key scheme like 3DES or AES. The arrangement can provide confidentiality, integrity and authentication.
  • 17. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 17 Diffie-Hellmann key agreement protocol - method of securely exchanging cryptographic keys over a public channel- was one of the first public-key protocols RSA- practical public-key cryptosystems - widely used for secure data transmission Elliptic curve cryptography - an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields Triple DES (3DES) - common name for the Triple Data Encryption Algorithm symmetric-key block cipher AES - also known as Rijndael - based on a combination of both substitution and permutation, and is fast in both software and hardware.
  • 18. Near Field Communica- tion NFC Jeevan George Antony Conclusion 18 Secure channel implementations in NFC can protect against maximum attacks. Communication over NFC channel is protected against Man-in-Middle attack due to the small distance of communication involved.
  • 19. Near Field Communica- tion NFC Jeevan George Antony References I 19 1 Naveed Ashraf Chattha. ”NFC - Vulnerabilities and De- fense” - Short Paper, published in Information Assurance and Cyber Security (CIACS), 2014 Conference on 12-13 June 2014, pp. 35-38 , publisher- IEEE. 2 ”Near Field Communication (NFC)Technology and Mea- surements”-White Paper Roland Minihold-06-2011(1MA1825e) 3 ISO/IEC 18092. ”Near Field Communication - Interface and Protocol,”-2004. 4 Near Field Communication’ - White Paper, Ecma/TC32- TG19/2005/012, Internet: www.ecma international.org, 2005 [May. 24, 2014]. 5 NFC-Near Field Communication, Reader/Writer Operating Mode [May. 28, 2014].
  • 20. Near Field Communica- tion NFC Jeevan George Antony References II 20 6 G. Avoine. Rfid: Adversary model and attacks on existing protocols, EPFL, Station 14- Building INF, CH-1015 Lau- sanne, Switzerland, Tech. Rep. LASEC-REPORT-2005- 001, Sep. 2005. 7 G. Hancke. Practical Attacks on Proximity Identification System, in Proc. Symposium on Security and Privacy, pp. 328-333, May. 2006. 8 T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. OHare, Vulnerabilities in first-generation RFID enabled credit cards, in Proc. Conf. on Financial Cryptography and data Security, pp. 1-22, Feb. 2007. 9 www.en.wikipedia.org/wiki/NearF ieldC ommunication.