SlideShare a Scribd company logo
NFC Operating Modes and
Security

By Rajeev Verma and Alessandro Sarra
Overview
●
●
●
●
●
●
●
●

Brief Introduction
Induction coupling
Modes
Essentials of each mode
Security
Future Development
Conclusions
References
Introduction to NFC
● Communication technology which works on physical
touch (4-10cm) of the devices.
● Benefits:
Intuitive
Versatile
Open and standard based
Inherently secure
Interoperable
Security-ready
Induction Coupling
Induction coupling is the technology behind the data
transfer in NFC communication.
Power received by receiver:
C is coupling coefficient which decides the effectiveness
in communication.
NFC Operating Modes
NFC Modes : Card Emulation Mode
●
●
●
●

Emulate contact-less smart card
Communicate with RFID readers
Mobile payment and ticketing
Compatible to existing infrastructure
Card Emulation Mode Communication
Architecture
NFC Operating Modes
NFC Modes :Reader/Writer Mode
● Communicate with:
○ Smart Cards
○ NFC tags
● Embedded in readable object
● Sends Information Passively
Communication Architecture of Reader/Writer Mode
NDEF: NFC Data Exchange Format
● Standardized format
○ Store data on tags
○ Transport data
● Lightweight Binary
○ Encapsulation
■ Single message
construct
■ One or more payload
NDEF Message
NDEF : Record
●
●
●
●

●

●
●

MB - msg begin
ME - msg end
CF - Chunk Flag
○ CF = 0 No chunk.
SR - Short Record
○ SR=0 : Single octet msg.
○ Max 255 octets
IL - Identification length
○ IL = 0 : ID Length omitted from
Record.
Type Length : Define length of Type
field octet
Payload Length
NDEF : TNF
● → structure of type
field
● → 3 bits field
● Type field finally have
the type for message.
NFC Operating Modes
NFC Modes : Peer-to-Peer
● 2 Devices
● Direct Communication
● Share Bluetooth or WiFi
setup
● Send photos or small text
NFC Modes: Peer-to-Peer
● Communication Architecture
Peer-to-Peer mode essentials
● Protocol Stack

● LLCP Protocol Services
○ Connectionless transport
○ Connection oriented transport
○ Link related Services
○ Asynchronous Balanced communication
○ Protocol Multiplexing

OSI vs LLCP
Security Aspects in NFC
●
●
●
●
●
●
●
●

Eavesdropping
Data Corruption
Data Modification
Relay Attack
Lost Property
Walk-off
NDEF and Signature Recognition
Weaknesses of Digital Signing
Eavesdropping
● Even though Range is small in NFC, still signals are
retrievable from 1mt to 10mt.
● Using a secure channel can be a solution for NFC data
transfer.
Data Corruption
● Attacker can attempt to disrupt communications by
forcefully sending seemingly valid data.
● Channel can be blocked for ongoing data transmission
between devices.
Solution:
● Device can report the higher power used for
communication which is possibly the corrupted Data.
Data Modification
● Data can be maliciously altered in the communication
path keeping the data format same.
Solution:
● 100% modulation and Miller encoding can prevent Data
Modification.
● Data transfer at 106 baud rate is least susceptible for
modification but eavesdropping probability can be
increased.
Man in the middle
● Communication between two parties can is interrupted
by third.
● Potentially possible when two mobile devices are
actively communicating in peer-to-peer mode.
● Communication in other modes are immune to this
attack.
Walk-off
● Attacks are possible during access to a secure NFC
function or data is given prior to it timing out after a
period of inactivity.
Solution:
● Wireless authentication factor known as an electronic
"leash"
● Devices are leashed till the device goes out of the
range.
Relay Attack
● Similar to Man in Middle attack, adversary has to
forward the request of the reader to the victim.
● Attacker potentially has access any service directly
related to the data being sent.
Lost Property
● If the NFC device is lost, it will open access to anyone
who finds it and can pass authenticity checks.
● Extended security concepts do exist at the application
level that provide theft protection and tracking.
NDEF and Signature Recognition
● Digital Signature Records can provide encryption
through use of public-key cryptography.
● Digital Signature Records, when coupled with the NFC
Data Exchange Format, can serve as a feasible means
of security.
Benefits:
Authentic
→ There is a unique signer.
Unforgettable → Only the signature owner may
create a key.
Non-reusable: → The signature is bound the signed
Weakness
● Digital Signing is still a weakness for NFC
communication.
● Digital signing can resolve the problem of device
authentication and reliable event triggering.
Future Applications
● Interactive data
● NFC Tag Everything!!!
○ Tag doubles as bar-code
● Mobile Device Transactions
● Organization and Awareness
Future Development
● Wireless charging
○ reception
○ transmission
○ both
● Dock for
home/office/car
● 13.56MHz
● 1 Watt Max
● Energy Saving
Future Development

