390 likes | 413 Views
Near Field Communication. by Saikiran Reddy.K 114620 M . Tech(ACS). Contents:. 1. Introduction 2. NFC Standards 3. NFC Applications 4. NFC Security Issues 5. Potential Future Opportunities 6. Conclusion 7.References. Introduction:.
E N D
Near Field Communication by SaikiranReddy.K 114620 M. Tech(ACS).
Contents: • 1. Introduction • 2. NFC Standards • 3. NFC Applications • 4. NFC Security Issues • 5. Potential Future Opportunities • 6. Conclusion • 7.References
Introduction: • NFC is a Technology that enables a device to communicate with another at a maximum distance of around 10 cm or less. • Connects electronic devices with a touch. • Based on RFID technology at 13.56 MHz with a bandwidth of almost 2 MHz . • Developed jointly between NXP Semiconductors and sony corporation.
NFC • NFC Enables One-Touch Setup of Wi-Fi and Bluetooth • Data exchange rate today up to 424 kilobits/s • Although RFID is very similar to NFC in many respects, RFID is a much broader technology. 13.56MHz RF Link NFC
How it works • NFC devices communicate via magnetic field induction, where two loop antennas are located within each other's near field, effectively forming an air-core transformer. • The radius of near field communication having maximum strength can be calculated as follows. Rmax= λ/2*π or Rmaxv/2*π*f Loop antenna specifications: loop diameter 6.5 cm,inductance 3uH capacitance 45 pF
NFC has 2 terminals: Initiator Target Loop Antennas Receiver Transmitter
NFC employs two different codings to transferdata. If an active device transfers data at 106 kbit/s. a modified Millercoding with100% modulation(ASK) is used. • In all other cases Manchester coding is used with a modulation(ASK) ratio of 10%. • Manchester Coding:Alow-to-high transition expresses a 0 bit, whereas a high-to-low transition stands for a 1 bit.
Miller Coding: • This line code is characterized by pauses occurring in the carrier at different positions of a period. While a 1 is always encoded in the same way, coding a 0 is determined on the basis of the preceded bit .
Block Diagram: NFC block Diagram
Block Diagram: • The analog circuitry handles the modulation and demodulation of analog signals • RF level detector detects the presence of an external RF field at 13.56Mhz • UART handles the protocol requirements for the communication schemes. • FIFO BUFFER allow a fast and convenient data transfer from the host to the uart and vice versa • MICROCONTROLLER allows autonomous management of communication both on rf interface and with the host. • HOST INTERFACES are implemented to fulfill different customer requirements
Inherently secured short range protocol communication. • Great user-friendly interface Just Tap It… And It’s Done… • The passive mode provides the user a unique power saving mode where the communication can be established even if the passive device(target) is switched off, thus providing a much secured communication.
Protocols : • NFC Logical Link Control Protocol (LLCP) Technical Specification: • Defines an OSI layer-2 protocol to support peer-to-peer communication between two NFC-enabled devices. • The specification defines two service types, connectionless and connection-oriented. • Designed to support either small applications with limited data transport requirements
NFC Digital Protocol Technical Specification • This specification addresses the digital protocol for NFC-enabled device communication. • The specification defines the common feature set that can be used consistently and without further modification for major NFC applications in areas such as financial services and public transport. • Digital interface and the half-duplex transmission protocol of the NFC-enabled device in its four roles as Initiator, Target, Reader/Writer and Card Emulator
NFC Activity Technical Specification • The specification explains how the NFC Digital Protocol Specification can be used to set up the communication protocol with another NFC device or NFC Forum tag. • It describes the building blocks, called Activities, for setting up the communication protocol.
NFC Controller Interface (NCI) Technical Specification • The NCI specification defines a standard interface within an NFC device between an NFC controller and the device's main application processor. • With the availability of the NCI, manufacturers will have access to a standard interface they can use for whatever kind of NFC-enabled device they build – including mobile phones, PCs, tablets, printers, consumer electronics, and appliances. • The NCI provides users a logical interface that can be used with different physical transports, such as UART, SPI, and I2C.
Operating modes: • Reader/Writer mode: NFC devices can read and write data from/to NFC tags and smart cards. ISO/IEC 14443Included as a base standard in Digital Protocol and Analogue specifications. • –ISO/IEC 18092 –NFCIP-1Included as a base standard in Digital Protocol and Analogue specifications. • –JIS X 6319-4 –FeliCaIncluded as a base standard in Digital Protocol and Analogue specifications
Peer-to-Peer mode: In the peer-to-peer mode: twodevices can exchange data at link-level. This mode is standardized on the ISO/IEC 18092 standard, and allows data speed up to 424 Kbit/sec.
operating modes: • Card Emulation mode: • NFC device acts as an RFID card and other NFC devices can read data from this NFC device. • The advantage of this mode is that there is not any need for NFC tag or a RFID card.
Wireless Charging: • NFC enabled wireless charging
NFC SECURITY ISSUES: • The requirement for the two devices to be close to each other is something that helps with the security of the transaction by limiting eavesdropping. • This makes it inherently safer than longer range technologies but there are still security flaws that, if not addressed, can be exploited. • The AES encryption method is developed into a series of NFC security standards to protect against eavesdropping and data manipulation.
NFC is starting to become popular as a form of advertising, where the interested user taps their device onto the advert to view the message, URL or phone number. • The AES encryption method is developed into a series of NFC security standards to protect against eavesdropping and data manipulation.
Using a wireless communication protocol it is inevitable that the data will be prone to attack such as: • Eavesdropping • Data Corruption • Data Modification • Data Insertion • Man-in-the-Middle Attack
POTENTIAL FUTURE OPPORTUNITIES • Google Wallet: • Google Wallet is an Android app that makes your phone your wallet • It stores virtual versions of your existing plastic cards on your phone. • It works by people tapping their phone to pay and redeem offers using near field communication. • it will be able to do more than a regular wallet ever could, like storing thousands of payment cards and Google Offers but without the bulk. • Microsoft's upcoming Windows 8 operating system (OS) will include built-in NFC functionality
Life With NFC • N-mark logo for • Certified devices • N-mark logo for • Certified devices
CONCLUSIONS: • Connection establishment for communication is faster. • In future NFC enabled phones will become standard and their applications used everyday in life. • Passive NFC tags have great future in advertising because of how small and easy they are to place into a magazine page, a poster in the street or a business card that can be handed out.
References: • [1] Kevin Curran, Amanda Millar, Conor Mc Garvey ” Near Field Communication” International Journal of Electrical and Computer Engineering (IJECE) Vol.2, No.3, June 2012, pp. 371~382 • [2] NFC Forum. (2011). About NFC. Retrieved 04 10, 2011, from NFC Forum: http://www.nfc-forum.org • [3] NFC World. (2011). About NFC. Retrieved 04 10, 2011, from NFC World: http://www.nfc-world.com • [4] Conneally, T. (2010, 12 23). As-NFC-enters-the-mass-market-so-too-should-NFC-security. Retrieved 04 09, 2011, from Beta News : http://www.betanews.com/ • [5] http://public.cenriqueortiz.com/nfc/elements-nfc-jan2009-CEnriqueOrtiz.jpg • [6] Mobile Phones History. (2011). Retrieved 04 05, 2011, from Phone History: http://www.phonehistory.co.uk/ • [7] Alcatel Lucent. (2011). Historical Timeline. Retrieved 04 06, 2011, from Alcatel Lucent: http://www.alcatellucent.com/