Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Hineeth Kumar SP, Karthik N Gowda, Yogesh S, Likith S, Nandini S
DOI Link: https://doi.org/10.22214/ijraset.2023.53246
Certificate: View Certificate
The world of electronics and through the move from one machine to all the multi-purpose bias, by moving from device to network bias. On the other hand, stoners do not face the complications and problems of establishing a network of connections between bias and each other. Hence we can set multiple network functions are handled in the computer world, but not in the Universe of electronics. Using the protocol( NFCIP- 2.0), according to which stoners of electronic bias, which give the use of secure means of communication between various bias without trouble is considerable geek in the conformation of their own network generality is simple striking According also to communicate between two bias, and bring them together, using Protocol NFCIP- 1 and the wireless network to deal with them in the peer Baland and also\'s the exchange of configuration data using NFC, and also you can not continue with the bias, some of the longer and hastily than protocols analogous as Bluetooth or wireless Ethernet( WiFi).
I. INTRODUCTION
Nfc is a truly important ways. Also will be the integration of technology in mobile phones to make people's lives much easier. Among those companies nokia and some other companies in the request moment with the presence of nfc in mobile phones of their own. Will be part of smart mobile phones in the future. Nfc has a lot of operations in everyday life. We will not be need to carry cards, different electronic analogous as access cards, disbenefit cards credit cards and identity will be the cards are formerly in the cell phone, and will use them anywhere we want and won't transfer data easily from any device to another. And also do not need to repeat the keys because we can use only one phone rather of keys. Indeed more, we can buy and storee- tickets on the cell phone and there is also a set of criteria to determine the work of smart phones and similar bias to be the wireless contact them by touching each other or make them side by side, and not further than the distance of a numerous centimeters. There is also the current and awaited operations include data sharing,and altered setup of future complex communication analogous as wi- fi and wireless communications. Communication is also possible between the device and the nfc chip un powered nfc, which is named" marker". Established bluetooth or wi- fi can be used to transfer datain wireless way of medium . Advantage of using this system is to transfer larger data or continuing the communication session if bias go down after touching each other( 1). Nfc enables two way dispatches between electronic bias. And has the capacity to write to the rfid radio frequency identification device) chip. Therefore bidirectional communication between nfc- equipped cell phone and nfc florilegium can be established. That makes the possibility to develop complex operations like payment, secure exchange of data and identity’s authentication( 4). Nfc tools touching paradigm. Touching is a notorious and interactive system in mortal lives. This makes nfc technology easy to learn and use for advance technalogy . This touching paradigm was firstly used in rfid( radio frequency identification device) technology. In rfid technology particulars pronounced with labels contain transponders which emit dispatches in the form of signals. Rfid albums were used to read those dispatches. Nfc is now integrated with this rfid technology. The labels to be readable by nfc florilegium should have 4 to 10 byte unique id. This unique id is used for the identification of the marker. There are multiple manufacturers in the sedulity, so id’s length may vary in size( 5). From the technical point of view, nfc is blend of contactless smart card technology and cell phone. Nfc equipped bias generally operate in three different modes. Card emulation mode, peer- to- peer mode, and florilegium- pen mode. In card emulation mode nfc device behaves like aanthology e.g. Nfc marker. This marker has the capacity to store data securely and the operations of this mode are electronic marking and payments. In peer topeer mode two bias equipped with nfc can change data directly by touching each other. Operations of p2p mode are transferring data between laptop and cell phone. Printing of data by touching laptop with printer with wireless connectivity. In reader writer mode nfc device can read and write the labels in similar fashion like rfid labels( 6). Nfc can read and write data on radio frequency chip. And rfid( radio frequency identification device) chip can be bedded in everything starting from paper to ministry. Rfid is mannish used for shadowing and identification through radio swells( 04). Nfc core operations include connecting electronic bias, piercing digital contents and making contactless deals .
II. MODES OF NEAR FIELD COMMUNICATION (NFC)
Three modes of communication are defined by NFC forum.
III. NEAR FIELD COMMUNICATION (NFC) THEORETICAL CONSIDERATION
Now Come a technology shift from one machine to the network and the bias connected to a single conception from tackle to multiple bias purposes. It is important that consumers don’t face complications in the tackle configuration for the establishment of a network, leading to near field dispatches, will be the NFC is a combination between identity and connectivity through technologies that contactless propinquity between information and come easy communication between small electronic bias to be created to prompt the glamorous induction when they’re touching the bias or come near to each other with a many centimetres to enable communication between them. Also been established and peer- to- peer network for data exchange.
