NFC Technology across a Broad Range of Applications

advertisement
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
NFC Technology across a Broad Range of
Applications
R.R.V.S.S.ABHISHEK #1, P.RAVI TEJA *2, P.RAM MANINTH #3
Department of ECE, K L University Green Fields, Vaddeswaram, Guntur, Andhra Pradesh 522502
Abstract— In NFC technology one of the fast growing areas is
NFC mobile services. Adoption of NFC in wide range of
applications decides the success of NFC technology .In
development point of view describing the important uses and the
structure of overall NFC is needed. So for growth in business area
we have to recognize and meet the technological requirements.
Cost, complexity and implementation of technology in wide variety
of devices plays a key role to decide the success. In this paper we
will discuss different types of communication modes such as active
and passive, protocols in NFC and also compared various
technologies in security aspects.
COMBINING COMMUNICATION&
IDENTIFICATION
NFC is technology evolved from contactless radio frequency
identification (RFID) and networking technologies that offers
convenient short-range communication between electronic
devices. It allows quick and automatic set-up of virtual
connections for existing cellular, Bluetooth and wireless
802.11 devices. This fast and easy communication between all
types of wireless devices through touch-and-go convenience
makes NFC the perfect solution for controlling data in our
increasingly complex and connected world.
Keywords— NFC, MNO, Handover protocol
WHAT IS NEAR FIELD COMMUNICATION (NFC)?
INTRODUCTION
Since the past decades, Contactless Card Technology has been
growing and has been endorsed by different sectors such as
payment, transport and retailing. Simultaneously, mobile
phones with the additional deals of Internet and multimedia
services have successfully entered people’s daily life.
Contactless card technology can now extend its domain of
applicability by adding contactless functionality to the mobile
phone. The Near Field Communication mobile service, which
influences the present contactless infrastructures, has just
started to emerge. In some countries contactless card
technology and mobile phones have already launched and they
succeeded commercially.
Different kinds of “Contactless technology” exist now.
Mobile Network Operators and to third party Service
Providers are willing to introduce Near Field Communication
technology. NFC supports very short distances operations,
typically less than 4 cm and is predicted as a strong enabler to
meet new customer needs and drive value added business
models.
An easy way to comply with the conference paper
formatting requirements is to use this document as a template
and simply type your text into it.
ISSN: 2231-5381
Jointly developed by Philips and Sony, NFC is a short range
wireless technology that allows communications to take place
between devices that either touch or are momentarily held
close together.
This technology operates on an unlicensed radio frequency
band through magnetic field induction. It allows devices that
are connected to transfer data either one side or both. Tags are
present within the system.
NFC is based on Radio Frequency Identification (RFID)
technology, which is compatible with most of the contactless
transportation and ticketing solutions that are commonly used
around the world to enable quick and smooth flow of people
within public transportation systems or ticketed environments.
NFC is an open platform technology and was approved as an
ISO/IEC global standard in December 2003.
WIRELESS SHORT RANGE COMMUNICATION
TECHNOLOGY
The underling RFID technology is based on wireless peer-topeer communication between two devices defined as either a
‘reader’ or a ‘tag’. RFID can operate in a number of frequency
bands and at a variety of transmit powers, but for NFC a very
low transmit power is used at a frequency of 13.56 M Hz. In
order for communication to take place the two devices must
be in very close proximity, typically within 5 cm.
The tag has no power supply so the reader initiates
communication when the devices are close enough to achieve
inductive coupling. Sufficient current is induced in the tag’s
http://www.ijettjournal.org
Page 948
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
antenna to power a small chip so that information can be read
or written to it. Reverse information flow is achieved through
a technique called load modulation. When the devices are
inductively coupled .It is possible for the reader to detect
changes in the load presented by the tag. Thus changing the
load acts as a form of modulation and data rates up to 424
Kbit/s can be achieved between NFC compliant devices.
PROTOCOL
The protocol is based on a wireless interface. We adopt peerto-peer communication protocol as we have two parties in
communication. The protocol initiates wireless network
connections between network appliances and consumer
electronics devices.
The NFC forum defines three communication modes, as
illustrated next:
Peer-to-Peer mode is defined for device to device link-level
communication. Note that this mode is not supported by the
Contactless Communication API.
Read/Write mode allows applications for the transmission of
NFC Forum-defined messages. Note that this mode is not
secure. This mode is supported the Contactless
Communication API. NFC Card Emulation mode allows the
NFC-handset behave as a standard Smartcard. This mode is
secure. This mode is supported by the Contactless
Communication API.
NFC FORUM ISSUES SPECIFICATIONS FOR FOUR
TAG TYPES
TABLE I
Type 1
Standard
Memory
Fig. 2 Passive mode of communication
In often applied case where devices shares a single RF band,
the communication is half-duplex. The devices implement the
“listen before talk” policy in which device must first listen on
the carrier and start transmitting a signal only if no other
device is detected transmitting.
