SlideShare a Scribd company logo
SUBMITTED TO:
VLSI
DEPARTMENT
SUBMITTED BY:
LALIT KUMAR
MVLSI-749-2K15
1
 Designed for short distance communication (up to 10 cm)
 NFC or Near Field Communication is a short range high
frequency wireless communication technology
 It’s a contactless card and a contactless reader in one chip
 It operates at 13.56 MHz
 It’s designed for low bandwidth (max speed is 424 kBaud)
 Applications aimed for are
 Ticketing
 Payment
 Device Pairing
2
Short Range
13.56MHz
RF Link
 NFC is mainly aimed for mobile or handheld
devices.
 NFC is an extension of Radio frequency
identification or RFID technology
 RFID is mainly used for tracking and
identification by sending radio waves
 In 2004,NFC Forum was formed by Nokia,
Philips, Sony, to set standards for NFC. Every
NFC enabled device will have “N-Mark” trade
mark, developed by NFC forum.
N-Mark Trade mark
 In 2006
First mobile phone (nokia 6131) with NFC
released by NOKIA.
 In 2010
First android phone SAMSUNG NEXUS S with
NFC support released
 Near Field Communication is based on
inductive coupling.
 NFC works using magnetic induction between
two loop antennas located within each other’s
‘near field’.
 Operating frequency 13.56 Mhz.
 Data rate 106 kbit/s to 424 kbit/s
 NFC use an initiator and a target.
 Initiator actively generates an RF field that can
power a passive target.
 WPAN (wireless personal area network)is used
in this technology
LALIT NFC
 In active mode, both devices with NFC chip
generates an electromagnetic field and
exchange data.
 In passive mode, there is only one active device
and other uses that field to exchange
information.
 NFC application can be split into three basic
categories:
a. Touch and Go---ticketing
b. Touch and Confirm---mobile payment
c. Touch and Connect---to enable peer to peer
transfer of data
 Nexus S
 Google Nexus S 4G
 Samsung Galaxy S II
 Samsung Galaxy Note
 Galaxy Nexus
 Nokia 6212 Classic
 Nokia 6131 NFC
1) Coil in the first smart phone sets up a current that is picked up a second
smart phone or reader.
2) The second smart phone receives the “induced current” from the first,
recognizes it as a valid signal and offers a connection.
3) The first cell phone accepts the connection and begins the transaction.
1) Coil in the smart phone sets up a current that is picked up by the smart tag
2) The smart tag receives the “induced current” from the cell phone, recognizes
it as a valid signal and offers a connection to the cell phone.
3) The cell phone accepts the connection and begins the transaction
Advantage of NFC
1. Two-way data communication
2. Security level is high due to encoding system
3. High recognition speed, and low recognition error
 Make payments or use coupons via devices,
instead of credit or debit cards
 Transfer files and share documents
 Download information about objects, services
or places from “smart posters”
 Display electronic identity documents, like air
travel boarding passes
 There are dedicated roles
 Initiator and Target
 Any data transfer is a message and reply pair.
17
Initiator Target
Message
Reply
• There are dedicated modes of operation
– Active and Passive
– Active means the device generates an RF field
– Passive means the device uses the RF field generated by the other
device
 The VCO produce frequency modulated signal
at the transmitter and phase locked loop
demodulated the signal at receiver.
19
Active Passive
106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK
212 kBaud Manchester, 10% ASK Manchester, 10% ASK
424 kBaud Manchester, 10% ASK Manchester, 10% ASK
Active Passive
Initiator Possible Not Possible
Target Possible Possible
 I am sorry, but NFC is not secure against
eavesdropping .
 From how far away is it possible to eavesdrop?
 Depends….
 RF field of sender
 Equipment of attacker
 ….
 Does Active versus Passive mode matter?
 Yes
 In active mode the modulation is stronger (in particular at 106 kBaud)
 In passive mode eavesdropping is harder.
 Countermeasure
 Secure Channel
20
 Eavesdropping:-
NFC by itself can not protect against eavesdropping.
An attacker can use an antenna to also receive the
transmitted signals.
 Data Corruption:-
Data corruption can be achieved by transmitting valid
frequencies of the data spectrum at a correct time. The
correct time can be calculated if attacker has a good
understanding of the used modulation scheme and
coding.
 Data modification and Insertion :-
An attacker can insert massage into the data
exchange between two devices. But this is
possible only in case the answering device needs
a very long time to answer.
For the modified miller encoding with 100% ASK
this attack is feasible for certain bits and
impossible for other bits. But for Manchester
coding with 10% ASK this attack is feasible on all
bits.
 Eavesdropping:-
Data transmitted in possible mode is significantly
harder to be eavesdropping on, but just using the
passive mode is probably not sufficient for most
applications which transmit sensitive data.
Only real solution is to establish a secure channel
between the two devices.
 Data corruption:-
NFC devices can count this attack because they
can check the RF field while they are transmitting
data .
If an NFC device does this, it will be able to detect
the attack. The power which is needed to corrupt
the data is significantly bigger, than the power
which can be detected by the device.
This every such attack should be detectable.
 Data modification and Insertion:-
By using 100k baud in active mode it gets impossible
for an attacker to modify the data transmitted.
NFC device should check the RF field while sending
which means the sending device could continuously
check for such an attack and could stop the data
transmission when an attack is detected.
Establishing an secure channel between in two
devices.
26
1 Bit
1. Half-Bit 2. Half-Bit
100
0
Coded “0” Coded “1”
Modified Miller
Coding, 100%
ASK
Manchester
Coding, 10%
ASK
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
1 Bit
1. Half-Bit 2. Half-Bit
100
0
27
Alice Bob
Eve
28
Alice Bob
Message
Eve
Contents
29
Alice Bob
Message
Eve
Eavesdropping
30
Alice Bob
Message
Eve
EavesdroppingDisturb
31
Alice Bob
Message
Eve
EavesdroppingDisturb
Alice detects the disturbance and stops the protocol
• Check for active disturbances !
32
Alice Bob
Eve
Message
33
Alice Bob
Eve
Message
Eve cannot send to Bob, while RF field of Alice is on!
• Use Active – Passive connection !
• Use 106 kBaud !
 Eavesdropping
 No protection
 Use a Secure Channel
 Data Modification
 No protection
 Use Secure Channel
 Man in the Middle Attack
 Very good protection if
 Alice uses 106 kBaud
 Alice uses Active – Passive mode
 Alice checks for disturbance
 Alice checks for suspicious answers from Bob
34


