near field communication report

23
NEAR FIELD COMMUNICATION… Presented By: KUMAR ABHINAV ANAND, ECE, BTECH 2007-2011, REG NO: 13080216, COCHIN UNIV COLLEGE OF ENGG.,KERALA

Upload: kumar-abhinav

Post on 09-Apr-2015

422 views

Category:

Documents


1 download

TRANSCRIPT

NEAR FIELD COMMUNICATION…

Presented By: KUMAR ABHINAV ANAND, ECE, BTECH 2007-2011, REG NO: 13080216, COCHIN UNIV COLLEGE OF ENGG.,KERALA

INTRODUCTION

> high frequency wireless technology> short range contactless comm.> corollary to contactless smartcards > comm. for global consumers> concept of near field

Principle of operation : RFID

> Radio Frequency Identification: system that transmits identity of an object wirelessly through radio waves

> constituted by a RFID reader ,an antenna and a RFID tag

STANDARDS AND COMPATIBILITY> open platform technology> compatible to RFID> freq:13.56 mhz ; bandwidth:2 mhz> data rates: 106, 212 , 424 kbps> range:20 cm> license: ISO 21481 and ECMA

TERMINOLOGIES

> Active and Passive modes> Target and Initiator> Collison Avoidance> Coding and Modulation

CODING 1) MANCHESTER CODING >possible transitions occur at midpoint of a period > low to high transition stands for bit 1,h to l for bit 0

2) MODIFIED MILLER CODE > char. by pauses occurring in the carrier at different pos.

> coding char as 0 after0,0 after 1 and zero and 1 after 1/0

MECHANISM

1)INITIALIZATION

2)TRANSFER PROTOCOL

>protocol activation >data exchange > protocol deactivation

GENERAL PROTOCOL FLOW

NFC-BLUETOOTH BRIDGE SYSTEM > A separate elec . device to enable NFC functionality with widespread bluetooth adapter > RS232 protocol: 9600 baud,8 data bits, one stop bit and no parity bit

SECURITY ASPECTS 1)EAVESDROPPING >depends on attackers chara > short range not a problem >passive devices less affected

2)DATA DESTRUCTION >completely disrupts comm. >RFID jammer employed

3)MAN IN THE MIDDLE ATTACK we distinguish between device A and device B that are exchanging data. In passive mode the active device (A) generates the RF field in order to send data to a passive device (B). The aim of an intruder is to intercept this message and prevent device B from receiving it. The next step would be to replace it with a different message. The first step is possible, but can be detected if device .

NFC vs other technologies >nfc vs RFID >nfc vs bluetooth >nfc vs IRDA

REAL WORLD APPLICATIONS

1) CONTACTLESS PAYMENTS (SANDIAGO 2009)

2)TRANSPORTATION (MADRID 2010) 3)HEALTH CARE (PAKISTAN 2009) 4)SMART OBJECTS (FINLAND )

5)SOCIAL MEDIA(BERLIN 2010)

> N FRIEND CONNECTOR OTHER POTENTIALS: >BLUETOOTH PAIRING >DEBIT/CREDIT CARD PAYMENTS >DOWNLOAD VIDEO SONGS FROM A SMART POSTER

ADVANTAGES> No need to carry an extra RFID-card, everything is integrated in your mobile phone> It provides the user updates on credits left and transactions made without the user having to use a separate terminal> The technology is secure since it has to “touch” the reader in order to transfer data

DISADVANTAGES

> Not enough NFC enabled mobile devices on the market yet> No determined standard for downloading smartcard information to devices, due to its intellectual property> Security concerns> very less data transfer rate> range is very less

Future scope > electronic keys> identity docs> electronic ticketing (airlines)> 21% of all mobile phones by 2012

Conclusion In summary, Near Field Communication is an efficient technology for communications with short ranges. It offers an intuitive and simple way to transfer data between electronic devices. A significant advantages of this technique is the compatibility with existing RFID infrastructures. Additionally, it would bring benefits to the setup of longer-range wireless technologies, such as Bluetooth ,Wifi . NFC is based on existing contactless infrastructure around the world that is already in use by millions of people on a daily basis. NFC is not a fashionable nice-to-have technology, but actually a technology that makes peoples lives easier – easier to pay for goods and services, easier to use public transport, and easier to share data between devices.

References ISO/IEC 18092(ECMA-340): Information technology – Telecommunications and

information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1). First Edition, 2004-04-01. > Ecma International: Standard ECMA-340, Near Field Communication Interface and Protocol(NFCIP-1),December2004,URL:http://www.ecma-international.org/publications/standards/Ecma-340.htm. > José Bravo, Ramón Hervás , Gabriel Chavira From Implicit to Touching Interaction: RFID and NFC Approaches ,Sixth International Conference on the Management of Mobile Business (ICMB 2008)0-7695-2803-1/07 $25.00 © 2008 IEEE > Anokwa, Y., et al. A User Interaction Model for NFC Enabled Applications . in IEEE International Conference on Pervasive Computing and Communications Workshops 2007. New York ,USA. > A Framework for Integration of Radio Frequency Identification and RichInternet ApplicationsMikko Koskela, Jorma Ylinen and Pekka Loula Telecommunication Research Center Proceedings of the ITI 2007 29th Int. Conf. on Information Technology Interfaces, June 25-28, 2007, Cavtat , Croatia

small and inexpensive is beautiful…

QUERIES