SlideShare una empresa de Scribd logo
Near Field Communication
By,
M. Sabiha
MCA Final Year
120419862042
Table of Contents
What is
NFC?
History
How NFC
works?
Standards of
NFC
Applications
Comparison
with
Bluetooth
NFC Devices
Benefits of
NFC
Vulnerabilities
of NFC
1 2 3 4 5
6 7 8 9
What is NFC?
Near Field Communication (NFC) is a contact-less communication
technology based on a radio frequency (RF) field.
NFC technology is perfectly designed to exchange data between two
devices through a simple touch gesture.
In other words, Near-Field Communication (NFC) is a set
of communication protocols for communication between two electronic
devices over a distance of 4 cm (11⁄2 in) or less using a base frequency of
13.56 MHz
History of NFC
NFC is rooted in Radio-Frequency Identification (RFID)
technology which allows compatible hardware to both supply
power to and communicate with an unpowered electronic tag
using radio waves.
May 17,
1983
• The first patent with the abbreviation "RFID" was granted to Charles
Walton, founder of the company known as “Proximity Devices”.
Early
1997
• This patent was first used in Star Wars, which allowed the data
communication between two devices in close proximity.
Mar 25,
2002
• Philips and Sony applied for the six fundamental patents of NFC.
Late
2004
• Nokia launch NFC shell add-on for Nokia 5140 and later Nokia
3220 models, to be shipped in 2005.
History of NFC
2006
• This year marked the initial specifications for NFC Tags.
2007
• These NFC tags were used as the first consumer trial in the UK
for Nokia 6131 handset.
Jan 2009
• NFC Forum released Peer-to-Peer standards to transfer
contacts, URLs, initiate Bluetooth, etc
2010
• First NFC-capable smart-phone, known as Nokia C7, and first
Android NFC phone, known as Samsung Nexus were released.
2011
• NFC support becomes part of the Symbian mobile operating
system with the release of Symbian Anna version
History of NFC
2012
• Sony introduced NFC "Smart Tags" to change modes and profiles on Sony
smartphone at close range, included with the Sony Xperia P Smartphone
released the same year
2013
• IBM scientists, in an effort to curb fraud and security breaches, developed
an NFC-based mobile authentication security technology.
2014
• AT&T, Verizon and T-Mobile released Softcard, which runs on NFC-enabled
Android phones and iPhone 4 and iPhone 5 when an external NFC case is
attached
2015
• Google’s Android Pay function was launched, a direct rival to Apple Pay,
and its roll-out across the US commenced.
How NFC Works?
Bluetooth Wi-Fi
Radio
Waves
RFID
Electro
Magnetic
Fields
Active
NFC
Devices
13.56
MHz
106, 212,
or 424
kbs/s
Modes of
Operation
Peer-to-
Peer
Read/Write
Card
Emulation
ISO/IEC
GSMA
StoLPaN
NFC
Forum
Standards of NFC
Applications of NFC
• NFC devices can be used in contactless payment systems, similar to those
used in credit cards and electronic ticket smart cards and allow mobile
payment to replace/supplement these systems.
Commerce
• NFC offers a low-speed connection with simple setup that can be used
to bootstrap more capable wireless connections.
Bootstrap
• NFC can be used for social networking, for sharing contacts, text messages
and forums, links to photos, videos or files and entering multiplayer mobile
games.
Social Network
• NFC-enabled devices can act as electronic identity documents found in
Passports and ID cards, and keycards for the use in Login Cards, Car key
and Access badges, etc.
Identity and Access
Tokens
• Smartphones can be paired with NFC Tags that can be programmed by NFC
apps. These programs can allow a change of phone settings, texting, app
launching, or command execution.
Smartphone
Automation
• NFC has been used in video games starting with Skylanders: Spyro's
Adventure.
Gaming
• Adidas Telstar 18 is a soccer ball that contains an NFC chip within. The chip
enables users to interact with the ball using a smartphone.
Sports
Comparison with Bluetooth
NFC Devices
Mobile
Phones
• OnePlus
• Samsung
• IPhone 13
Operating
Systems
• Windows
• IOS
• Android
Financial
Services
• MasterCard
• Visa
Benefits of NFC
NFC allows for faster transactions which cuts down on the amount of
time customers have to wait in line as well as time spent at the
register.
Efficient
NFC technology is easy to implement with just NFC-enabled payment
terminals, like credit card terminals or integrated point of sale
systems.
Easy to
implement
NFC signals can't be hacked from across town, across the street,
because data is transmitted within centimeters from NFC devices, like
a payment terminal.
Secured
NFC make payment transactions easy, as consumers often only need
to hold up their phones or their NFC cards to make a payment.
Ease of
use
Vulnerabilities of NFC
The range of NFC is limited to a few centimeters, so the standard plain NFC is
not protected against eavesdropping and thus becomes vulnerable.
An attacker can typically eavesdrop within 10 m of an active device and 1 m for
passive devices.
Because NFC devices usually include ISO/IEC 14443 protocols, relay attacks are
feasible. For this attack the adversary forwards the request of the reader to the
victim and relays its answer to the reader in real time, pretending to be the owner
of the victim's smart card.
As NFC uses radio waves for data transfer, the possibility for any number of
security attack exist such as data corruption, data modification and imposter
attacks.
Conclusion
NFC would enable all the users to make payments simply by tapping their
mobile phones with mobile phone reader like debit card or credit card
transactions.
Many banks, mobile operators, vendors and companies are implementing NFC
technology.
Since it is new technology therefore users need to learn about this technology on
how it works.
NFC needs collaboration among banks, merchants and mobile companies to
provide a secured platform to users that support NFC technology.
But it is very crucial to set up a secured platform for NFC so that users could
adopt this technology easily.
Near Field Communication

