SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NEAR FIELD COMMUNICATION (NFC)
Jeevan George Antony
Uni.Roll No: 12018124
Guided by: Mr. Arun Madhu
Assistant Professor
St. Joseph’s College of Engineering and Technology
August 7, 2015
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Overview 2
INTRODUCTION
Literature Survey - Applications Of NFC
NFC ARCHITECTURE
NFC - INITIATOR AND TARGET
NFC - COMMUNICATION MODES
NFC - OPERATING MODES
NFC - THREATS & DEFENSE
CONCLUSION
REFERENCES
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Introduction 3
Short range wireless communication technology which
validates two-way interaction between electronic devices
allowing contactless transactions and provides an ease to
connect devices with a single touch.
Based on the Radio Frequency Identification (RFID), it
uses magnetic field induction to enable communication
between electronic devices.
Designed for integration with mobile phones, which can
communicate with other phones (peer-to-peer) or read
information on tags and cards (reader).
It operates on 13.56 MHz frequency with data rate of up
to 424 kilobits per second at a distance of 10 centimeters.
Vulnerable to numerous kinds of attacks.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Literature Survey 4
Title
Near Field Communication (NFC)Technology and
Measurements White Paper Roland Minihold -06-2011
(1MA1825e)
Applications Of NFC:
Mobile payment.
Authentication, access control - store electronic keys, legit-
imations on NFC phones.
Data transfer between different NFC-units (peer-to-peer data
exchange) like NFC-smart phones, digital cameras, note-
books, etc.
Access to digital information, like Download maps from
smart poster to NFC phone.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC ARCHITECTURE 5
Figure 1: NFC ARCHITECTURE
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - INITIATOR AND TARGET 6
Initiator
NFC model involves two devices for the communication,
an initiator and a target.
Initiator starts communication and is typically an active
NFC device.it is responsible for energizing the target in
case the target device is a passive device
Target
Target device can either be an RFID tag based card or an
RFID based NFC device.They respond to the requests
generated by initiator in the form of responses.
Communication between devices takes place over a single
RF band which is shared by devices in half-duplex mode.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - COMMUNICATION MODES 7
ACTIVE AND PASSIVE
NFC interface operate in two different modes
An active device generates its own radio frequency (RF)
field, whereas a device in passive mode has to use
inductive coupling to transmit data.
For battery-powered devices,it is better to act in passive
mode.No internal power source is required in active mode.
In passive mode, a device can be powered by the RF field
of an active NFC device and transfers data using load
modulation.
Communication between two active devices is called
Active communication mode.
Communication between an active and a passive device is
called Passive communication mode.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - OPERATING MODES 8
Figure 2: Peer-To-Peer
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - OPERATING MODES ....Continuing.... 9
Figure 3: Reader/Writer Mode
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - OPERATING MODES ....Continuing.... 10
Figure 4: Tag Emulation Mode
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 11
Eavesdropping
The attacker can use bigger and powerful antennas than
the mobile devices to receive the communication.This
enables the attacker to eavesdrop an NFC communication
over greater distances.
Passive mode data transmission is comparatively difficult
to be attacked upon than Active mode communication.
Solution to this type of vulnerability is to use a secure
channel.
Communication over NFC channel should be
authentication based using the authentication and
encryption schemes.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 12
Data Modification
Here attacker changes the actual data with valid but
incorrect data.
The receiver in this case receives data manipulated by the
attacker during its transmission.
The best solution to defend against data modification
attacks is to use a secure channel for transmission and
reception of data.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 13