NFC protocol diagnose between the Initiator and the Target of
the communication. Some device might be either an initiator
or a target. Initiator functionality is to initiate and control the
exchange of data. Target function is to answers the request
from the Initiator.NFC protocol also distinguishes between
two modes of operation: Active mode and Passive mode. All
devices support both communication modes. The distinction is
as follows:
Speed
Type 2
Type 3
Type 4
ISO
ISO
(JIS) X ISO14443
14443 A
14443 A
6319-4
A and B
(FeliCa)
96 bytes 48 bytes Memory
Up to 32
and
and
availabilit Kbytes
expandab expandab y
is per
le to 2 le to 2 variable(
service
kbyte
kbyte
Up
to
1MB)
106 kbit/s 106 kbit/s 212 kbit/s Up to 424
or
424 kbit/s.
kbit/s
CODING AND MODULATION
The major difference between active device and passive
device is mode of transmission. In passive devices, the
technique used to encode data is Manchester coding. Whereas
in active devices modified Miller coding with 100%
modulation is adopted if the data rate is 106 kbps, if the data
rate is greater than 106 kbps Manchester coding using a
modulation ratio of 10% is adopted.
COLLISION AVOIDANCE
Fig. 3 Active mode of communication
Subsequently the application and/or the communication
environment may require speed adaptation, which can be
done during communication.
Usually misunderstandings are rare as the devices are placed
in direct proximity. We implement listen before talk principle.
Initiator should not disturb any other NFC communication. So
before establishing a connection it has to make sure that there
is no external RF field. It has to wait until RF field is detected
and then start communication after a specific guard time. In
the case when two or more targets answer at the same time,
then initiator detects it as a collision.
NFC AND OTHER WIRELESS TECHNOLOGY
ISSN: 2231-5381
http://www.ijettjournal.org
Page 949
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
NFC is complementary with existing wireless standards. It can
be used to initiate WLAN, Bluetooth and other wireless
connections without going through configuration menus.
These connections are established simply by holding the two
NFC products close together, or by configuring a device with
contactless smart media.
TABLE III
Adjudicate Handover allows only two devices to negotiate
one or more different carriers for extra data exchange. The
case shown in Figure 5 illustrates how a Handover Requester
uses the embedded NFC Forum Device to exchange
connection handover information with the Handover Selector
to finally select a matching different carrier. In the example,
the application running on the Handover Requester first
announces its different carriers likes Wi-Fi and Bluetooth
wireless technology to the Handover Selector, and then
receives a carrier selection such as Bluetooth wireless
technology as the only choice and finally performs
Bluetooth pairing and data exchange STATIC HANDOVER
SET UP OF COMMUNICATION WITH OTHER
PROTOCOL
Imagine that you would like to transfer a massive amount of
information between two computers – a desktop and a laptop.
For suppose you want to transfer a presentation file. Using
NFC may be slow and we decide to use something with more
bandwidth. Let’s say for this example we use Bluetooth. Now,
to set up Bluetooth communication between two computers
we would need to start connection manually with a password
to protect the communication.
HANDOVER PROTOCOL
This protocol defines NDEF messages which enable an
alternative communication carrier. The Handover Requester
negotiates this alternative communication with a Handover
Selector over the NFC link and also enables the possible
alternative communication carrier(s) from an NFC Forum tag
but the drawback is it does not work for the static information
stored on a tag. The Handover Requestor is defined to initiate
the hand over operation and the Handover Selector is defined
to be initially passive and that responds to the requestor, this
does not generate a handover message.
Fig. 6 NFC static Handover
NFC DEVICE
Mobile Information Device Profile together with Contactless
API (JSR 257)is developing NFC-based applications for java
and other handsets for a contactless I/O, and SATSA (JSR
177) for a more secure element capabilities. The elements of a
Java-based handset that supports NFC are on the top of the
illustration that is the Java runtime and APIs for accessing
SIM cards and Contactless communication channels, as well
as the Java MIDlet application. Important point to know is
that the application consists of two parts, the MIDlet and a
Java Card application that may reside on a SIM card or a
smart-card, and perhaps uses memory for the key store. Below
we see the NFC controller, Baseband processor and RF Unit
and there is the antenna. Externally to the handset are readers,
tags and smart-cards with which the handset communicates
with.
NEGOTIATED HANDOVER
CONTACTLESS COMMUNICATION API
Fig. 5 NFC Negotiated Handover
ISSN: 2231-5381
The Contactless Communication API Java specification, led
by Nokia and defined under the Java Community Process as
JSR-257, defines a set of APIs for proximity, contactlessbased communication. The API consists of five Java
packages. The Contactless Communication API allows you to
Discover and Exchange data with contactless targets such as
NDEF tags, RFID tags, and external smartcards. The API also
provides support for visual tags.
http://www.ijettjournal.org
Page 950
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
ADVANTAGES OF NFC
By using NFC-enhanced devices we can exchange and store
messages, pictures, files, etc. Delivering ease of use, instant
natural connectivity, zero configurations and smart key
access, NFC meets all the requirements of today’s consume
necessities and also helpful in creating opportunities for new
mobile services.
