NEAR FIELD COMMUNICATION
ABSTRACT
Nowadays there is an abundant use of mobile phones and PDA’s with Bluetooth capability and some of the devices are even the NFC enabled devices. In order for NFC enabled devices, consumer services and payment are rapidly adopted in the consumer market. NFC technology can help in improving services at a higher efficiency.
1. INTRODUCTION
NFC is an extension of RFID (Radio Frequency Identification). RFID combines the interface of a smart card and a reader into a single device.
NFC is a short range wireless technology that provides secured two-way interaction between electronic devices. Here, the communications are established in a simple way i.e. it does not require any special set-up by the users which is
…show more content…
NFC, due to its shorter range provides a higher security than Bluetooth. Thus it makes NFC suitable for crowded areas where correlating a signal with its transmitting physical device might otherwise prove impossible.
1.1 Evolution of NFC:
Sony and Philips have taken the lead and developed the technology. It follows from the proprietary smart card protocols and can be seen as an initiative to move forward the contact-less ticketing and payment applications which can be seen as the next stage in this market. The standard for this technology was approved on 8th December, 2003. Later this standard was approved as an ECMA standard. The next stage in the standardization process came when Nokia, Sony and Philips formed the NFC forum on 18th march, 2004.The NFC forum developed quickly.
In June, 2006 NFC forum formally outlined the architecture for NFC technology. In August 2006, the NFC Forum released the first four forum approved specifications.
1.3 Differences between NFC and RFID:
NFC is different from other wireless technologies like Bluetooth, WI-Fi, RFID etc.
Bluetooth: Although NFC and Bluetooth are used to transfer data but Bluetooth can enable users to transfer the data over longer distances compared to NFC, which can only transfer data over shorter distances.
Wi-Fi: Wi-Fi is designed for LAN, which is not a short range peer to peer technology.
RFID: RFID can be used in any frequency or standard that is being used but NFC
Regardless of the frequency, method of communication, or the power supply, the goal of any RFID system is to enable specific data to be transmitted between a portable device and the tag, and then be processed and used accordingly. RFID systems are used for objects which get lost, stolen often, underutilized, or difficult to locate in a timely manner.
In this research paper we review three promising short-range wireless communication such as Radio FrequencyIdentification (RFID), Bluetooth, zigbee and Near-field Communication (NFC).NFC mobile services are an important emerging areafor NFC technology, with great potential for growth. The NFC Forum’s strategy for accelerating the growth of this business areaincludes recognizing and describing what is needed to realize successful NFC mobile services, such as key technologies, typical usecases, and the structure of the overall ecosystem. The success NFC across a broad range of applications depends on its large-scaleadoption by enterprises and consumers. This implies the need for simple, low-cost implementation of the technology in a wide variety ofdevices. This paper discusses NFC technology in detail along with its protocols, communication modes, comparison with other
An example of this would be the Apple Pay technology. Apple Pay is a mobile payments service and digital wallet application that utilizes Near Field Communication (NFC) to initiate secure payment transactions between contactless payment terminals and devices like the iPhone 6, iPhone 6 Plus and Apple Watch (Webopedia). Apple Pay allows owners of Apple devices the opportunity to add multiple credit or debit cards onto that device and instantly pay at a location by simply placing their device over the scanner. This technology could be implemented into Howard University’s Bison One Card by adding Dining Dollars or Bison Bucks into the application software, thus eliminating the need to always swipe your card at various locations around campus. This would also eliminate the struggle some students encounter of not being able to eat or swipe into the café because they have lost or misplaced their card. The biggest problem Howard University faces with implementing this new technology is the substantial cost. Blue Pay breaks down the Apple Pay implementation costs with prices of the NFC terminals in range from $300 to $500, excluding the cost of additional software upgrades if needed. Depending on which locations, if not all, across campus will support this technology, this cost will surely add up. Merchants must also weigh in the cost of employee training. Employees must understand how to properly use NFC contactless readers to process payments. The training should also include refunds, chargebacks, and cancellations. This cost can vary, depending on the size of the staff. Blue Pay ultimately estimates the total cost ranging anywhere from $1000 to $2000 per unit after factoring in hardware, software and wages (Blue
A large number of Increased NFC handset availability advanced the deployment of NFC-payment as it clearly improves the value offered for merchants that will not only consider NFC as another payment system but also a new communication channel to the consumers. Thus NFC-based payment becomes very popular in most of the developed countries including Poland, Japan, France, UK, USA, South Korea, Singapore, Turkey and the Netherlands, due to availability of NFC-based mobile device, easy access and services .But Consumers trust in the NFC –based payment can be eroded by misleading the consumer with corrupted tag data, malware attack leading to serious economic impacts to both consumers and merchants. Thus a secure NFC-based payment against relay attack, eavesdropping, spoofing, data modification or corruption is a must.