Data Corruption
The data transmitted over NFC interface can be modified
by an attacker if he/she can intercept it.
It can be considered as denial of service if the attacker
changes the data in an unrecognized format.
If the devices can detect the strength of an RF field and
the difference when there is some additional RF in the
same field then it can effectively counter this type of
threat.
A higher amount of power than the typical power of the
RF field is required to corrupt data being transmitted.
The increased power should be easily detected by the NFC
devices.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 14
Data Insertion
Unwanted data can be inserted in the form of messages by
an attacker into the data while being exchanged between
two devices.
The success of attacker in this manipulation depends upon
the duration of communication and the response time of
the receiving device.
A possible countermeasure is possible if the answering
device responds to the first device without a delay.
The best way to counter data insertion attack is by using
a secure channel for the communication.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats 15
Man-in-Middle Attack
A third party tricks the two legitimate parties to be the
other legitimate party and thus routing the communication
between the two parties to go through the third party.
A Man-in-Middle attack is practically impossible to be
carried out at short distance,i.e ¡10cm.
The active device should monitor the RF field for any
possible disturbance or attack scenario.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 16
Secure Channel for NFC
The best approach to guard against maximum attacks is to
use a secure channel between the communicating devices.
Diffie-Hellmann key agreement protocol can be used in
conjunction with RSA or Elliptic Curves to protect and
authenticate the channel between two communicating
devices.
The arrangement can be augmented with use of symmetric
key scheme like 3DES or AES. The arrangement can
provide confidentiality, integrity and authentication.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
NFC - Threats & Defense 17
Diffie-Hellmann key agreement protocol - method of
securely exchanging cryptographic keys over a public
channel- was one of the first public-key protocols
RSA- practical public-key cryptosystems - widely used for
secure data transmission
Elliptic curve cryptography - an approach to public-key
cryptography based on the algebraic structure of elliptic
curves over finite fields
Triple DES (3DES) - common name for the Triple Data
Encryption Algorithm symmetric-key block cipher
AES - also known as Rijndael - based on a combination of
both substitution and permutation, and is fast in both
software and hardware.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Conclusion 18
Secure channel implementations in NFC can protect against
maximum attacks. Communication over NFC channel is
protected against Man-in-Middle attack due to the small
distance of communication involved.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
References I 19
1 Naveed Ashraf Chattha. ”NFC - Vulnerabilities and De-
fense” - Short Paper, published in Information Assurance
and Cyber Security (CIACS), 2014 Conference on 12-13
June 2014, pp. 35-38 , publisher- IEEE.
2 ”Near Field Communication (NFC)Technology and Mea-
surements”-White Paper Roland Minihold-06-2011(1MA1825e)
3 ISO/IEC 18092. ”Near Field Communication - Interface
and Protocol,”-2004.
4 Near Field Communication’ - White Paper, Ecma/TC32-
TG19/2005/012, Internet: www.ecma international.org, 2005
[May. 24, 2014].
5 NFC-Near Field Communication, Reader/Writer Operating
Mode [May. 28, 2014].
Near Field
Communica-
tion
NFC
Jeevan George
Antony
References II 20
6 G. Avoine. Rfid: Adversary model and attacks on existing
protocols, EPFL, Station 14- Building INF, CH-1015 Lau-
sanne, Switzerland, Tech. Rep. LASEC-REPORT-2005-
001, Sep. 2005.
7 G. Hancke. Practical Attacks on Proximity Identification
System, in Proc. Symposium on Security and Privacy, pp.
328-333, May. 2006.
8 T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and
T. OHare, Vulnerabilities in first-generation RFID enabled
credit cards, in Proc. Conf. on Financial Cryptography and
data Security, pp. 1-22, Feb. 2007.
9 www.en.wikipedia.org/wiki/NearF ieldC ommunication.
Near Field
Communica-
tion
NFC
Jeevan George
Antony
Thank You!

