Near Field Communication
Researcher Name: Pasan Abeywickrama
Date: 18.01.2013
Table of Contents 1. Introduction 3 2. Mechanism 4 2.1 Industry Standards and Compatibility 4 2.2 Types of Communication Modes: 4 2.3 Modulation 5 2.3.1 Manchester Code 6 2.3.2 Modified Miller Code 6 2.4 Coupling 6 3. Advantages and Disadvantages 7 3.1 Advantages 7 3.2 Disadvantages 7 4. NFC compare with other Technologies (Bluetooth and Infrared) 7 5. Security Perspective 7 5.1 Data Destruction 8 5.2 Data Modification 8 5.3 Man-in-the-Middle 8 5.4 Eavesdropping 8 5.5 Data Insertion 8 5.6 NFC secure channel 8 6. Projects implemented using NFC 9 6.1 LAUGFS unveils NFC enabled fuel card powered by Dialog 9 6.2 San Francisco Launches NFC
…show more content…
2.1 Industry Standards and Compatibility
NFC technology is described by NFCIP-1 (Near Field Communication Interface and Protocol 1), is standardized in ISO 18092, ECMA 340 as well as in ETSI TS 102 190, while reader/writer mode must support the RF requirements for ISO/IEC 14443A, ISO/IEC 14443 B and FeliCa. These standards specify the transport protocol, transfer speeds, bit encoding schemes, the frame architecture, and the modulation. Furthermore, the active and passive NFC modes are described and the conditions that are required to prevent collisions during initialization (ECMA International, 2004). Today’s NFC devices allows for selecting one of three operating modes such as: * NFC data transfer (NFCIP-1) * Vicinity coupling device (VCD), defined in ISO 15693 * Proximity coupling device (PCD), defined in ISO 14443
All NFC devices have to provide these three functions in order to be compatible with the main international standards to connect with the millions of contactless smartcards and scanners worldwide.
2.2 Types of Communication Modes:
NFC can operate in two different modes; it is an active and passive. An active device generates its own radio frequency (RF) field, where as a device in passive mode has to use inductive coupling to transmit data. Mobile phone such as battery powered devices act as in passive mode. In contrast to the active
The RFID technology consists of three kinds of tags i.e. active RFID tags, passive RFID tags, and battery
A large number of Increased NFC handset availability advanced the deployment of NFC-payment as it clearly improves the value offered for merchants that will not only consider NFC as another payment system but also a new communication channel to the consumers. Thus NFC-based payment becomes very popular in most of the developed countries including Poland, Japan, France, UK, USA, South Korea, Singapore, Turkey and the Netherlands, due to availability of NFC-based mobile device, easy access and services .But Consumers trust in the NFC –based payment can be eroded by misleading the consumer with corrupted tag data, malware attack leading to serious economic impacts to both consumers and merchants. Thus a secure NFC-based payment against relay attack, eavesdropping, spoofing, data modification or corruption is a must.
Once the information is retrieved from the contactless card we will then look at new attack vectors, a new idea is the concept of virtual pickpocketing. Virtual pickpocketing is a fairly new concept that explores the idea of an embedded piece of malware that constantly looks for NFC signals such as a contactless debit card. The malware itself is disguised as a legitimate application that is installed on the user?s phone, once the phone comes into contact with the contactless card, the cards details are scanned and the information is relayed to a command and control server. Once the information is stored on the command and control server the attacker can now use an application to retrieve the card details and use a mobile device as if it were a contactless card to make payment for goods and services. This project has found multiple vulnerabilities in contactless payment cards; the reasons for which are discussed.
NFC payments work by storing your credit, debit, and banking information with the source company. The information is stored securely in Cloud by these companies. This information is associated with your Apple Pay or Google Wallet account. You can log in to a device and use you phone to pay for purchases. The retailer you are purchasing from must have an appropriate reader. You must first be in the payment app on your phone. Your phone is placed close to or on the reader and you must either scan your finger or enter a password for the payment to go through. The payment must then be approved by a chip called a secure element, which sends approval after the payment is authorized, completing the transaction. NFC transactions are becoming a very secure and quick way to pay for purchases. These purchases are becoming more normal in stores, on vending machines, and in busy metropolitan areas.