NFC Intro
Eaves-
dropping
Conclusion
Data
Modification
Man-in-the-
Middle
Contents
Speed of various technologies used for data transfer
QR (Quick Response) code
VS
NFC (Near Field Communication)
ALTERNATIVES
RFID Difference Barcode
$0.5/1 unit. Price $0.005/1 unit.
More than 216 . High
capacity
Storage capacity
27 .
Low capacity(about 20
letter)
Radio frequency. How to use Visible light(infrared ray)
Possible.(by using
satellite or mobile radio
communication network)
Information
understanding
in real time
Impossible.
Long distance. Distance with reader Close distance.
Read + write. Read/write capacity Only read.
Virtually none. Once up
and running, the system is
completely automated.
Human Capital
Large requirements.
Laborers must scan each
tags.
High. Durability Low.
High. Security Low.
LALIT NFC
APPLICATION
Before & After
Previously Used
Methods
Current &
Future
Methods
IN HOTELS

More Related Content

PPTX
Near Field Communication (NFC) by Logesh
PPT
Near Field Communication (NFC)
PPTX
NFC near feald communication
PDF
Report on NEAR FIELD COMMUNICATION
PPTX
Near-field communication
PPT
Nfc kp561997 kv2_kalpakkam
PDF
On Relaying NFC Payment Transactions using Android devices
PPTX
NFC Technology
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC)
NFC near feald communication
Report on NEAR FIELD COMMUNICATION
Near-field communication
Nfc kp561997 kv2_kalpakkam
On Relaying NFC Payment Transactions using Android devices
NFC Technology

What's hot (20)

PPT
Near field communication
PDF
NFC - Near Field Communication
PDF
NEAR FIELD COMMUNICATION (NFC)
PDF
Near field communication (NFC)
PPTX
near field communication
PDF
2008 02 - ecma international nfc white paper
PPT
Nfc ppt
PPT
10.1
PPTX
Near field Technology
PPTX
PPT
Near Field Communication NFC
PPTX
Near field communication ppt
PPTX
NEAR FIELD COMMUNICATION
PPTX
NEAR FIELD COMMUNICATION (NFC)
DOC
Near Field Communication (NFC) technology
PPTX
Near Field Communication
PPT
It nfc presentation
DOC
nfc report file
PPTX
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Near field communication
NFC - Near Field Communication
NEAR FIELD COMMUNICATION (NFC)
Near field communication (NFC)
near field communication
2008 02 - ecma international nfc white paper
Nfc ppt
10.1
Near field Technology
Near Field Communication NFC
Near field communication ppt
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION (NFC)
Near Field Communication (NFC) technology
Near Field Communication
It nfc presentation
nfc report file
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Ad

Viewers also liked (20)

