2. INTRODUCTION
WHAT IS NFC
HOW NFC IS WORK
STANDARED
BLOCK DIAGRAM AND EXPLANATION
MODULATION SCHEME
COMPARISION WITH BLUETOOTH
COMPARE WITH OTHER WIRELESS TECHNOLOGY
USES AND APPLICATION
THREATS AND COUNTERMEASURES
ADVANTAGE& DISADVANTAGE
FUTURE DEVICES AND USE
CONCLUSION
3. We know that connectivity technology between devices
through wireless connection has increase one step ahead.
Starting from infra red, Bluetooth, Wi-Fi.
Now there is also the new connectivity technology called NFC
(Near Field Communication)..
NFC is the technologies to make our lives easily
4. Easy to use wireless communication interface for the
last few centimeters
Easy to use target selection, by simply holding two
devices close to each other
NFC is as easy as….
… a touch
5. Based on RFID technology at 13.56 MHz of radio spectrum
Operating distance typical up to 10 cm
Compatible with today’s field proven contactless RFID
technology
Data exchange rate today up to 424 kilobits/s
RFID object
13.56MHz RF Link
6. NFC is based on RFID technology that uses magnetic field
induction between electronic devices in close proximity.
Two devices to communicate using NFC
one device must have an NFC reader/writer
one must have an NFC tag.
The tag is essentially an integrated circuit containing data,
connected to an antenna, that can be read or written by the
reader.
7. Passive communication mode:
The initiator device provides a carrier field and the
target device answers by modulating the existing
field.
Active communication mode:
Both Initiator and target device communicate by
alternately generating their own fields.
8. The technology is a simple extension of the ISO/IEC14443 proximity-
card standard (contactless card, RFID) that combines the interface of a
smartcard and a reader into a single device.
An NFC device can communicate with both existing ISO/IEC14443
smartcards and readers, as well as with other NFC devices, and is thereby
compatible with contactless infrastructure already in use for public
transportation and payment.
NFC is primarily aimed at usage in mobile phones. By 2013, one in five
phones will have NFC (predicted by Juniper Research).
Japan is early adopter of NFC.
9. STATUS
CONTROL
HOST
INTERFACE
ANALOG CONTACT 8 BIT
CIRCUITARY PARALLEL HOST
OUTPUT
LESS
SERIAL INTERFACE
DRIVER UART
UART SPI
FIFO
BUFFER
10. The analog circuitry handles the modulation and demodulation of analog signals
RF level detector detects the presence of an external RF field at 13.56Mhz
UART handles the protocol requirements for the communication schemes
FIFO BUFFER allow a fast and convenient data transfer from the host to the
UART and vice versa
MICROCONTROLLER allows autonomous management of communication
both on RF interface and with the host
HOST INTERFACES are implemented to full fill different customer
requirements
11. Possible
supported data transfer rate are 106
Kbps,212Kpbs,424kbps
BAUD RATE Active Passive
106Kbps Modified miller 100%,ASK Manchester,10%,ASK
212 Kbps Manchester,10%,ASK Manchester,10%,ASK
424KBps Manchester,10%,ASK Manchester,10%,ASK
12. NFC employs two different
coding to transfer data.
If an active device transfers data
at 106 Kbit/s, a modified miller
coding with 100% modulation is
used.
In all other cases Manchester
coding is used with a modulation Manchester code
ratio of 10%.
NFC devices are able to receive
and transmit data at the same
time.
Thus, they can check for
potential collisions if the
received signal frequency does
not match with the transmitted
signal's frequency
Modified miller code
13. Well, NFC comes to fill a slightly different gap than Bluetooth, so
no it's not aiming to replace Bluetooth (though it might I would
say). It's aim is actually rather than different, and that is to
complement Bluetooth and 'fix' everything that's 'bad' about it –
i.e. the long discovery / pairing process.
contrast to Bluetooth
14. The maximum data transfer rate of NFC (424 Kbit/s) is slower
than that of Bluetooth V2.1 (2.1 Mbit/s).
NFC requires low power similarly Bluetooth
However, when NFC works with an unpowered device (e.g. on a
phone that may be turned off, a contactless smart credit card, a
smart poster, etc.), the NFC power consumption is greater than
that of Bluetooth V4.0 Low Energy.
15.
16. There are currently three main uses of NFC:
Card emulation: The NFC device behaves
like an existing contactless card
Reader mode: The NFC device is active and
reads a passive RFID tag, for example for
interactive advertising
P2P mode: Two NFC devices communicating
together and exchanging information.
17. NFC also allows users to
conduct transactions for
contactless, access digital
content and connect with an
electronic device only with a
single touch.
18. Smart Key
- for mobile local payment
payment
Peer to Peer
communication,
NFC
Virtual Connector
- either directly or by
establishing wireless links
Low cost solution to
distribute info /
services
-e.g. by passive loops
embedded in paper
media
19.
20. THREATS
Man in the middle attack
Eavesdropping
data modification
COUNTERMEASURES
USE SECURE CHANNEL
USE ACTIVE-PASSIVE MODE
USE106KBPS
21. Very simple to use
NFC uses are practically limitless.
NFC devices is automatically established quickly
NFC particularly suitable for crowded areas
Inherently Secure
Work with in existing technology
22. Data transfer rate is small compared to blue tooth and
other wireless communications
No protection in eavesdropping
No protection in data modification
Relay attack
23. On November 15, 2010 Eric Schmidt announced at the Web 2.0
Summit that the Android will support NFC starting from version
2.3("Gingerbread"). The first Android handset which supports this
technology is the Nexus S.
On January 25, 2011, Bloomberg published are port stating that
Apple was actively pursuing development of a mobile payment
system employing NFC.
Near Field Communications World stated on March 21, 2011 that
Sonim Technologies will add NFC to its XP3300 Force device
later this year.
24. NFC is the efficient technologies for communications with short
ranges
NFC is compatible with existing RFID infrastructures.
Current and anticipated applications of NFC include the collection
and exchange of information, access controls, contact-less payments
and transactions, transport fares, loyalty and coupons data exchange
and social media
Providing secure channel will avoid the draw backs such as
eavesdropping or data modification.
. With this flexible technology, the service innovations and
applications are limitless.