Más contenido relacionado

La actualidad más candente

Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
Biplob Orton
 
Introducing networks
Introducing networksIntroducing networks
Introducing networks
Mansoor Shar
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jennifer Christy
 
The future of the internet
The future of the internetThe future of the internet
The future of the interneticebabyboyz
 
Smartlighting lifi
Smartlighting lifiSmartlighting lifi
Smartlighting lifi
Saurabh Verma
 
New Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the InternetNew Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the Internet
Faindra Jabbar
 
Fog Networking
Fog NetworkingFog Networking
Fog Networking
Niki Upadhyay
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
gaurav koriya
 
Computer network part 2(Types of Networks)
Computer network part 2(Types of Networks)Computer network part 2(Types of Networks)
Computer network part 2(Types of Networks)
Ashvini gupta
 
Computer technology
Computer technologyComputer technology
Computer technologyanshiagrawal
 
trends in wireless computing
trends in wireless computingtrends in wireless computing
trends in wireless computing
modukuri niharika
 
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networksCarlTodd
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...
IEEEMEMTECHSTUDENTPROJECTS
 
basics information of technology
basics information of technologybasics information of technology
basics information of technology
Mansi sharma
 
Computer networks part 1
Computer networks part 1Computer networks part 1
Computer networks part 1
Ashvini gupta
 
Network
NetworkNetwork
Network
UmairHaider9
 

La actualidad más candente (20)

Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
Introducing networks
Introducing networksIntroducing networks
Introducing networks
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The future of the internet
The future of the internetThe future of the internet
The future of the internet
 
Smartlighting lifi
Smartlighting lifiSmartlighting lifi
Smartlighting lifi
 
New Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the InternetNew Media Technology - The Ownership and Administration of the Internet
New Media Technology - The Ownership and Administration of the Internet
 
Fog Networking
Fog NetworkingFog Networking
Fog Networking
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Network
NetworkNetwork
Network
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Networks
NetworksNetworks
Networks
 
Network Summary
Network SummaryNetwork Summary
Network Summary
 
Computer network part 2(Types of Networks)
Computer network part 2(Types of Networks)Computer network part 2(Types of Networks)
Computer network part 2(Types of Networks)
 
Computer technology
Computer technologyComputer technology
Computer technology
 
trends in wireless computing
trends in wireless computingtrends in wireless computing
trends in wireless computing
 
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networks
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS The design-and-evaluation-of-an-...
 
basics information of technology
basics information of technologybasics information of technology
basics information of technology
 
Computer networks part 1
Computer networks part 1Computer networks part 1
Computer networks part 1
 
Network
NetworkNetwork
Network
 

Similar a Near Field Communication

Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
Aditya Singh
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
Ankur Sharma
 
Techpubs_NFC-TI100-R
Techpubs_NFC-TI100-RTechpubs_NFC-TI100-R
Techpubs_NFC-TI100-RJames Dickson
 