PPTX
Near field communication (nfc) technology
PPTX
Nfc presentation
PPTX
Near field communication
PPT
PPTX
NEAR FIELD COMMUNICATION
PDF
Nfc forum 14_feb07_press_and_analyst_briefing_slides
PPT
e-wallet , The future of Cards and Money
PPTX
Near field communication
PPTX
PPTX
NFC (near Field Communication)
PPT
Near Field Communications (NFC) Technology & Measurements
PPTX
Near Field Communication (NFC Architecture and Operating Modes)
PPTX
PPSX
Introduction to NFC
PPSX
Nfc-Full Presentation
PPTX
Near field communication
PPTX
NFC(Near Field Communication)
PPTX
Near field communication new
PPT
Nfc kdr
PDF
RFID: a condensed overview
Near field communication (nfc) technology
Nfc presentation
Near field communication
NEAR FIELD COMMUNICATION
Nfc forum 14_feb07_press_and_analyst_briefing_slides
e-wallet , The future of Cards and Money
Near field communication
NFC (near Field Communication)
Near Field Communications (NFC) Technology & Measurements
Near Field Communication (NFC Architecture and Operating Modes)
Introduction to NFC
Nfc-Full Presentation
Near field communication
NFC(Near Field Communication)
Near field communication new
Nfc kdr
RFID: a condensed overview
Ad

Similar to LALIT NFC (20)

PPTX
Near field communication
PPT
Near field communication
PPTX
Near field communication
PPTX
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
PPTX
Near field communication.pptx
PPTX
Near Feild Communication (NFC)
PPTX
NFC tech
PDF
Near Field Communication (NFC)
PDF
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
PPTX
Near field communication
PPTX
Near field communication(NFC)
PDF
Security in NFC
PPTX
PPTX
PDF
nfc-120827094647-phpapp01.pdf
PPTX
Near field communication (NFC)
PPTX
Near field commmunication
DOC
NFC documation
PDF
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
PPTX
Near field communication
Near field communication
Near field communication
Near field communication
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
Near field communication.pptx
Near Feild Communication (NFC)
NFC tech
Near Field Communication (NFC)
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY
Near field communication
Near field communication(NFC)
Security in NFC
nfc-120827094647-phpapp01.pdf
Near field communication (NFC)
Near field commmunication
NFC documation
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
Near field communication

