1 / 36

Near Field Communication

Near Field Communication. by Saikiran Reddy.K 114620 M . Tech(ACS). Contents:. 1. Introduction 2. NFC Standards 3. NFC Applications 4. NFC Security Issues 5. Potential Future Opportunities 6. Conclusion 7.References. Introduction:.

ldonald
Download Presentation

Near Field Communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Near Field Communication by SaikiranReddy.K 114620 M. Tech(ACS).

  2. Contents: • 1. Introduction • 2. NFC Standards • 3. NFC Applications • 4. NFC Security Issues • 5. Potential Future Opportunities • 6. Conclusion • 7.References

  3. Introduction: • NFC is a Technology that enables a device to communicate with another at a maximum distance of around 10 cm or less. • Connects electronic devices with a touch. • Based on RFID technology at 13.56 MHz with a bandwidth of almost 2 MHz . • Developed jointly between NXP Semiconductors and sony corporation.

  4. NFC • NFC Enables One-Touch Setup of Wi-Fi and Bluetooth • Data exchange rate today up to 424 kilobits/s • Although RFID is very similar to NFC in many respects, RFID is a much broader technology. 13.56MHz RF Link NFC

  5. How it works • NFC devices communicate via magnetic field induction, where two loop antennas are located within each other's near field, effectively forming an air-core transformer. • The radius of near field communication having maximum strength can be calculated as follows. Rmax= λ/2*π or Rmaxv/2*π*f Loop antenna specifications: loop diameter 6.5 cm,inductance 3uH capacitance 45 pF

  6. Wireless Market Space

  7. NFC has 2 terminals: Initiator Target Loop Antennas Receiver Transmitter

  8. NFC employs two different codings to transferdata. If an active device transfers data at 106 kbit/s. a modified Millercoding with100% modulation(ASK) is used. • In all other cases Manchester coding is used with a modulation(ASK) ratio of 10%. • Manchester Coding:Alow-to-high transition expresses a 0 bit, whereas a high-to-low transition stands for a 1 bit.

  9. Miller Coding: • This line code is characterized by pauses occurring in the carrier at different positions of a period. While a 1 is always encoded in the same way, coding a 0 is determined on the basis of the preceded bit .

  10. Block Diagram: NFC block Diagram

  11. Block Diagram: • The analog circuitry handles the modulation and demodulation of analog signals • RF level detector detects the presence of an external RF field at 13.56Mhz • UART handles the protocol requirements for the communication schemes. • FIFO BUFFER allow a fast and convenient data transfer from the host to the uart and vice versa • MICROCONTROLLER allows autonomous management of communication both on rf interface and with the host. • HOST INTERFACES are implemented to fulfill different customer requirements

  12. NFC in mobile:

  13. Inherently secured short range protocol communication. • Great user-friendly interface Just Tap It… And It’s Done… • The passive mode provides the user a unique power saving mode where the communication can be established even if the passive device(target) is switched off, thus providing a much secured communication.

  14. NFC forum technical architecture:

  15. NFC protocol stack:

  16. Protocols : • NFC Logical Link Control Protocol (LLCP) Technical Specification: • Defines an OSI layer-2 protocol to support peer-to-peer communication between two NFC-enabled devices. • The specification defines two service types, connectionless and connection-oriented. •  Designed to support either small applications with limited data transport requirements

  17. NFC Digital Protocol Technical Specification • This specification addresses the digital protocol for NFC-enabled device communication. • The specification defines the common feature set that can be used consistently and without further modification for major NFC applications in areas such as financial services and public transport. • Digital interface and the half-duplex transmission protocol of the NFC-enabled device in its four roles as Initiator, Target, Reader/Writer and Card Emulator

  18. NFC Activity Technical Specification • The specification explains how the NFC Digital Protocol Specification can be used to set up the communication protocol with another NFC device or NFC Forum tag. •  It describes the building blocks, called Activities, for setting up the communication protocol. 