In contrast to the use and operation of Bluetooth, NFC does not require two devices to be paired prior to the exchange of information. So, NFC-enabled tags are used in conjunction with NFC-equipped devices. The tags are inexpensive and forward out encoded data wirelessly. After an NFC tag has been encoded with the desired data or action, the tag is ready to be used. Users simply touch the back of their NFC-equipped device against the tag and the device will proceed to launch the specified action (such as a URL, application, or service). NFC tags are usually found in the form of a sticker and roughly the size of the average postage stamp. When
Badra, M., & Badra, R. B. in [41] studied the issues that are related to the NFC technology. The researchers suggested and provided an appropriate
A card that has an embedded chip that always set the smart card codes or token secure. The size of any smart card is similar to the size of driving license and it can be made of plastic or even metal. There are two ways to connect or link the smart card with the reader either through straight physical communication, which recognized as chip and dip and the other way of connecting is by using the short range wireless connectivity well known as NFC (near field communication) (Michael Cobb, 2010) NFC is supported by ISO an international organization and to make the
The technology correlates with the telecommunications and consists of microwave power transmission antennas covering certain areas capable of powering portable electronics on the go. The power would be transmitted freely through the air, but electronic gadgets would have embedded chips for authentication procedures. They would be connected to smartphones to make payment easier and more convenient.
Abstract - Today healthcare is using information and communication technologies approach for early detection, prevention of disease and long-term management of healthcare in many developed countries to improve quality of life. With the increasing number of health issues across different parts of the world, there is a need of management system with efficient patient and doctor identification, to store and retrieve patient records to ensure a proper context between the patient and the correct medical documentation. NFC tag can be employed for automation of identification of patient and doctors in hospital usingsmart phones and tablet computers that use the Android platform NFC can be used to explore new ways of realtime hospital workflows and data processing in the medical world. Using NFC technology, physicians can easilyview recent ward round results and update information without manually paper works.
Near Field Communication (NFC) standards were first developed by the NFC forum, which was founded by a consortium of Nokia, Sony and Philips in the year 2004. It is a wireless communication standard that uses magnetic induction to fill the physical space between devices in close proximity to one another in order to exchange data, usually in the 13.56 MHz band. Since it is closely spaced (less than 10 cm), it is more secure than other wireless tools like Wi-Fi and Bluetooth. There are two types of NFC devices: Active devices have their own power source can read information from an NFC tag and respond to other devices, and passive NFC devices, which lack the power source and can only send data. Since the data being exchanged is often sensitive – credit card numbers and medical data, for example – NFC encrypts the data and sends it over a unique, secure channel. (Chris, 2014). Furthermore, NFC-enabled device can operate in three different modes. They are reader/writer mode, peer-to-peer mode, and card emulation mode.
As shown in the figure 5.2.1, it is the general structure of the token based mobile pay. Users should register their card details at first. These personal account number will be sent to the issuing bank first, the bank will provide the tokenization service and send the token back to the devices. The devices will store these tokens and encrypt it for security. Later, if user wants to do a transaction, at the POS reader part, it will use the NFC technique to read information first. And then, the tokens will be sent to the token server to verify its transaction validity by re-locating the relationship between tokens and PAN and finish the transaction authorization.
Nowadays there is an abundant use of mobile phones and PDA’s with Bluetooth capability and some of the devices are even the NFC enabled devices. In order for NFC enabled devices, consumer services and payment are rapidly adopted in the consumer market. NFC technology can help in improving services at a higher efficiency.
The basic idea of the NFC is designed and was built upon the radio frequency identification technology (RFID). An RFID system has two components, a reader and a target. The reader is an electronic device which is active and generates the radio frequency field while the target devices uses that specific field for the
A smart card is a card generally made of plastic same like a credit or debit one .It consists of a integrated microprocessor and a memory. Two ways of it exchanging data with the outside world are via contact cards and via contactless cards that use radio frequency. To interchange information the card is to be put in a reader (contact cards) or kept in the connection area of a contactless reader. Smart cards do not require batteries or any power supply .Power is provided by the reader. It is necessary for a card to have a certain microprocessor or logic for it to be called a smart card. Security and mobility are the two main features of a smart card. The applications that are linked to a smart card system have the major requirement of
they need in this paper we utilize this technology and present a payment method and