NFC Report Final
NFC Report Final
A
Technical Literature Review& Seminar-I
On
NEAR FIELD COMMUNICATION (NFC)
By
MOHAMMED MUSHARRAF KHAN (20311A05T0)
II YEAR-I SEMESTER
CSE-E
On
CERTIFICATE
bonafide work that has been carried out by them as part of their Technical
This report has not been submitted to any other institute or university for
the award of any degree.
DR CH NIRANJAN KUMAR
1 ABSTRACT 1-2
3 BASE PAPER 10 - 26
4 REFERENCES 27
ABSTRACT
Near Field Communication, NFC- is one of the latest short range wireless
NFC technology enables several innovative usage scenarios for mobile devices.
NFC technology works on the basis of RFID technology which uses magnetic
transfer rate. NFC is complementary to Bluetooth and 802.11 with their long
payment, etc. Sharing (share files between phones), service discovery i.e. get
1
information by touching smart phones etc. are other possible applications of
which are available for this standard. This comprehensive survey should serve
as a useful guide for students, researchers and academicians who are interested in
2
PRESENTATION SLIDES
3
4
5
6
7
8
9
Near Field Communication (NFC)
Base Paper
1. INTRODUCTION :
has become an important feature in the emerging technical world. Before the
phones already had several types of communication options with the external
environment .When the mobile phones were introduced, the primary need was to
Mobiles (GSM) which has other services such as SMS, MMS and even internet
access. Later Bluetooth technology was introduced that connects peripherals with
phones. This technology needs two NFC compatible devices placed very near to
each other (less than 4cm) in order to communicate. NFC operates at 13.56
MHz and can transmit information up to a maximum rate of 424 Kbits per
second . In an NFC communication, two devices are needed. First device is called
the initiator which is an active device and is responsible for starting the
10
the initiator’s requests. The target device may be active or passive. The
communication starts when the active device gets close to the target and
generates a 13.56 MHz magnetic field and powers the target device(See Figure
1).The NFC technology works via magnetic field induction and operates on an
component whereas the target can be a RFID card, tag or an NFC device which
gives the reply to initiator’s request. The remaining part of this paper is structured
as follows. Section II gives a clear idea about NFC hand over, working principle
and data transmission. Section III discusses about NFC protocols and
worldwide NFC application. Section VII covers NFC setup and Section VIII
In NFC technology the communication is initiated with NFC but later the
handover mechanisms specified by NFC forum are negotiated handover and static
handover. In the first case, the initiator (handover requester) sends a handover
request to target device (handover selector) which might support multiple carriers
initiator (see Figure 2). NFC requester device can select the best possible carrier
that is compatible with both devices when it receives the response message. In
static hand over method, handover selector device does not comprise an NFC
Forum device but has a NFC Forum tag attached which gives memory space that
consumes far less power and doesn't require pairing but the highest data transfer
rate of NFC (424 Kbit/s) is lesser than that of Bluetooth V2.1 (2.1 Mbit/s).
i.e. the magnetic near-field of two conductor coils is used to pair the initiator
(Polling) device and target (Listener) device (See Figure 3). In this pairing of the
coils of initiator and target, a passive listening device also affects the active polling
or phase changes to the antenna voltage of the polling device, detected by the
polling device.
The NFC protocol needs standardization in order to be accepted by the industry for
stable, and accessible for everyone, also facilitating the protocol analysis and
device adaptation for various purposes. The standards are published by ECMA
13
International and ETSI standards. The three standards ISO/IEC 14443 A, ISO/IEC
14443 B and JIS X6319-4 are RFID standards which have been prompted by
• ISO-IEC Protocol :
ISO/IEC 7810. It also gives a detailed information about polling for proximity
cards into the field of a nearest coupling device, the initial request and reply
command content, techniques to sense and communicate with one proximity card
target and a proximity card. Protocols used by upper layers and by applications
which are used after the primary phase is detailed in ISO/IEC 14443-4.
•ISO 15963 :
This Standard gives information about the numbering systems that are accessible
for the recognition of RF tags used for the traceability of the IC and RF tag which
14
• ISO 18000:
This Standard describes active and passive communication modes for NFC
NFC technology defines two types of devices. One is initiator device and other is
target device. Initiator device is one who initiates the communication and controls
the data exchanges. Target device is the device who responds to the initiator
device. Active and Passive are the two operating modes of NFC . In active mode,
both the initiator and the target generate the RF signal on which the data is carried.
communicates back to the initiator using a technique called load modulation. NFC
uses two types of coding mechanism to transfer data, they are Manchester and
Miller coding. In addition to the two operating modes, there are three operating
modes for device communication . These three modes depend on the application.
defined message format. In this mode the NFC enabled mobile phone can perform
read/write operation on NFC tags. In Reader Mode, NFC initiator reads data from
the NFC tag where as in the writer mode, initiator writes data in to the tag. Itshould
• Smart Poster
• Remote Marketing
• Remote Shopping
• Social Networking
• Location based services
16
4.2. Peer to Peer mode:
Peer to peer mode supports link level communication. It supports two NFC enabled
any other kind. NFCIP-1 and LLCP are the two standardized options in peer to
• Exchanging Data
• Money Transfer
• Social Networking
In card emulation mode, the NFC enabled mobile device acts as a contactless smart
card. The examples of smart card are debit card, credit card, access cards etc. Data
transfer in this mode is highly secure. This mode supports the following
applications:
• Payment
• Loyalty
• Ticketing
• Access control
• Identity Services
17
5. NFC SECURITY :
5.1. Threats :
NFC technology structure. Possible threats associated with NFC are explained
below.