● SD Card Integration
○
○
○
○

Isolated Antenna
Memory Controller
Card Controller
Memory

● OTA, MiFare, JCOP,
Perso
Conclusion
● Emerging Technology
● Pros
○ Power-saving
○ Low Profile
● Cons
○ Inefficient
○ Hard to ‘Sell’
Questions??
Thank You!
[1] V. Coskun, K. Ok, et al., “NFC Operating Modes,” Near Field Communication: From Theory to Practice, Chichester, United Kingdom: John
Wiley and Sons Ltd., 2012, ch. 4.
[2] S. A. Ahson and I. Mohammad, “Security in NFC,” in Near Field Communications Handbook, Boca Raton: CRC Press, 2012, ch. 2, sec. 2,
pp. 26-45
[3] NFC Record Type Definition, NFC Forum Technical Specification, Rev. 1.0, Jul. 2006.
[4] E. Strommer, M. Jurvansuu, T. Tuikka, A. Yisaukko-oja, H. Rapakko, and J. Vesterinen, “NFC-enabled wireless charging,” in Near Field
Communication (NFC), 2012 4th International Workshop on, march 2012, pp. 36-41.
[5] M. Roland and J. Langer, “Digital Signature Records for the NFC Data Exchange Format,” in Proceedings of the Second International
Workshop on Near Field Communication (NFC 2010), Monaco, Apr. 2010, pp. 71-76.
[6] G. Madlmayr, J. Langer, C. Kanter, and J. Scharinger, “NFC Devices: Security and Privacy,” in Third International Conference on Availability,
Reliability and Security, March 2008, pp.642-647.
[7] Yen-Sheng Chen, “Analysis of antenna coupling in near-field RFID systems,” in IEEE AP-S Int. Symp. Dig., Jun. 2009, pp. 1-4.
[8] P. Dobrigkeit, T. Flach, P. Faymonville, J. Muller. Exchange of contact data between mobile phones using NFCIP” in Proceedings of 4th
European Workshop on RFID Systems and Technologies (RFID SysTech), 2008, pp. 1-9.
[9] S. Wu, “Promoting Collaborative Mobile Payment by Using NFC-Micro SD Technology,” in Tenth International Conference on Services
Computing, Jun. 2013, pp. 454-461.

More Related Content

PDF
Nfc forum 14_feb07_press_and_analyst_briefing_slides
PDF
NFC Everywhere Brochure 2016
PPTX
NFC (Near Field Communication) by sandip murari
PPTX
Near Field Communication by Mohammed Mudassir
DOCX
An Electronic Ticketing System based on Near Field Communication for Concerts...
PPTX
Near Field Communication (NFC Architecture and Operating Modes)
PPT
Near field communication
PPTX
NEAR FIELD COMMUNICATION (NFC)
Nfc forum 14_feb07_press_and_analyst_briefing_slides
NFC Everywhere Brochure 2016
NFC (Near Field Communication) by sandip murari
Near Field Communication by Mohammed Mudassir
An Electronic Ticketing System based on Near Field Communication for Concerts...
Near Field Communication (NFC Architecture and Operating Modes)
Near field communication
NEAR FIELD COMMUNICATION (NFC)

