You are on page 1of 24

PRESENTATION ON:

NEAR FIELD

COMMUNICATION

TOPICS
INTRODUCTION ESSENTIAL SPECIFICATIONS THE STAGE THE PROTOCOL UNIQUE FEATURES COMPARISON WITH BLUETOOTH ADVANTAGES DRAWBACKS USES AND APPLICATIONS CONCLUSION REFERENCE

INTRODUCTION
Near Field Communication (NFC)represents the second generation of the proximity contact-less technology, which supports peer-to-peer communication, and enables consumer access to aggregated services, anytime, anywhere, with any type of consumer stationary and mobile devices. The concept is strikingly simple: in order to make two devices communicate, bring them together or make them touch.

Wireless Short Range Communication Technology


Based on RFID technology at 13,56 MHz Operating distance typical up to 10 cm Compatible with today s field proven contactless RFID technology Data exchange rate today up to 424 kilobits/s
RFID object 13,56MHz RF Link

ESSENTIAL SPECIFICATIONS
near-field communication is mediated by magnetic induction between two loop antennas located within each other's near field, effectively forming an air-core transformer. Working distance with compact standard antennas: up to 20 cm Supported data rates: 106, 212, 424 or 848 kbit/s NFC employs two different codings to transfer data. If an active device transfers data at 106 kbit/s, a modified Miller coding with 100% modulation is used. In all other cases Manchester coding is used with a modulation ratio of 10%. NFC devices are able to receive and transmit data at the same time. Thus, they need to check the radio frequency field and can detect a collision if the received signal matches the transmitted signal's modulated frequency band.

THE STAGE
Transfer of content

Set up of communication for other protocols

THE PROTOCOL
The protocol establishes wireless network connections between network appliances and consumer electronics devices. NFC protocol distinguishes between the Initiator and the Target of the communication. The Initiator, as follows from the name, is the device that initiates and controls the exchange of data The Target is the device that answers the request from the Initiator. NFC protocol also distinguishes between two modes of operation: Active mode and Passive mode.

In the Active mode of communication both devices generate their own RF field to carry the data. In the Passive mode of communication only one device generates the RF field while the other device uses load modulation to transfer the data. The protocol specifies that the Initiator is the device responsible to generate the RF field.

UNIQUE FEATURES
It is easy to control whether the two devices communicate by simply placing them next to each other or keeping them apart. The procedure of establishing the protocol is inherently familiar to people: you want something to communicate touch it. This allows for the establishment of the network connection between the devices be completely automated and happen in a transparent manner.

The NFC protocol is also compatible with the widely used contactless smart card protocols FeliCa and Mifare Also, the protocol can be used easily in conjunction with other protocols to select devices and automate connection set-up.

COMPARISONS WITH BLUETOOTH


NFC sets up faster than standard Bluetooth. The connection between two NFC devices is automatically established quickly in less than a tenth of a second. NFC has a shorter range, which reduces the likelihood of unwanted interception. NFC requires comparatively low power, similar to the Bluetooth V4.0 low energy protocol.

ADVANTAGES
NFC is designed for short distance wireless communication Allows intuitive initialization of wireless networks NFC is complementary to Bluetooth and 802.11 with their long distance capabilities NFC also works in dirty environment NFC does not require line of sight Easy and simple connection method Provides communication method to non-self powered devices

DRAWBACKS
Eavesdropping The RF signal for the wireless data transfer can be picked up with antennas Data modification Data destruction is relatively easy to realize Relay attack Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC Lost property Losing the NFC RFID card or the mobile phone will open access to any finder and act as a single-factor authenticating entity. Walk off Lawfully opened access to a secure function or data is protected by timeout closing after a period of inactivity

USES AND APLLICATIONS

CONCLUSION
We presented typical use cases for NFC interfaces. A list of threats has been derived and addressed. NFC by itself cannot provide protection against eavesdropping or data modifications. The only solution to achieve this is the establishment of a secure channel over NFC. This can be done very easily, because the NFC link is not susceptible to the Man-in-the-Middle attack. Therefore, well known and easy to apply key agreement techniques without authentication can be used to provide a standard secure channel. This resistance against Man-in-the-Middle attacks makes NFC an ideal method for se-cure pairing of devices. Additionally, we introduced an NFC specific key agreement mechanism, which provides cheap and fast secure key agreement.

REFERENCES
1. "Information technology - Telecommunications and information exchange between sys-tems Near Field Communication Interface and Protocol (NFCIP-1)", ISO/IEC 18092, First Edition, 2004-04-01. 2. Klaus Finkenzeller, "RFID Handbuch", Hanser Verlag, 2002. 3. Morris Dworkin, "Recommendation for Block Cipher Modes of Operation", NIST Special Publication 800-38A, 2001. 4. W. Diffie and M.E. Hellman, "New directions in cryptography", IEEE Transactions on In-formation Theory 22 (1976), 644-654. 5. www.ecma-international.org

PREPARED BY: MANISHA NAIN ROLL NO. 5508410 I.T. 6TH SEM

You might also like