2. Outline
Introduction.
Related Technologies in wireless communication.
NFC and Its Technical Features, modes of operation.
Categories.
Uses of NFC.
NFC-Bluetooth integration.
E-wallet.
2
3. 3 Radio Based Technologies
Bluetooth technology is capable of forming small wireless
networks between devices. Bluetooth enabled devices can be
put into “discoverable” mode allowing them to announce their
presence to other devices.
RFID is a technology that uses communication via radio waves
to exchange data between a reader and an electronic tag attached
to an object, for the purpose of identification and tracking. Some
tags can be read from several meters away and beyond the line of
sight of the reader. The application of bulk reading enables an
almost parallel reading of tags.
Near Field Communication or NFC, is a short-range high
frequency wireless communication technology which enables
the exchange of data between devices over about a 10 centimeter
(around 4 inches) distance.[
3
4. What is NFC?
NFC (Near Field Communication) is a wireless
proximity communication technology.
It was jointly developed by Sony and Philips.
The NFC transmission runs helping duplex, i.e. that
one of the two devices can send only in each case or
receive at a time.
It’s a tag, and a reader Based Technology.
More point up authenticate of personal than RFID.
4
5. Technical Features
IEEE 802.11 is a set of standards for implementing wireless
local area network (WLAN) computer communication.
NFC is based on RFID which is a system that
communicates using radio waves between a reader and an
electronic tag attached to an object.
NFC Has A frequency of 13.56 MHz
NFC has a short range and supports encryption
NFC employs two different coding to transfer data. If an
active device transfers data at 106 Kbit/s, a modified Miller
coding is used. In all other cases Manchester coding is
used.
5
6. Wireless Communication
Technology Comparision
Wi-Fi Bluetooth Infrared NFC
Range 0 ~ 100 m 0 ~ 10 m 0~1m < 50 cm
Transfer High Medium Medium Low
rate 54 Mbps 1 Mbps 424 kbps
Security Low High Low Very High
Cost High Medium Medium Very Low
6
7. NFC vs. Bluetooth
Bluetooth was invented in 1994 by Ericsson Company. . As far back as 2005,
Nokia launched the Nokia 3220 with an NFC-modified back cover. But it was only
really in 2007 with the Nokia 6131 NFC, that the tech started to make waves.
Bluetooth didn't fail, it just didn't evolve.
Failures in basic stack implementation like Buffer overflows.
Numerous applications can exploit Bluetooth like Bluetooth scanner.
Worms already exist like Pocket(Duts/Dust) and Symbian (Cabir)
Bluetooth has the ability to handle data and voice transmissions at the same time
which allows it to be used in a wide range of applications capabilities.
NFC has the Ability to interact with passive devices and is secure and fast.
There are a number of security risks associated with this technology, such as
“Bluejacking” and “Bluebugging”.
New Game for Hackers : Hackers are becoming increasingly interested in
attacking Bluetooth devices.
Bluetooth devices can also be targets of Denial of Service (DoS) attacks
7
8. What are the benefits of NFC?
The NFC provides the following comprehensive list of benefits:
• Intuitive: NFC interactions require no more than a simple touch.
• Versatile: NFC is ideally suited to the broadest range of
industries, environments, and uses.
• Open and standards-based: The underlying layers of NFC technology
follow universally implemented ISO, ECMA, and ETSI standards.
• Technology-enabling: NFC facilitates fast and simple setup of
wireless technologies, such as Bluetooth, Wi-Fi.
• Inherently secure: NFC transmissions are short range (from a touch
to a few centimetres).
• Interoperable: NFC works with existing contactless card
technologies.
• Security-ready: NFC has built-in capabilities to support secure
applications.
8
9. Tags
Passive entities.
Tags are Unpowered chips having built-in radios and
wireless reader.
Finland became the world’s most NFC tagged city with
1500 NFC info tags installed.
9
10. Modes of Communication
There are two modes:
Passive communication mode: The initiator device
provides a carrier fields and the target device answers by
modulating the existing field. In this mode, the target
device may draw its operating power from the initiator-
provided electromagnetic field, thus making the target
device a transponder.