What's hot (20)

PPTX
NFC (Near Field Communication) presentation
PDF
Ultrabook Development Using Sensors - Intel AppLab Berlin
PDF
Telecommunications in the logistic sector lodz
KEY
Nfc Overview
PPTX
Near field communication
PPTX
Near field communication(NFC)
PDF
RFID/NFC for the Masses
PPTX
NFC for the Internet of Things
PPTX
Near field communication
PPTX
Near field communication(NFC)
PDF
New use cases thanks to adding crypto to RFID tags
PPTX
NFC: Shaping the Future of the Connected Customer Experience
PDF
Designing low costs sensor system for the Internet of Things
PPTX
NFC technical presentation
PPTX
NEAR FIELD COMMUNICATION
PDF
Nfc security shane_turner_spring2013
PDF
PDF
Near field communication
PPTX
PDF
Ask Contactless Terminals
NFC (Near Field Communication) presentation
Ultrabook Development Using Sensors - Intel AppLab Berlin
Telecommunications in the logistic sector lodz
Nfc Overview
Near field communication
Near field communication(NFC)
RFID/NFC for the Masses
NFC for the Internet of Things
Near field communication
Near field communication(NFC)
New use cases thanks to adding crypto to RFID tags
NFC: Shaping the Future of the Connected Customer Experience
Designing low costs sensor system for the Internet of Things
NFC technical presentation
NEAR FIELD COMMUNICATION
Nfc security shane_turner_spring2013
Near field communication
Ask Contactless Terminals
Ad

Viewers also liked (19)

PPTX
Near field communication (nfc) technology
PPTX
NEAR FIELD COMMUNICATION
PPTX
Near field communication
PDF
A Librarian's Field Guide to Near Field Communication
PPTX
NFC Technology
PPTX
Nfc presentation
PPT
Near field communication - Data transmission
PDF
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
PPTX
NEAR FIELD COMMUNICATION (NFC)
PPT
e-wallet , The future of Cards and Money
PPTX
PPTX
Near field communication
PPTX
Near field communication
PPT
Near Field Communications (NFC) Technology & Measurements
PPTX
Project
PDF
Seminar Report on NFC
PPTX
Near field communication(nfc)
PPTX
LALIT NFC
Near field communication (nfc) technology
NEAR FIELD COMMUNICATION
Near field communication
A Librarian's Field Guide to Near Field Communication
NFC Technology
Nfc presentation
Near field communication - Data transmission
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
NEAR FIELD COMMUNICATION (NFC)
e-wallet , The future of Cards and Money
Near field communication
Near field communication
Near Field Communications (NFC) Technology & Measurements
Project
Seminar Report on NFC
Near field communication(nfc)
LALIT NFC
Ad

Similar to Nfc power point (20)

PPTX
Near field communication new
PPTX
Near Field Communication (NFC) Protocols
PDF
Near Field Communication (NFC)
PPTX
Near field communication.pptx
PPTX
Near Field Communication
PDF
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
PPTX
Near field communication
PPTX
Near Feild Communication (NFC)
PPTX
PDF
Near field communication (NFC)
PPTX
NFC tech
PPTX
Near field commmunication
PPTX
Near field communication
PPTX
Near field communication
PPT
NFC TECHNOLOGY
PPTX
Near-field communication
PPTX
PDF
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES
Near field communication new
Near Field Communication (NFC) Protocols
Near Field Communication (NFC)
Near field communication.pptx
Near Field Communication
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPE
Near field communication
Near Feild Communication (NFC)
Near field communication (NFC)
NFC tech
Near field commmunication
Near field communication
Near field communication
NFC TECHNOLOGY
Near-field communication
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURES

