8/2/2019 NFC(Tushar) (2)
1/29
TECHNICAL SEMINAR
ON
NEAR FIELD COMMUNICATION
Department of Telecommunication Engineering
Seminar Co-ordinator:
Mrs. Ashwini S.R.M.Tech.Asst. Professor
Dept. of TC&E
Head Of Department
Prof. Amarappa S. M.Tech.(Ph.D)HOD
Dept. of TC&E
Presented by:-
Kumar Tushar
(4JN07TE026)
8/2/2019 NFC(Tushar) (2)
2/29
NEAR FIELDCOMMUNICATION (NFC)
KUMAR TUSHAR
4JN07TE026
8/2/2019 NFC(Tushar) (2)
3/29
CONTENTS
INTRODUCTION.
ABSTRACT.
WHAT IS NFC.
WORKING.
COMMUNICATION MODE.CODINGAND MODULATION.
APPLICATIONS.
NFC USE CASES.
NFC REFERENCE ARCHITECTURE.
ADVANTAGES AND DISADVANTAGES.
COMPARISON .
SECURITY ASPECTS.
ADDED VALUE SERVICES.
CO
NCLUSIO
N.
8/2/2019 NFC(Tushar) (2)
4/29
Everyone usually dreams of technology gettingunified and where certain aspects of our lives will
be completely supported through a single
technology. Consumer electronics as
of today has become more
fast, multifunctional and
networked. Near Field Communication
(NFC) is the technology to
make our lives easier.
INTRODUCTION
8/2/2019 NFC(Tushar) (2)
5/29
Near Field Communication (NFC) is
based on a short-range wireless
connectivity, designed for intuitive,simple and safe interaction between
electronic devices. It is a easy to use
wireless communication interface for last
few centimeters. It is easy to use target
selection by simply holding two devices
close to each other.
ABSTRACT
8/2/2019 NFC(Tushar) (2)
6/29
WHAT IS NFC?
NFC is a short-range radio
technology that operates on the
13.56 MHz frequency, with data
transfers of up to 424 kilobitsper second.
NFC is based on RFID and itallows connectivity to be
achieved very easily over
distances of a few centimeters.
8/2/2019 NFC(Tushar) (2)
7/29
NFC IS NOT A PROPRIETARY
TECHNOLOGY
NFC standards are defined by the NFC
Forum, a global consortium of hardware,
software/application, credit card companies,banking, network-providers.
First formed by NXP Semiconductors, Sony
and Nokia.
8/2/2019 NFC(Tushar) (2)
8/29
Near-field communications (NFC) combines two
established technologies: Radio Frequency
Identification (RFID) tags, which are tiny chipswith built-in radios and Wireless Reader that picks
up the signals from the radios. The reader when
activated emits a short range radio Signal that powers
up a microchip on the tag, and allows for reading asmall amount of data that can be stored on the tag.
WORKING
8/2/2019 NFC(Tushar) (2)
9/29
COMMUNICATION MODES
In reader/writer mode(mandatory), the NFC device iscapable of reading NFC Forum-mandated tag types, such as in the
scenario of reading an NFC SmartPoster tag.
NFC tags are passive devicesthat can be used to communicatewith active NFC devices(an activeNFC reader/writer)
8/2/2019 NFC(Tushar) (2)
10/29
In Peer-to-Peer mode
(mandatory), two NFC devices can
exchange data. For example, you
can share Bluetooth or Wi-Fi link
set up parameters or you can
exchange data such as virtual
business cards or digital photos.
Peer-to-Peer mode is standardized
on the ISO/IEC 18092 standard.
COMMUNICATION MODES
8/2/2019 NFC(Tushar) (2)
11/29
In Card Emulation mode (optional),
the NFC device appears to an external
reader much the same as a traditional
contactless smart card. This enables
payments and ticketing by NFC devices
without changing the existinginfrastructure.
COMMUNICATION MODES
8/2/2019 NFC(Tushar) (2)
12/29
COMMUNICATION MODES
Applications
LLCP
(Logical Link
Control Protocol)
RTD
Record Type
Dfinition
&
NDEF
Data ExchangeFormat
Card
Emulation
(Smart Card
Capability
for MobileDevices)
RFLayer ISO 18092 + ISO 14443
Peer to Peer mode Read/write mode Card mulation mode
8/2/2019 NFC(Tushar) (2)
13/29
MODES OF OPERATION
Two operation modes at different transfer speeds are
possible forNFC devices:-
Active mode
Passive mode
MODES OF OPERATION
8/2/2019 NFC(Tushar) (2)
14/29
CODINGAND MODULATION
The distinction between active and passive devices
specifies the way data is transmitted.
