Anda di halaman 1dari 23

NEAR FIELD

COMMUNICATION…

Presented By:
KUMAR ABHINAV ANAND,
ECE, BTECH 2007-2011,
REG NO: 13080216,
COCHIN UNIV COLLEGE OF ENGG.,KERALA
INTRODUCTION

> high frequency wireless technology


> short range contactless comm.
> corollary to contactless smartcards
> comm. for global consumers
> concept of near field
Principle of operation : RFID

> Radio Frequency Identification: system that


transmits identity of an object wirelessly through
radio waves

> constituted by a RFID reader ,an antenna and a


RFID tag
STANDARDS AND COMPATIBILITY
> open platform technology
> compatible to RFID
> freq:13.56 mhz ; bandwidth:2 mhz
> data rates: 106, 212 , 424 kbps
> range:20 cm
> license: ISO 21481 and ECMA
TERMINOLOGIES

> Active and Passive modes


> Target and Initiator
> Collison Avoidance
> Coding and Modulation
CODING

1) MANCHESTER CODING
>possible transitions occur at
midpoint of a period
> low to high transition
stands for bit 1,h to l for bit 0
2) MODIFIED MILLER CODE

> char. by pauses occurring in the carrier


at different pos.

> coding char as 0 after0,0 after 1 and zero


and 1 after 1/0
MECHANISM

1)INITIALIZATION

2)TRANSFER PROTOCOL

>protocol activation
>data exchange
> protocol deactivation
GENERAL PROTOCOL FLOW
NFC-BLUETOOTH BRIDGE
SYSTEM
> A separate elec . device to enable NFC
functionality with widespread bluetooth adapter
> RS232 protocol: 9600 baud,8 data bits, one stop
bit and no parity bit
SECURITY ASPECTS

1)EAVESDROPPING
>depends on attackers chara
> short range not a problem
>passive devices less affected

2)DATA DESTRUCTION
>completely disrupts comm.
>RFID jammer employed
3)MAN IN THE MIDDLE ATTACK
we distinguish between device A and device B that are exchanging data. In
passive mode the active device (A) generates the RF field in order to send data
to a passive device (B). The aim of an intruder is to intercept this message and
prevent device B from receiving it. The next step would be to replace it with a
different message. The first step is possible, but can be detected if device .
NFC vs other technologies
>nfc vs RFID
>nfc vs bluetooth
>nfc vs IRDA
REAL WORLD APPLICATIONS

1) CONTACTLESS PAYMENTS (SANDIAGO 2009)


2)TRANSPORTATION (MADRID 2010)
3)HEALTH CARE (PAKISTAN 2009)
4)SMART OBJECTS (FINLAND )
5)SOCIAL MEDIA(BERLIN 2010)

> N FRIEND CONNECTOR

OTHER POTENTIALS:
>BLUETOOTH PAIRING
>DEBIT/CREDIT CARD PAYMENTS
>DOWNLOAD VIDEO SONGS FROM A SMART
POSTER
ADVANTAGES
> No need to carry an extra RFID-card, everything is integrated in your mobile
phone
> It provides the user updates on credits left and transactions made without the user
having to use a separate terminal
> The technology is secure since it has to “touch” the reader in order to transfer
data
DISADVANTAGES

> Not enough NFC enabled mobile devices on the


market yet
> No determined standard for downloading smartcard
information to devices, due to its intellectual property
> Security concerns
> very less data transfer rate
> range is very less
Future scope
> electronic keys
> identity docs
> electronic ticketing (airlines)
> 21% of all mobile phones by 2012
Conclusion
In summary, Near Field Communication is an efficient technology for communications
with short ranges. It offers an intuitive and simple way to transfer data between electronic
devices. A significant advantages of this technique is the compatibility with existing RFID
infrastructures. Additionally, it would bring benefits to the setup of longer-range wireless
technologies, such as Bluetooth ,Wifi .
 NFC is based on existing contactless infrastructure around the world that is already in use by
millions of people on a daily basis. NFC is not a fashionable nice-to-have technology, but
actually a technology that makes peoples lives easier – easier to pay for goods and services,
easier to use public transport, and easier to share data between devices.
References
ISO/IEC 18092(ECMA-340): Information technology – Telecommunications and information exchange
between systems - Near Field Communication - Interface and Protocol (NFCIP-1). First Edition, 2004-04-01.
> Ecma International: Standard ECMA-340, Near Field Communication Interface and
Protocol(NFCIP-1),December2004,URL:http://www.ecma-international.org/publications/standards/Ecma-
340.htm.
> José Bravo, Ramón Hervás , Gabriel Chavira From Implicit to Touching Interaction: RFID and NFC
Approaches ,Sixth International Conference on the Management of Mobile Business (ICMB 2008)0-7695-
2803-1/07 $25.00 © 2008 IEEE
> Anokwa, Y., et al. A User Interaction Model for NFC Enabled Applications . in IEEE International
Conference on Pervasive Computing and Communications Workshops 2007. New York ,USA.
> A Framework for Integration of Radio Frequency Identification and RichInternet Applications
Mikko Koskela, Jorma Ylinen and Pekka Loula Telecommunication Research Center Proceedings of the ITI
2007 29th Int. Conf. on Information Technology Interfaces, June 25-28, 2007, Cavtat , Croatia
small and inexpensive is

beautiful…
QUERIES

Anda mungkin juga menyukai