Más contenido relacionado

La actualidad más candente

Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full PresentationDILIN RAJ DS
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)deepak171991
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)Jagadish Mohanty
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
near field communication
near field communicationnear field communication
near field communicationChitrabengani
 
NFC Technology
NFC TechnologyNFC Technology
NFC TechnologyNeha Singh
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Tejasvi Kurusetti
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technologyIshtdeep Hora
 
On Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicesOn Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicescgvwzq
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Pavan Kumar B S
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field CommunicationSalomon Thomas
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFCMehvish Mushtaq
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technologyshrien_sahi
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 

La actualidad más candente (20)

Nfc-Full Presentation
Nfc-Full PresentationNfc-Full Presentation
Nfc-Full Presentation
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication (NFC)
Near field communication (NFC)Near field communication (NFC)
Near field communication (NFC)
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Near-field communication
Near-field communicationNear-field communication
Near-field communication
 
near field communication
near field communicationnear field communication
near field communication
 
wireless communication
wireless communicationwireless communication
wireless communication
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technology
 
On Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicesOn Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devices
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
 
Near Field Communication NFC
Near Field Communication NFCNear Field Communication NFC
Near Field Communication NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Nfc technology
Nfc technologyNfc technology
Nfc technology
 

Destacado

Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Near field communication
Near field communicationNear field communication
Near field communicationdivyasolanki101
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Seminar Links
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONHarisankar U K
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeNFC Forum
 
Near field communication
Near field communication Near field communication
Near field communication Paurnima Pawar
 
Near field communication
Near field communicationNear field communication
Near field communicationJwal Dakwala
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsRohde & Schwarz North America
 
Near field communication new
Near field communication newNear field communication new
Near field communication newSanu Varghese
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overviewMaarten Weyn
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)ronak1207
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessJosef Noll
 
Near field communication
Near field communicationNear field communication
Near field communicationNithin Krishna
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeNFC Forum
 

Destacado (20)

Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability Initiative
 
Near field communication
Near field communication Near field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
 
Near field communication new
Near field communication newNear field communication new
Near field communication new
 
RFID: a condensed overview
RFID: a condensed overviewRFID: a condensed overview
RFID: a condensed overview
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Nfc
NfcNfc
Nfc
 
Near field communication and RFID - opening for new business
Near field communication and RFID - opening for new businessNear field communication and RFID - opening for new business
Near field communication and RFID - opening for new business
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
 

Similar a NEAR FIELD COMMUNICATION (NFC)

Near field communication
Near field communicationNear field communication
Near field communicationVaibhav Chandak
 
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY IJCI JOURNAL
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for SmartphoneEditor IJMTER
 
Security in NFC
Security in NFCSecurity in NFC
Security in NFCdo vietanh
 
Near field communication
Near field communicationNear field communication
Near field communicationanshu kumari
 
Near field communication
Near field communicationNear field communication
Near field communicationDipen Jain
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONNaveen Sampath
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)Chetan Chaudhari
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)GHADA SALEH
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESIRJET Journal
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primeramsanjeev
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationVasanth Krupa
 
Near field communication
Near field communicationNear field communication
Near field communicationNagesh Mishra
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationAman Kumar Dutt
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfSibenConor
 

Similar a NEAR FIELD COMMUNICATION (NFC) (20)

Near field communication
Near field communicationNear field communication
Near field communication
 
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY NEAR FIELD COMMUNICATION (NFC)  TECHNOLOGY: A SURVEY
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Security in NFC
Security in NFCSecurity in NFC
Security in NFC
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
Nfc
NfcNfc
Nfc
 
Nfc
Nfc Nfc
Nfc
 
NFC (near Field Communication)
NFC (near Field Communication)NFC (near Field Communication)
NFC (near Field Communication)
 
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESNEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primer
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Nfc power point
Nfc power pointNfc power point
Nfc power point
 
nfc
nfcnfc
nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
 
nfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdfnfc-120827094647-phpapp01.pdf
nfc-120827094647-phpapp01.pdf
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

NEAR FIELD COMMUNICATION (NFC)