The exact definition of Near Field Communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 2in of each other. For example, if I have an iPhone specifically it will connect to the Internet and can exchange data with online services. Different providers such as AT&T Mobility, Verizon Wireless, T-Mobile USA and even Apple have joined in this new interesting way to handle their e-pays.
Security is an important part of any technology that is developed in the system. The wireless technologies have greater security threats. Similarly, the Near Field Communication technology users also have some security concerns. Information, and authentication security is the two most important concerns of any technology. Let’s list the NFC security threats,
Near field communication (NFC) is an ability available in most modern-day cell phones that allows the device to connect
The RFID market has continued to grow at a steady rate. According to a new RFID sector survey by IDTechEx Research, “The RFID market will reach $23.4 Billion in 2020. This includes tags, readers and software/services for RFID cards, labels, fobs and all other form factors - for both passive and active RFID.” (IDTechEx). RFID is a technology that will continue to play a critical role in a variety of industries as they both grow and develop.
Previously, the biggest hurdle for 2FA has been the inconvenience of it. However, the experience is constantly moving to a more convenient direction. Nowadays, mobile applications are able to use NFC to transfer all the information that starts the process of login in. The seamless process only requires the user to initiate the logging in with a
RFID, or radio frequency identification, is the new system that is replacing the use of barcodes. RFID tags allow users to more quickly obtain information from the object that the RFID tag
Tap your phone to pay and redeem offers, using NFC (near-field communication). NFC payments are currently only available in the United States.
On the other hand, the NFC technology has become the basic function of the smartphone. This technology enables the smartphone become the Octopus card reader and make payment. It makes possible for the Octopus
NFC is a standardised (ISO 18092) wireless technology that adds extra functionality to devices such as mobile phones and Personal Digital Assistants (PDAs). Devices with a NFC chip can set up a small Peer-to-Peer (P2P) network to share information. NFC devices also support: ISO 15693, ISO 14443, FeliCa and Mifare Standard. NFC is a continuation of radio-frequency identification (RFID) which also enables contactless data exchange; NFC has the advantage of a shorter range, which prevents unwanted eavesdropping, interception and surveillance. As an analogy, if you have something you want to tell someone, rather than shouting it
NFC can operate in two different modes; it is an active and passive. An active device generates its own radio frequency (RF) field, where as a device in passive mode has to use inductive coupling to transmit data. Mobile phone such as battery powered devices act as in passive mode. In contrast to the active
Near Field Communication (NFC) standards were first developed by the NFC forum, which was founded by a consortium of Nokia, Sony and Philips in the year 2004. It is a wireless communication standard that uses magnetic induction to fill the physical space between devices in close proximity to one another in order to exchange data, usually in the 13.56 MHz band. Since it is closely spaced (less than 10 cm), it is more secure than other wireless tools like Wi-Fi and Bluetooth. There are two types of NFC devices: Active devices have their own power source can read information from an NFC tag and respond to other devices, and passive NFC devices, which lack the power source and can only send data. Since the data being exchanged is often sensitive – credit card numbers and medical data, for example – NFC encrypts the data and sends it over a unique, secure channel. (Chris, 2014). Furthermore, NFC-enabled device can operate in three different modes. They are reader/writer mode, peer-to-peer mode, and card emulation mode.