Recently uploaded (20)

PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
advance database management system book.pdf
PPTX
20th Century Theater, Methods, History.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Computing-Curriculum for Schools in Ghana
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
advance database management system book.pdf
20th Century Theater, Methods, History.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
What if we spent less time fighting change, and more time building what’s rig...
Paper A Mock Exam 9_ Attempt review.pdf.
Introduction to pro and eukaryotes and differences.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
My India Quiz Book_20210205121199924.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Computing-Curriculum for Schools in Ghana
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Empowerment Technology for Senior High School Guide
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
1_English_Language_Set_2.pdf probationary
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf

Nfc power point

  • 1. NFC Operating Modes and Security By Rajeev Verma and Alessandro Sarra
  • 2. Overview ● ● ● ● ● ● ● ● Brief Introduction Induction coupling Modes Essentials of each mode Security Future Development Conclusions References
  • 3. Introduction to NFC ● Communication technology which works on physical touch (4-10cm) of the devices. ● Benefits: Intuitive Versatile Open and standard based Inherently secure Interoperable Security-ready
  • 4. Induction Coupling Induction coupling is the technology behind the data transfer in NFC communication. Power received by receiver: C is coupling coefficient which decides the effectiveness in communication.
  • 6. NFC Modes : Card Emulation Mode ● ● ● ● Emulate contact-less smart card Communicate with RFID readers Mobile payment and ticketing Compatible to existing infrastructure
  • 7. Card Emulation Mode Communication Architecture
  • 9. NFC Modes :Reader/Writer Mode ● Communicate with: ○ Smart Cards ○ NFC tags ● Embedded in readable object ● Sends Information Passively
  • 10. Communication Architecture of Reader/Writer Mode
  • 11. NDEF: NFC Data Exchange Format ● Standardized format ○ Store data on tags ○ Transport data ● Lightweight Binary ○ Encapsulation ■ Single message construct ■ One or more payload
  • 13. NDEF : Record ● ● ● ● ● ● ● MB - msg begin ME - msg end CF - Chunk Flag ○ CF = 0 No chunk. SR - Short Record ○ SR=0 : Single octet msg. ○ Max 255 octets IL - Identification length ○ IL = 0 : ID Length omitted from Record. Type Length : Define length of Type field octet Payload Length
  • 14. NDEF : TNF ● → structure of type field ● → 3 bits field ● Type field finally have the type for message.
  • 16. NFC Modes : Peer-to-Peer ● 2 Devices ● Direct Communication ● Share Bluetooth or WiFi setup ● Send photos or small text
  • 17. NFC Modes: Peer-to-Peer ● Communication Architecture
  • 18. Peer-to-Peer mode essentials ● Protocol Stack ● LLCP Protocol Services ○ Connectionless transport ○ Connection oriented transport ○ Link related Services ○ Asynchronous Balanced communication ○ Protocol Multiplexing OSI vs LLCP
  • 19. Security Aspects in NFC ● ● ● ● ● ● ● ● Eavesdropping Data Corruption Data Modification Relay Attack Lost Property Walk-off NDEF and Signature Recognition Weaknesses of Digital Signing
  • 20. Eavesdropping ● Even though Range is small in NFC, still signals are retrievable from 1mt to 10mt. ● Using a secure channel can be a solution for NFC data transfer.
  • 21. Data Corruption ● Attacker can attempt to disrupt communications by forcefully sending seemingly valid data. ● Channel can be blocked for ongoing data transmission between devices. Solution: ● Device can report the higher power used for communication which is possibly the corrupted Data.