APPLICATION FIELDS OF NFC
A. Payment & ticketing
NFC enables users to make fast and secure purchases, go
shopping with electronic money, and also to buy, store and
use electronic tickets, such as concert/event tickets, plane
tickets, travel cards, etc.
B. Electronic keys
For example, these can be car keys, house/office keys, etc.
destruction. Still, the attacker is not able to generate a valid
message.. This attack can be easily realized. One of possible
ways to disturb the signal is the usage of a RFID Jammer.
This attack can be detected but it is impossible to prevent it.
NFC devices are capable of receiving and transmitting data at
the same time
3) Data Modification- Illegal changing of data, which results
in authoritative messages, is much more complicated and
demands a thorough understanding. In order to modify the
transmitted data, an intruder has to concern single bit of the
RF signal. The utlity of this attack is to mean that if at all
there is a change in bit value from 0 to 1 or the other way
around, this clout the concept of amplitude modulation. 5
4) Data Insertion-If there is enough time for attacker to send
an inserted message before the real device starts sending his
answers then collision may occur and data exchange may stop
suddenly. To avoid such attacks the device should try to
answer with no delay. We can also protect attacks by checking
RF field and by using secure channel.
5) Man-in-the-Middle-Attack- we have to check both, the
active and the passive modes to prove that NFC is secure
against Man-in-the-Middle-Attack.
C. Identification
In addition, NFC makes it possible to use mobile phones
instead of identity documents. In Japan, for example, student
IDs can be stored on cell phone, which allows the students to
electronically register for classes, to open locked campus
doors, buy food at the school cafeteria, borrow books, and
even get discounts at local movie theaters, restaurants, and
shops.
D. Receive and share information
The data stored on any tagged object (e.g. a DVD box or a
poster) can be accessed by mobile phones in order to
download movie trailers, street-maps, travel timetables etc.
E. Set-up service
To avoid the complicated configuration process, NFC can be
used for the set-up of other longer-range wireless
technologies, such as Bluetooth or Wireless LAN.
SECURITY ASPECTS
1) Eavesdropping-NFC is vulnerable to eavesdropping. The
transmitted data through RF waves can be intercepted by the
attackers. Eavesdropping is affected by the communication
mode. Depending on the mode, the transferred data is coded
and modulated differently. It is easy to attack the data with
stronger modulation. Attacking a passive device is more
complex than attacking active device because passive doesn’t
generate its own RF field.
2) Data Destruction- An attacker corrupts the communication
such that service is no longer available is called data
ISSN: 2231-5381
CHALLENGES OF THE IMPLEMENTATION OF NFCBASED SERVICES
NFC-based solutions collaborating with existing contactless
and smart card standards have still deficiencies. Many
problems can be derived from technical and technological
barriers:
1) Complex ecosystem (many players), 2) business model
focused on payment mainly, 3) MNOs are not ordering the
handsets and are stuck doing trials after trials.
CONCLUSION
NFC has the potential to be a disruptive technology, changing
the way that lives are lived, transforming everyday tasks,
making things easier, more intuitive and more effective. NFC
wireless communications can be applied in many different
ways, some of which are outlined in this paper. However,
perhaps most exciting of all is the creation of an environment
with all the key components for NFC to become a mass
adoption technology. From here, any number of applications
can be created to sit within the environment.
REFERENCES
1. D.-S. Shiu, G. J. Foschini, M. J. Gans, and J. M. Kahn,
“Fading
correlation and its effect on the capacity of multielement
antenna
systems,” IEEE Transactions on Communication., vol. 48, no.
3,
pp. 502-513, March 2000.
http://www.ijettjournal.org
Page 951
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
2. I. E. Telatar, “Capacity of multi-antenna Gaussian
channels,” European
Trans. Telecommun. Related Technol., vol. 10, pp. 585-595,
1999.
3. Volker Kuhn, Wireless Communications over MIMO
Channels,
John Wiley and sons, 2006.
4. Claude Oesteges, and Bruno Clerckx, MIMO Wireless
Communications:
Real-World Propagation to Space-TimeCode Design,
Academic Press, 2007.
5. George Tsoulos, MIMO System Technology for Wireless
Communications, CRC Press, 2006.
6. A. F. Molisch, Wireless Communications. IEEE Press –
Wiley, 2005.
7. W. Lee, “Effects on Correlations between Two Mobile
Base-Station
Antennas,” IEEE Trans. Comm., vol. 21, pp. 1214–1224,
1973.
8. J. Wallace and M. Jensen, “Statistical Characteristics of
Measured
MIMO Wireless Channel Data and Comparison to
Conventional .
ISSN: 2231-5381
http://www.ijettjournal.org
Page 952
Download