Passive devices encode data always with Manchester
coding and a 10%ASK1.
8/2/2019 NFC(Tushar) (2)
15/29
CODINGAND MODULATION
Active devices one distinguishes between the modified
Miller coding with 100% modulation if the data rate is 106
kbps, and the Manchester coding using a modulation ratio
of 10% if the data rate is greater than 106 kbps.
The modulation ratio using modified Miller coding is of
high importance for the security of the NFC data transfer.
8/2/2019 NFC(Tushar) (2)
16/29
APPLICATIONS
8/2/2019 NFC(Tushar) (2)
17/29
NFC USE CASES
8/2/2019 NFC(Tushar) (2)
18/29
ANATOMY OF A CONTACTLESS API MIDlet
Let's now cover the elements of a typical mobile Java application (MIDlet) thatuses the Contactless Communication API looks. This is illustrated next where we
have the following typical elements:
1.The Java Runtime with JSR-257
Implementation.
2. The MIDlet application running
on a handset.
3. RFID/NFC transponder,controllers, and baseband.
4. A SIM card, as well as secure
and external elements.
8/2/2019 NFC(Tushar) (2)
19/29
NFC REFERENCE ARCHITECTURE
8/2/2019 NFC(Tushar) (2)
20/29
ADVANTAGES & DISADVANTAGES
Disadvantages over Bluetooth Lesser data transfer speeds (max 848 kbps).
Shorter range (max 20 cm) than Bluetooth technology.
Upcoming Bluetooth 4.0 low energy protocol will be consuming even
lower power thanN
FC as of now. NFC alone does not ensure secure communications is vulnerable to data
modifications.
Advantages over Bluetooth Almost instant connection (around 1/10 seconds) in comparison to pairing
procedure of Bluetooth.
Low power consumption and could work (alternatively) even when one ofthe device is powerless .
NFC is compatible with existing passive RFID (13.56 MHz ISO/IEC18000-3) infrastructures.
Shorter range makes it suitable for crowded area with high interferences.
8/2/2019 NFC(Tushar) (2)
21/29
HOW IS IT DIFFERENT FROM
RFID?
RFID and NFC use the same working standards but theadvantage ofNFC is that it combines the feature to readout and emulate RFID tags, and shares data betweenelectronic devices that both have active power (2-way communication).
NFC relies on direct magnetic coupling betweencomponents inside the communicating devices, ratherthan free space propagation of radio waves.
RFID is highly insecure for transactions andinformation can easily be corrupted unlike NFC.
NFC can be used to initiate Bluetooth and Wi-Fi butRFID cannot
8/2/2019 NFC(Tushar) (2)
22/29
COMPARISONWITH OTHER TECHNOLOGIES
8/2/2019 NFC(Tushar) (2)
23/29
SECURITY ASPECTS
Eavesdropping
Data destruction
Data modification
Data insertion Man in the middle attack
8/2/2019 NFC(Tushar) (2)
24/29
USE CASE: PHONE IS LOST
Service provider
TSMMobile
operator
Customer
Ask for token (delegated management)
Ask applet installation via ISD (MNO centric model)
Tells phone has been lost
Tells Customer has new SIM Card
Service installation request after customer registration
Tells phone has been lost
Tells customer has new SIM Card
Services management & referral for SP
Install NFC services
8/2/2019 NFC(Tushar) (2)
25/29
ADDED VALUE SERVICES
Exchange data, P2P.
Configuration (Bluetooth pairing).
Vending machines, service maintenance.
Loyalty, couponing.
NFC poster, get information.
Ticketing.
Medical, home care.
Web applications.Payment solution.
Access control.
Mobile signature.
Etc.
8/2/2019 NFC(Tushar) (2)
26/29
THE FUTURE
Near field communications (NFC) has taken far longer to
get established than originally hoped for, but its fervent
backers anticipate a breakthrough next year.
Data rates of 848 kbps is beingdeveloped.
Highly secure applications are
being developed for payments.
8/2/2019 NFC(Tushar) (2)
27/29
CONCLUSION
In the near future NFC will be the frontrunner
technology for data capture, data transfer and access
control applications. NFC technology continues toevolve and develop new applications. It is going to
bring revolution in mobile communications.
Consultants will continue to pitch the blue-sky potential of the technology .There will be a
significant spike in NFC activities in future.
8/2/2019 NFC(Tushar) (2)
28/29
8/2/2019 NFC(Tushar) (2)
29/29