  • 1. Near Field Communica- tion NFC Jeevan George Antony NEAR FIELD COMMUNICATION (NFC) Jeevan George Antony Uni.Roll No: 12018124 Guided by: Mr. Arun Madhu Assistant Professor St. Joseph’s College of Engineering and Technology August 7, 2015
  • 2. Near Field Communica- tion NFC Jeevan George Antony Overview 2 INTRODUCTION Literature Survey - Applications Of NFC NFC ARCHITECTURE NFC - INITIATOR AND TARGET NFC - COMMUNICATION MODES NFC - OPERATING MODES NFC - THREATS & DEFENSE CONCLUSION REFERENCES
  • 3. Near Field Communica- tion NFC Jeevan George Antony Introduction 3 Short range wireless communication technology which validates two-way interaction between electronic devices allowing contactless transactions and provides an ease to connect devices with a single touch. Based on the Radio Frequency Identification (RFID), it uses magnetic field induction to enable communication between electronic devices. Designed for integration with mobile phones, which can communicate with other phones (peer-to-peer) or read information on tags and cards (reader). It operates on 13.56 MHz frequency with data rate of up to 424 kilobits per second at a distance of 10 centimeters. Vulnerable to numerous kinds of attacks.
  • 4. Near Field Communica- tion NFC Jeevan George Antony Literature Survey 4 Title Near Field Communication (NFC)Technology and Measurements White Paper Roland Minihold -06-2011 (1MA1825e) Applications Of NFC: Mobile payment. Authentication, access control - store electronic keys, legit- imations on NFC phones. Data transfer between different NFC-units (peer-to-peer data exchange) like NFC-smart phones, digital cameras, note- books, etc. Access to digital information, like Download maps from smart poster to NFC phone.
  • 5. Near Field Communica- tion NFC Jeevan George Antony NFC ARCHITECTURE 5 Figure 1: NFC ARCHITECTURE
  • 6. Near Field Communica- tion NFC Jeevan George Antony NFC - INITIATOR AND TARGET 6 Initiator NFC model involves two devices for the communication, an initiator and a target. Initiator starts communication and is typically an active NFC device.it is responsible for energizing the target in case the target device is a passive device Target Target device can either be an RFID tag based card or an RFID based NFC device.They respond to the requests generated by initiator in the form of responses. Communication between devices takes place over a single RF band which is shared by devices in half-duplex mode.
  • 7. Near Field Communica- tion NFC Jeevan George Antony NFC - COMMUNICATION MODES 7 ACTIVE AND PASSIVE NFC interface operate in two different modes An active device generates its own radio frequency (RF) field, whereas a device in passive mode has to use inductive coupling to transmit data. For battery-powered devices,it is better to act in passive mode.No internal power source is required in active mode. In passive mode, a device can be powered by the RF field of an active NFC device and transfers data using load modulation. Communication between two active devices is called Active communication mode. Communication between an active and a passive device is called Passive communication mode.
  • 8. Near Field Communica- tion NFC Jeevan George Antony NFC - OPERATING MODES 8 Figure 2: Peer-To-Peer
  • 9. Near Field Communica- tion NFC Jeevan George Antony NFC - OPERATING MODES ....Continuing.... 9 Figure 3: Reader/Writer Mode
  • 10. Near Field Communica- tion NFC Jeevan George Antony NFC - OPERATING MODES ....Continuing.... 10 Figure 4: Tag Emulation Mode
  • 11. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 11 Eavesdropping The attacker can use bigger and powerful antennas than the mobile devices to receive the communication.This enables the attacker to eavesdrop an NFC communication over greater distances. Passive mode data transmission is comparatively difficult to be attacked upon than Active mode communication. Solution to this type of vulnerability is to use a secure channel. Communication over NFC channel should be authentication based using the authentication and encryption schemes.
  • 12. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 12 Data Modification Here attacker changes the actual data with valid but incorrect data. The receiver in this case receives data manipulated by the attacker during its transmission. The best solution to defend against data modification attacks is to use a secure channel for transmission and reception of data.