  • 22. Data Modification ● Data can be maliciously altered in the communication path keeping the data format same. Solution: ● 100% modulation and Miller encoding can prevent Data Modification. ● Data transfer at 106 baud rate is least susceptible for modification but eavesdropping probability can be increased.
  • 23. Man in the middle ● Communication between two parties can is interrupted by third. ● Potentially possible when two mobile devices are actively communicating in peer-to-peer mode. ● Communication in other modes are immune to this attack.
  • 24. Walk-off ● Attacks are possible during access to a secure NFC function or data is given prior to it timing out after a period of inactivity. Solution: ● Wireless authentication factor known as an electronic "leash" ● Devices are leashed till the device goes out of the range.
  • 25. Relay Attack ● Similar to Man in Middle attack, adversary has to forward the request of the reader to the victim. ● Attacker potentially has access any service directly related to the data being sent.
  • 26. Lost Property ● If the NFC device is lost, it will open access to anyone who finds it and can pass authenticity checks. ● Extended security concepts do exist at the application level that provide theft protection and tracking.
  • 27. NDEF and Signature Recognition ● Digital Signature Records can provide encryption through use of public-key cryptography. ● Digital Signature Records, when coupled with the NFC Data Exchange Format, can serve as a feasible means of security. Benefits: Authentic → There is a unique signer. Unforgettable → Only the signature owner may create a key. Non-reusable: → The signature is bound the signed
  • 28. Weakness ● Digital Signing is still a weakness for NFC communication. ● Digital signing can resolve the problem of device authentication and reliable event triggering.
  • 29. Future Applications ● Interactive data ● NFC Tag Everything!!! ○ Tag doubles as bar-code ● Mobile Device Transactions ● Organization and Awareness
  • 30. Future Development ● Wireless charging ○ reception ○ transmission ○ both ● Dock for home/office/car ● 13.56MHz ● 1 Watt Max ● Energy Saving
  • 31. Future Development ● SD Card Integration ○ ○ ○ ○ Isolated Antenna Memory Controller Card Controller Memory ● OTA, MiFare, JCOP, Perso
  • 32. Conclusion ● Emerging Technology ● Pros ○ Power-saving ○ Low Profile ● Cons ○ Inefficient ○ Hard to ‘Sell’
  • 34. Thank You! [1] V. Coskun, K. Ok, et al., “NFC Operating Modes,” Near Field Communication: From Theory to Practice, Chichester, United Kingdom: John Wiley and Sons Ltd., 2012, ch. 4. [2] S. A. Ahson and I. Mohammad, “Security in NFC,” in Near Field Communications Handbook, Boca Raton: CRC Press, 2012, ch. 2, sec. 2, pp. 26-45 [3] NFC Record Type Definition, NFC Forum Technical Specification, Rev. 1.0, Jul. 2006. [4] E. Strommer, M. Jurvansuu, T. Tuikka, A. Yisaukko-oja, H. Rapakko, and J. Vesterinen, “NFC-enabled wireless charging,” in Near Field Communication (NFC), 2012 4th International Workshop on, march 2012, pp. 36-41. [5] M. Roland and J. Langer, “Digital Signature Records for the NFC Data Exchange Format,” in Proceedings of the Second International Workshop on Near Field Communication (NFC 2010), Monaco, Apr. 2010, pp. 71-76. [6] G. Madlmayr, J. Langer, C. Kanter, and J. Scharinger, “NFC Devices: Security and Privacy,” in Third International Conference on Availability, Reliability and Security, March 2008, pp.642-647. [7] Yen-Sheng Chen, “Analysis of antenna coupling in near-field RFID systems,” in IEEE AP-S Int. Symp. Dig., Jun. 2009, pp. 1-4. [8] P. Dobrigkeit, T. Flach, P. Faymonville, J. Muller. Exchange of contact data between mobile phones using NFCIP” in Proceedings of 4th European Workshop on RFID Systems and Technologies (RFID SysTech), 2008, pp. 1-9. [9] S. Wu, “Promoting Collaborative Mobile Payment by Using NFC-Micro SD Technology,” in Tenth International Conference on Services Computing, Jun. 2013, pp. 454-461.