• Eavesdropping :
antenna in the range can receive the signal. The attacker can extract the
where the users use some secret password; the eavesdropper acquires this
information and can misuse it. It is very difficult to prevent eaves dropping as
the attacker who uses a very precise antenna can receive the signal even if the
18
• Data Corruption and Manipulation :
In NFC, data is sent from sender to receiver wirelessly. There are some specific
formats for data to be sent, so that the receiver accepts and decodes it. The data
which is not in the correct format is rejected. Data corruption and manipulation
attack arises when an attacker in between corrupts or manipulates the data. The
attacker may change the data format or change the contents in it, so that the data
becomes useless or gets rejected as it reaches the receiver. For some coding
schemes this attack is possible. The solution for this attack is to use a secure
Man in the middle attack is one step further to data corruption and manipulation
attack. In this attack a third party intercepts the communication between two
parties. The attacker acts as a relay between the sender and receiver and
forwards data (See Figure 5). The attacker can corrupt, alter, or discard the data
being sent. Man in the middle attack is very difficult to achieve in NFC links
and so it is not common. The solution for this attack is to use active-passive
communication mode.
19
Figure 5: Man in the middle attack
• NFC Worm :
NFC worm attack is found in NFC enabled phones. In this the PushRegistry
the standardized NFC Java API. Push Registry helps the applications to
• Solutions :
Establishing a secure channel between the sender and the receiver is the best
easy task to setup. A shared key can be obtained between sender and
key can be used to derive a symmetric key like 3DES or AES. The
20
6. OVERVIEW OF NFC APPLICATIONS :
This section provides an overview of NFC applications in the real world (See
Figure 6) such as in retail, automotive, office, terminal, theatre/ stadium etc. NFC
technology is used for the purpose of ticketing, payment, sharing (share files
between phones), service discovery i.e. get information by touching smart phones
etc. Some of the advantages of NFC to industrial applications are listed below :
• NFC enables touch based and easy communication between two devices.
NFC enables longer lifetime of the sensor battery in wireless sensor applications,
21
6.1. NFC Ticketing :
In NFC Ticketing, the user needs to carry a NFC enabled mobile phone to read and
store the ticket or access code from the reader. There is a ticketing sever to which a
NFC reader is connected. The user can read the ticket from the reader and store it
In NFC Mobile Payment System, credit card or debit card essentials of the user are
stored in the secure element which is built in the OS. The merchant’s NFC reader
can read the essentials to transfer the money from the account to finish the
22
Figure 8: NFC Mobile Payment
7. NFC SETUP :
Those who wish to use NFC must own an NFC compatible device or buy a SIM
card or SD card with an NFC chip installed on it. So with this, one can
communicate with other NFC devices and tags. Most common operating systems
used on NFC devices are android OS and Apple's iOS. Users can activate Google
wallet that is pre - installed on NFC compatible android phones. Other android
applications like PayPal’s mobile app, NFC payments can be downloaded from
sites like play store. Money transfer can be done by keeping two devices close to
each other. Note that it is very important to make your phone protected with a
password, to prevent a thief from unlocking the phone and using services such as
Google Wallet to purchase items or send money from the owner’s PayPal account
23
8. NFC VENDORS AND MANUFACTURERS :
There are many vendors that have been working on NFC. Some of the names and
their chipsets are given in Table I. This is only for understanding of companies that
are manufacturing NFC chipsets and most of them are not available for retail sale.
Among these companies HTC and Xiaomi are using NFC controllers from NXP
and Broadcom.Except Inside secure and MediaTek chipsets, all others will support
full duplex mode of communication. The prices of all chipsets are almost the same.
Among them, Sony’s chipset is expensive which is used in Sony’s NFC one touch
remote and NXP’s PN544 gives high level of integration and greater flexibility.
24
9. FUTURE DIRECTIONS OF NFC SERVICES :
Contactless payment and ticketing solutions are commonly available across the
world and, are compatible with NFC enabled devices. Taking these applications to
an appropriately equipped mobile device will be the next step in the adoption of
NFC.
New generations gadgets such as iPad, iPhone and iPod are equipped with NFC
technology. Recently, Microsoft announced that all Windows8 Phone devices will
make use of the NFC technology. Google’s Smartphone app, Google Wallet,
allows users to load entire credit card information and pay with the swipe of their
which will carry special content that aims to make purchases at the Olympic
Games faster.
25
10. CONCLUSION:
This paper covered the entire details of Near Field Communication (NFC)
for improving the range of NFC. NFC offers a secure and simple way for
transferring data between two electronic devices. Another advantage of NFC is its
devices in close vicinity. NFC operates at 13.56MHz and has 424kbps maximum
data transfer rate. NFC is complementary to Bluetooth and 802.11 with their long
26
REFERENCES
• http://en.wikipedia.org/wiki/Near_field_communication
• http://www.nfc-forum.org
• http://www.ecma-international.org/
• http://developer.nokia.com/community/wiki/NFC_Handover_working_princ
iple
• http://www.nearfieldcommunicationnfc.net/nfc-future.html
• http://www.radio-electronics.com/info/wireless/nfc/nfc-near-field-
communications-security.php
• http://www.nearfieldcommunication.org/nfc-security.html
• http://en.wikipedia.org/wiki/Near_field_communication
• http://www.nfcworld.com/nfc-phones-list/
• http://www.nearfieldcommunication.org/howto-setup.html
27