COMMUNICATION…
Presented By:
KUMAR ABHINAV ANAND,
ECE, BTECH 2007-2011,
REG NO: 13080216,
COCHIN UNIV COLLEGE OF ENGG.,KERALA
INTRODUCTION
1) MANCHESTER CODING
>possible transitions occur at
midpoint of a period
> low to high transition
stands for bit 1,h to l for bit 0
2) MODIFIED MILLER CODE
1)INITIALIZATION
2)TRANSFER PROTOCOL
>protocol activation
>data exchange
> protocol deactivation
GENERAL PROTOCOL FLOW
NFC-BLUETOOTH BRIDGE
SYSTEM
> A separate elec . device to enable NFC
functionality with widespread bluetooth adapter
> RS232 protocol: 9600 baud,8 data bits, one stop
bit and no parity bit
SECURITY ASPECTS
1)EAVESDROPPING
>depends on attackers chara
> short range not a problem
>passive devices less affected
2)DATA DESTRUCTION
>completely disrupts comm.
>RFID jammer employed
3)MAN IN THE MIDDLE ATTACK
we distinguish between device A and device B that are exchanging data. In
passive mode the active device (A) generates the RF field in order to send data
to a passive device (B). The aim of an intruder is to intercept this message and
prevent device B from receiving it. The next step would be to replace it with a
different message. The first step is possible, but can be detected if device .
NFC vs other technologies
>nfc vs RFID
>nfc vs bluetooth
>nfc vs IRDA
REAL WORLD APPLICATIONS
OTHER POTENTIALS:
>BLUETOOTH PAIRING
>DEBIT/CREDIT CARD PAYMENTS
>DOWNLOAD VIDEO SONGS FROM A SMART
POSTER
ADVANTAGES
> No need to carry an extra RFID-card, everything is integrated in your mobile
phone
> It provides the user updates on credits left and transactions made without the user
having to use a separate terminal
> The technology is secure since it has to “touch” the reader in order to transfer
data
DISADVANTAGES
beautiful…
QUERIES