Near field communication
Near field communicationNear field communication
Near field communicationNagesh Mishra
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
Vaibhav Srivastav
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
Neha Singh
 
Near field commmunication
Near field commmunicationNear field commmunication
Near field commmunication
ashwani27sep
 
Near field communication
Near field communicationNear field communication
Near field communicationJwal Dakwala
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariSandip Murari
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02student
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
student
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
Poriumlimited
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Seminar Links
 
Near field communication
Near field communicationNear field communication
Near field communication
Rahul Patil
 
Near field communication
Near field communicationNear field communication
Near field communicationDipen Jain
 
Nfc
NfcNfc

Similar a Near Field Communication (20)

Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
Techpubs_NFC-TI100-R
Techpubs_NFC-TI100-RTechpubs_NFC-TI100-R
Techpubs_NFC-TI100-R
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
Near field commmunication
Near field commmunicationNear field commmunication
Near field commmunication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...An Electronic Ticketing System based on Near Field Communication for Concerts...
An Electronic Ticketing System based on Near Field Communication for Concerts...
 
NFC tech
NFC techNFC tech
NFC tech
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
 
nfc report file
nfc report filenfc report file
nfc report file
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 

Más de Sabiha M

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Sabiha M
 
Top-Down Estimation Approach
Top-Down Estimation ApproachTop-Down Estimation Approach
Top-Down Estimation Approach
Sabiha M
 
Kernel Computing
Kernel ComputingKernel Computing
Kernel Computing
Sabiha M
 
Goal-Setting Theory of Motivation
Goal-Setting Theory of MotivationGoal-Setting Theory of Motivation
Goal-Setting Theory of Motivation
Sabiha M
 
Decomposition
DecompositionDecomposition
Decomposition
Sabiha M
 
Advanced SQL
Advanced SQLAdvanced SQL
Advanced SQL
Sabiha M
 
Job Sequencing with Deadlines
Job Sequencing with DeadlinesJob Sequencing with Deadlines
Job Sequencing with Deadlines
Sabiha M
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
Sabiha M
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
Sabiha M
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method Invocation
Sabiha M
 
Apache web server
Apache web serverApache web server
Apache web server
Sabiha M
 
Types of parsers
Types of parsersTypes of parsers
Types of parsers
Sabiha M
 

Más de Sabiha M (12)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Top-Down Estimation Approach
Top-Down Estimation ApproachTop-Down Estimation Approach
Top-Down Estimation Approach
 
Kernel Computing
Kernel ComputingKernel Computing
Kernel Computing
 
Goal-Setting Theory of Motivation
Goal-Setting Theory of MotivationGoal-Setting Theory of Motivation
Goal-Setting Theory of Motivation
 
Decomposition
DecompositionDecomposition
Decomposition
 
Advanced SQL
Advanced SQLAdvanced SQL
Advanced SQL
 
Job Sequencing with Deadlines
Job Sequencing with DeadlinesJob Sequencing with Deadlines
Job Sequencing with Deadlines
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method Invocation
 
Apache web server
Apache web serverApache web server
Apache web server
 
Types of parsers
Types of parsersTypes of parsers
Types of parsers
 

Último

JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Último (20)

JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

Near Field Communication

  • 1. Near Field Communication By, M. Sabiha MCA Final Year 120419862042
  • 2. Table of Contents What is NFC? History How NFC works? Standards of NFC Applications Comparison with Bluetooth NFC Devices Benefits of NFC Vulnerabilities of NFC 1 2 3 4 5 6 7 8 9
  • 3. What is NFC? Near Field Communication (NFC) is a contact-less communication technology based on a radio frequency (RF) field. NFC technology is perfectly designed to exchange data between two devices through a simple touch gesture. In other words, Near-Field Communication (NFC) is a set of communication protocols for communication between two electronic devices over a distance of 4 cm (11⁄2 in) or less using a base frequency of 13.56 MHz
  • 4. History of NFC NFC is rooted in Radio-Frequency Identification (RFID) technology which allows compatible hardware to both supply power to and communicate with an unpowered electronic tag using radio waves. May 17, 1983 • The first patent with the abbreviation "RFID" was granted to Charles Walton, founder of the company known as “Proximity Devices”. Early 1997 • This patent was first used in Star Wars, which allowed the data communication between two devices in close proximity. Mar 25, 2002 • Philips and Sony applied for the six fundamental patents of NFC. Late 2004 • Nokia launch NFC shell add-on for Nokia 5140 and later Nokia 3220 models, to be shipped in 2005.
  • 5. History of NFC 2006 • This year marked the initial specifications for NFC Tags. 2007 • These NFC tags were used as the first consumer trial in the UK for Nokia 6131 handset. Jan 2009 • NFC Forum released Peer-to-Peer standards to transfer contacts, URLs, initiate Bluetooth, etc 2010 • First NFC-capable smart-phone, known as Nokia C7, and first Android NFC phone, known as Samsung Nexus were released. 2011 • NFC support becomes part of the Symbian mobile operating system with the release of Symbian Anna version
  • 6. History of NFC 2012 • Sony introduced NFC "Smart Tags" to change modes and profiles on Sony smartphone at close range, included with the Sony Xperia P Smartphone released the same year 2013 • IBM scientists, in an effort to curb fraud and security breaches, developed an NFC-based mobile authentication security technology. 2014 • AT&T, Verizon and T-Mobile released Softcard, which runs on NFC-enabled Android phones and iPhone 4 and iPhone 5 when an external NFC case is attached 2015 • Google’s Android Pay function was launched, a direct rival to Apple Pay, and its roll-out across the US commenced.
  • 8. Bluetooth Wi-Fi Radio Waves RFID Electro Magnetic Fields Active NFC Devices 13.56 MHz 106, 212, or 424 kbs/s Modes of Operation Peer-to- Peer Read/Write Card Emulation
  • 10. Applications of NFC • NFC devices can be used in contactless payment systems, similar to those used in credit cards and electronic ticket smart cards and allow mobile payment to replace/supplement these systems. Commerce • NFC offers a low-speed connection with simple setup that can be used to bootstrap more capable wireless connections. Bootstrap • NFC can be used for social networking, for sharing contacts, text messages and forums, links to photos, videos or files and entering multiplayer mobile games. Social Network • NFC-enabled devices can act as electronic identity documents found in Passports and ID cards, and keycards for the use in Login Cards, Car key and Access badges, etc. Identity and Access Tokens • Smartphones can be paired with NFC Tags that can be programmed by NFC apps. These programs can allow a change of phone settings, texting, app launching, or command execution. Smartphone Automation • NFC has been used in video games starting with Skylanders: Spyro's Adventure. Gaming • Adidas Telstar 18 is a soccer ball that contains an NFC chip within. The chip enables users to interact with the ball using a smartphone. Sports
  • 12. NFC Devices Mobile Phones • OnePlus • Samsung • IPhone 13 Operating Systems • Windows • IOS • Android Financial Services • MasterCard • Visa
  • 13. Benefits of NFC NFC allows for faster transactions which cuts down on the amount of time customers have to wait in line as well as time spent at the register. Efficient NFC technology is easy to implement with just NFC-enabled payment terminals, like credit card terminals or integrated point of sale systems. Easy to implement NFC signals can't be hacked from across town, across the street, because data is transmitted within centimeters from NFC devices, like a payment terminal. Secured NFC make payment transactions easy, as consumers often only need to hold up their phones or their NFC cards to make a payment. Ease of use
  • 14. Vulnerabilities of NFC The range of NFC is limited to a few centimeters, so the standard plain NFC is not protected against eavesdropping and thus becomes vulnerable. An attacker can typically eavesdrop within 10 m of an active device and 1 m for passive devices. Because NFC devices usually include ISO/IEC 14443 protocols, relay attacks are feasible. For this attack the adversary forwards the request of the reader to the victim and relays its answer to the reader in real time, pretending to be the owner of the victim's smart card. As NFC uses radio waves for data transfer, the possibility for any number of security attack exist such as data corruption, data modification and imposter attacks.
  • 15. Conclusion NFC would enable all the users to make payments simply by tapping their mobile phones with mobile phone reader like debit card or credit card transactions. Many banks, mobile operators, vendors and companies are implementing NFC technology. Since it is new technology therefore users need to learn about this technology on how it works. NFC needs collaboration among banks, merchants and mobile companies to provide a secured platform to users that support NFC technology. But it is very crucial to set up a secured platform for NFC so that users could adopt this technology easily.