Active communication mode: Both initiator and target
device communicate by alternately generating their own
fields. A device deactivates its RF field while it is waiting
for data. In this mode, both devices typically have power
supplies.
10
11. Why do I Need NFC?
The major advantage of NFC over other wireless
communication technology is
NFC offers a low-speed connection with extremely
simple setup which is very quick.
Security related features.
Versatility.
Cheap. A single tag costs around 5 cents.
11
12. Operational Modes
Reader/Writer Mode(Proximity Coupling Device):This mode
allow the user to retrieve additional information.
Peer-to-Peer: This mode allow two NFC enabled devices
to establish a bidirectional connection to exchange
contacts, Bluetooth pairing information or any other
kind of data.
Card Emulation (Proximity Inductive Coupling Card,
PICC):This mode is useful for payment and ticketing
applications for example.
12
13. Uses of NFC
Connect electronic devices .
Access digital content, using a wireless device such as a mobile phone to read a
“smart” poster embedded with an RF tag,url etc.
Make contactless transactions, including those for payment, access and
ticketing.
Exchange of information such as schedules, maps, business card and coupon
delivery in a few hundred milliseconds;
Pay for items just by waving your phone over the NFC capable devices.
Transferring images, posters for displaying and printing
It could, for example, replace the pairing step of establishing connections.
NFC can be used in social networking situations, such as sharing contacts,
photos, videos or files ,and entering multiplayer mobile games.
Reading information and “picking up” special offers, coupons and discounts
from smart posters or smart billboards
14
15. Categories of NFC
Touch and Go: Applications such as access control or
transport/event ticketing, where the user needs only to
bring the device storing the ticket or access code close to
the reader. Also, for simple data capture applications, such
as picking up an Internet URL from a smart label on a
poster.
Touch and Confirm: Applications such as mobile
payment where the user has to confirm the interaction by
entering a password or just accepting the transaction.
Touch and Connect: Linking two NFC-enabled devices to
enable peer to peer transfer of data such as downloading
music, exchanging images or synchronizing address books.
Touch and Explore: NFC devices may offer more than one
possible function. The consumer will be able to explore a
device's capabilities to find out which functionalities and
services are offered. Eg-url tags
16
16. Why not NFC!!!
Currently, there are not many NFC devices and NFC tag based
system available.
Some Security threats like:
Ghost and Leech, using an RFID reader to steal or transmit the
victim’s credentials to a fake RFID card. This is an attack that extends
the range (normally a few centimetres) of a “tap and pay” transaction,
letting an attacker basically pick your virtual pocket. Attackers can buy
used RFID readers to assist in pulling off this attack.
Collin Mulliner’s Python NDEF library, tools for reading and writing
NFC tags. Mulliner has demonstrated phishing, fuzzing, and spoofing
attacks against mobile phones with NFC. The library was developed for
use against a specific NFC-enabled phone, but the greater availability
of new Android-based NFC phones will make it easier to update in the
future.
Limited range
17
17. NFC, A Future Technology
New generations of iPhone, iPod and iPad products
would reportedly be equipped with NFC capability
which would enable small-scale monetary transactions
May 2011, Google announced Google Wallet, an
Android application that will make use of NFC to
make payments at stores
Microsoft announced that all Windows Phone 8
devices will make use of the NFC technology.
Controller of the Wii U home console will have install
a NFC function
18
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another bluetooth enabled device via the OBEX protocol.Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos.A related hacking technique is called bluebugging, and it involves accessing the phone’s commands so that the hacker can actually make phone calls, add or delete contact info
Type 1 and type 2 tags are dual state and may be either read/write or read-only. Type 3 and Type 4 tags are read-only, data being entered at manufacture or using a special tag writer.
NFC data exchange format
In the near future NFC will be the frontrunner technology for data capture, data transfer and access control applications. NFC technology continues to evolve and develop new applications. It is going to bring revolution in mobile communications .There will be a significant spike in NFC activities in future.