  19. NFC Controller Interface (NCI) Technical Specification • The NCI specification defines a standard interface within an NFC device between an NFC controller and the device's main application processor. • With the availability of the NCI, manufacturers will have access to a standard interface they can use for whatever kind of NFC-enabled device they build – including mobile phones, PCs, tablets, printers, consumer electronics, and appliances. • The NCI provides users a logical interface that can be used with different physical transports, such as UART, SPI, and I2C.

  20. Operating modes: • Reader/Writer mode: NFC devices can read and write data from/to NFC tags and smart cards. ISO/IEC 14443Included as a base standard in Digital Protocol and Analogue specifications. • –ISO/IEC 18092 –NFCIP-1Included as a base standard in Digital Protocol and Analogue specifications. • –JIS X 6319-4 –FeliCaIncluded as a base standard in Digital Protocol and Analogue specifications

  21. Peer-to-Peer mode: In the peer-to-peer mode: twodevices can exchange data at link-level. This mode is standardized on the ISO/IEC 18092 standard, and allows data speed up to 424 Kbit/sec.

  22. operating modes: • Card Emulation mode: • NFC device acts as an RFID card and other NFC devices can read data from this NFC device. • The advantage of this mode is that there is not any need for NFC tag or a RFID card.

  23. Comparison with Bluetooth

  24. NFC applications:

  25. Wireless Charging: • NFC enabled wireless charging

  26. A day in life:

  27. NFC SECURITY ISSUES: • The requirement for the two devices to be close to each other is something that helps with the security of the transaction by limiting eavesdropping. • This makes it inherently safer than longer range technologies but there are still security flaws that, if not addressed, can be exploited. • The AES encryption method is developed into a series of NFC security standards to protect against eavesdropping and data manipulation.

  28. NFC is starting to become popular as a form of advertising, where the interested user taps their device onto the advert to view the message, URL or phone number. • The AES encryption method is developed into a series of NFC security standards to protect against eavesdropping and data manipulation.

  29. Using a wireless communication protocol it is inevitable that the data will be prone to attack such as: • Eavesdropping • Data Corruption • Data Modification • Data Insertion • Man-in-the-Middle Attack

  30. POTENTIAL FUTURE OPPORTUNITIES • Google Wallet: • Google Wallet is an Android app that makes your phone your wallet • It stores virtual versions of your existing plastic cards on your phone. • It works by people tapping their phone to pay and redeem offers using near field communication. • it will be able to do more than a regular wallet ever could, like storing thousands of payment cards and Google Offers but without the bulk. • Microsoft's upcoming Windows 8 operating system (OS) will include built-in NFC functionality

  31. Google Wallet:

  32. Life With NFC • N-mark logo for • Certified devices • N-mark logo for • Certified devices

  33. CONCLUSIONS: • Connection establishment for communication is faster. • In future NFC enabled phones will become standard and their applications used everyday in life. • Passive NFC tags have great future in advertising because of how small and easy they are to place into a magazine page, a poster in the street or a business card that can be handed out.

  34. References: • [1] Kevin Curran, Amanda Millar, Conor Mc Garvey ” Near Field Communication” International Journal of Electrical and Computer Engineering (IJECE) Vol.2, No.3, June 2012, pp. 371~382 • [2] NFC Forum. (2011). About NFC. Retrieved 04 10, 2011, from NFC Forum: http://www.nfc-forum.org • [3] NFC World. (2011). About NFC. Retrieved 04 10, 2011, from NFC World: http://www.nfc-world.com • [4] Conneally, T. (2010, 12 23). As-NFC-enters-the-mass-market-so-too-should-NFC-security. Retrieved 04 09, 2011, from Beta News : http://www.betanews.com/ • [5] http://public.cenriqueortiz.com/nfc/elements-nfc-jan2009-CEnriqueOrtiz.jpg • [6] Mobile Phones History. (2011). Retrieved 04 05, 2011, from Phone History: http://www.phonehistory.co.uk/ • [7] Alcatel Lucent. (2011). Historical Timeline. Retrieved 04 06, 2011, from Alcatel Lucent: http://www.alcatellucent.com/

More Related