  • 13. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 13 Data Corruption The data transmitted over NFC interface can be modified by an attacker if he/she can intercept it. It can be considered as denial of service if the attacker changes the data in an unrecognized format. If the devices can detect the strength of an RF field and the difference when there is some additional RF in the same field then it can effectively counter this type of threat. A higher amount of power than the typical power of the RF field is required to corrupt data being transmitted. The increased power should be easily detected by the NFC devices.
  • 14. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 14 Data Insertion Unwanted data can be inserted in the form of messages by an attacker into the data while being exchanged between two devices. The success of attacker in this manipulation depends upon the duration of communication and the response time of the receiving device. A possible countermeasure is possible if the answering device responds to the first device without a delay. The best way to counter data insertion attack is by using a secure channel for the communication.
  • 15. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats 15 Man-in-Middle Attack A third party tricks the two legitimate parties to be the other legitimate party and thus routing the communication between the two parties to go through the third party. A Man-in-Middle attack is practically impossible to be carried out at short distance,i.e ¡10cm. The active device should monitor the RF field for any possible disturbance or attack scenario.
  • 16. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 16 Secure Channel for NFC The best approach to guard against maximum attacks is to use a secure channel between the communicating devices. Diffie-Hellmann key agreement protocol can be used in conjunction with RSA or Elliptic Curves to protect and authenticate the channel between two communicating devices. The arrangement can be augmented with use of symmetric key scheme like 3DES or AES. The arrangement can provide confidentiality, integrity and authentication.
  • 17. Near Field Communica- tion NFC Jeevan George Antony NFC - Threats & Defense 17 Diffie-Hellmann key agreement protocol - method of securely exchanging cryptographic keys over a public channel- was one of the first public-key protocols RSA- practical public-key cryptosystems - widely used for secure data transmission Elliptic curve cryptography - an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields Triple DES (3DES) - common name for the Triple Data Encryption Algorithm symmetric-key block cipher AES - also known as Rijndael - based on a combination of both substitution and permutation, and is fast in both software and hardware.
  • 18. Near Field Communica- tion NFC Jeevan George Antony Conclusion 18 Secure channel implementations in NFC can protect against maximum attacks. Communication over NFC channel is protected against Man-in-Middle attack due to the small distance of communication involved.
  • 19. Near Field Communica- tion NFC Jeevan George Antony References I 19 1 Naveed Ashraf Chattha. ”NFC - Vulnerabilities and De- fense” - Short Paper, published in Information Assurance and Cyber Security (CIACS), 2014 Conference on 12-13 June 2014, pp. 35-38 , publisher- IEEE. 2 ”Near Field Communication (NFC)Technology and Mea- surements”-White Paper Roland Minihold-06-2011(1MA1825e) 3 ISO/IEC 18092. ”Near Field Communication - Interface and Protocol,”-2004. 4 Near Field Communication’ - White Paper, Ecma/TC32- TG19/2005/012, Internet: www.ecma international.org, 2005 [May. 24, 2014]. 5 NFC-Near Field Communication, Reader/Writer Operating Mode [May. 28, 2014].
  • 20. Near Field Communica- tion NFC Jeevan George Antony References II 20 6 G. Avoine. Rfid: Adversary model and attacks on existing protocols, EPFL, Station 14- Building INF, CH-1015 Lau- sanne, Switzerland, Tech. Rep. LASEC-REPORT-2005- 001, Sep. 2005. 7 G. Hancke. Practical Attacks on Proximity Identification System, in Proc. Symposium on Security and Privacy, pp. 328-333, May. 2006. 8 T. S. Heydt-Benjamin, D. V. Bailey, K. Fu, A. Juels, and T. OHare, Vulnerabilities in first-generation RFID enabled credit cards, in Proc. Conf. on Financial Cryptography and data Security, pp. 1-22, Feb. 2007. 9 www.en.wikipedia.org/wiki/NearF ieldC ommunication.