LALIT NFC

  • 2.  Designed for short distance communication (up to 10 cm)  NFC or Near Field Communication is a short range high frequency wireless communication technology  It’s a contactless card and a contactless reader in one chip  It operates at 13.56 MHz  It’s designed for low bandwidth (max speed is 424 kBaud)  Applications aimed for are  Ticketing  Payment  Device Pairing 2 Short Range 13.56MHz RF Link
  • 3.  NFC is mainly aimed for mobile or handheld devices.  NFC is an extension of Radio frequency identification or RFID technology  RFID is mainly used for tracking and identification by sending radio waves
  • 4.  In 2004,NFC Forum was formed by Nokia, Philips, Sony, to set standards for NFC. Every NFC enabled device will have “N-Mark” trade mark, developed by NFC forum. N-Mark Trade mark
  • 5.  In 2006 First mobile phone (nokia 6131) with NFC released by NOKIA.
  • 6.  In 2010 First android phone SAMSUNG NEXUS S with NFC support released
  • 7.  Near Field Communication is based on inductive coupling.  NFC works using magnetic induction between two loop antennas located within each other’s ‘near field’.
  • 8.  Operating frequency 13.56 Mhz.  Data rate 106 kbit/s to 424 kbit/s  NFC use an initiator and a target.  Initiator actively generates an RF field that can power a passive target.  WPAN (wireless personal area network)is used in this technology
  • 10.  In active mode, both devices with NFC chip generates an electromagnetic field and exchange data.  In passive mode, there is only one active device and other uses that field to exchange information.
  • 11.  NFC application can be split into three basic categories: a. Touch and Go---ticketing b. Touch and Confirm---mobile payment c. Touch and Connect---to enable peer to peer transfer of data
  • 12.  Nexus S  Google Nexus S 4G  Samsung Galaxy S II  Samsung Galaxy Note  Galaxy Nexus  Nokia 6212 Classic  Nokia 6131 NFC
  • 13. 1) Coil in the first smart phone sets up a current that is picked up a second smart phone or reader. 2) The second smart phone receives the “induced current” from the first, recognizes it as a valid signal and offers a connection. 3) The first cell phone accepts the connection and begins the transaction.
  • 14. 1) Coil in the smart phone sets up a current that is picked up by the smart tag 2) The smart tag receives the “induced current” from the cell phone, recognizes it as a valid signal and offers a connection to the cell phone. 3) The cell phone accepts the connection and begins the transaction
  • 15. Advantage of NFC 1. Two-way data communication 2. Security level is high due to encoding system 3. High recognition speed, and low recognition error
  • 16.  Make payments or use coupons via devices, instead of credit or debit cards  Transfer files and share documents  Download information about objects, services or places from “smart posters”  Display electronic identity documents, like air travel boarding passes
  • 17.  There are dedicated roles  Initiator and Target  Any data transfer is a message and reply pair. 17 Initiator Target Message Reply • There are dedicated modes of operation – Active and Passive – Active means the device generates an RF field – Passive means the device uses the RF field generated by the other device
  • 18.  The VCO produce frequency modulated signal at the transmitter and phase locked loop demodulated the signal at receiver.
  • 19. 19 Active Passive 106 kBaud Modified Miller, 100% ASK Manchester, 10% ASK 212 kBaud Manchester, 10% ASK Manchester, 10% ASK 424 kBaud Manchester, 10% ASK Manchester, 10% ASK Active Passive Initiator Possible Not Possible Target Possible Possible
  • 20.  I am sorry, but NFC is not secure against eavesdropping .  From how far away is it possible to eavesdrop?  Depends….  RF field of sender  Equipment of attacker  ….  Does Active versus Passive mode matter?  Yes  In active mode the modulation is stronger (in particular at 106 kBaud)  In passive mode eavesdropping is harder.  Countermeasure  Secure Channel 20
  • 21.  Eavesdropping:- NFC by itself can not protect against eavesdropping. An attacker can use an antenna to also receive the transmitted signals.  Data Corruption:- Data corruption can be achieved by transmitting valid frequencies of the data spectrum at a correct time. The correct time can be calculated if attacker has a good understanding of the used modulation scheme and coding.
  • 22.  Data modification and Insertion :- An attacker can insert massage into the data exchange between two devices. But this is possible only in case the answering device needs a very long time to answer. For the modified miller encoding with 100% ASK this attack is feasible for certain bits and impossible for other bits. But for Manchester coding with 10% ASK this attack is feasible on all bits.
  • 23.  Eavesdropping:- Data transmitted in possible mode is significantly harder to be eavesdropping on, but just using the passive mode is probably not sufficient for most applications which transmit sensitive data. Only real solution is to establish a secure channel between the two devices.
  • 24.  Data corruption:- NFC devices can count this attack because they can check the RF field while they are transmitting data . If an NFC device does this, it will be able to detect the attack. The power which is needed to corrupt the data is significantly bigger, than the power which can be detected by the device. This every such attack should be detectable.
  • 25.  Data modification and Insertion:- By using 100k baud in active mode it gets impossible for an attacker to modify the data transmitted. NFC device should check the RF field while sending which means the sending device could continuously check for such an attack and could stop the data transmission when an attack is detected. Establishing an secure channel between in two devices.
  • 26. 26 1 Bit 1. Half-Bit 2. Half-Bit 100 0 Coded “0” Coded “1” Modified Miller Coding, 100% ASK Manchester Coding, 10% ASK 1 Bit 1. Half-Bit 2. Half-Bit 100 0 1 Bit 1. Half-Bit 2. Half-Bit 100 0 1 Bit 1. Half-Bit 2. Half-Bit 100 0
  • 31. 31 Alice Bob Message Eve EavesdroppingDisturb Alice detects the disturbance and stops the protocol • Check for active disturbances !
  • 33. 33 Alice Bob Eve Message Eve cannot send to Bob, while RF field of Alice is on! • Use Active – Passive connection ! • Use 106 kBaud !
  • 34.  Eavesdropping  No protection  Use a Secure Channel  Data Modification  No protection  Use Secure Channel  Man in the Middle Attack  Very good protection if  Alice uses 106 kBaud  Alice uses Active – Passive mode  Alice checks for disturbance  Alice checks for suspicious answers from Bob 34   NFC Intro Eaves- dropping Conclusion Data Modification Man-in-the- Middle Contents
  • 35. Speed of various technologies used for data transfer
  • 36. QR (Quick Response) code VS NFC (Near Field Communication) ALTERNATIVES
  • 37. RFID Difference Barcode $0.5/1 unit. Price $0.005/1 unit. More than 216 . High capacity Storage capacity 27 . Low capacity(about 20 letter) Radio frequency. How to use Visible light(infrared ray) Possible.(by using satellite or mobile radio communication network) Information understanding in real time Impossible. Long distance. Distance with reader Close distance. Read + write. Read/write capacity Only read. Virtually none. Once up and running, the system is completely automated. Human Capital Large requirements. Laborers must scan each tags. High. Durability Low. High. Security Low.
  • 40. Before & After Previously Used Methods Current & Future Methods IN HOTELS