Once you produce a dispatches network to other wireless technologies can be used similar as Bluetooth and Wi- Fi to change a large quantum of data and adding the range of dispatches including. Let’s take an illustration if you have a laptop and cell phone equipped with NFC, also you can fluently download data from Internet into your cell phone by simply touching your cell phone with laptop. Like that you may take filmland from your cell phone and if you want to show those filmland to your musketeers on big screen(television) also you may just touch your phone with television and show them.
Or if you want to publish those filmland also by touching the cell phone with NFC equipped printer will give you the prints of those filmland. This principle works with any kind of bias equipped with NFC to communicate with each other. There's no need to set up the communication link originally. Suppose you want to transfer a train from one laptop to other by using new technologies, like Bluetooth or Wi- Fi. You need to manually set up the communication link between laptops. But if you're using NFC enabled laptops, also you may transfer the train by just touching both laptops. In another situation you may establish the link using NFC and formerly communication link is In read/ write mode NFC phone can read or write to the label. For illustration smart bill. Contactless communication supports this mode( 7).
Whilein label emulation mode NFC phone acts like smart card.For illustration, mobile as electronic portmanteau. Third mode is peer to- peer mode in which link position communication is established between two NFC phones. For illustration swapping business cards.
IV. MODES OF OPERATION (NFC)
RF signal transmission between transmitter and receiver creates the main distinction between NFC and other RF wireless communication modes. NFC depends upon straight glamorous / electrostatic coupling between bias rather of freely broadcasting of radio swells, similar as in Wi- Fi. NFC bias can operate on low electric or glamorous field strengths due to its short range communication property Field Strength of NFC system can operate either in active or unresistant mode depending upon conditions.
a. Active Mode: In this mode both bias induce RFiID( radio frequence) field to transfer data. In this situation any of the bias can be the generator and other will be the target. While in unresistant mode, only one device generates the RF field and other uses cargo modulation to transfer data. In this situation generator of the communication will induce field and target will use cargo modulation. During the communication, the generator starts the communication in a particular mode at a specific speed. Target finds out the current speed and replies back to the generator. Termination of the communication takes place either when two bias move out of the range or operation gives command to terminate it( 1). During communication either generator or target generates RF field of position H min that doesn't go beyond the field position of H maximum
b. Passive Mode: This mode has a pivotal benefit for battery powered bias. For battery powered bias low consumption of battery is the introductory priority. thus NFC allows battery powered bias analogous as cell phones to operate in unresistant mode. In this mode RF field is generated on the other side. thus battery power is saved that was demanded to be used for generating RF field. In unresistant mode target operates continuously between H min and H outside glamorous field strength. NFC protocol is also compatible with wireless smart card protocols like Felicia and Mifare. NFC device can work with both smart card and smart card florilegium. Another benefit of he NFC device is that it can be used as smart card, as well as smart card florilegium bias can not change mode of communication ( Active/ Passive) during single trade unless target is removed or killed. Indeed transfer speed of target to creator and vice versa may not prompt the change in mode.
V. NFC APPLICATIONS
NFC fall under three different categories upon its usage in different fields.
We\'re in this report and a brief description of the security and sequestration pitfalls to the bias NFC. The same technology and security pitfalls the same wireless technology. Compared with other wireless technologies some of the pitfalls have an impact on the low NFC, similar as wiretapping, which is delicate to achieve through the sale due to the distance in lower communication between bias and the denial of the attack, which will only affect the normal operation for some time. The data revision, data corruption, and the attack of the successional bias NFC. Because when we look at the use cases with regard to smart bills, where addresses are used vicious websites to direct druggies to vicious websites or services. Can be used to download vicious software on the mobile phone. Can also be used vicious software to listen in on the data entered on the keyboard or attempt to pierce sensitive data, which threatens the security of other operations. Encryption gives us better way to secure dispatches. But the question is which encryption system to use then, either symmetric or asymmetric. Symmetric encryption has its own issues, like crucial distribution and trust, etc. Asymmetric encryption fashion increases sale time and further application of battery power. Which isn\'t suitable in terms of low powered bias. Advanced encryption ways like ECC( Elliptic wind Cryptography) can be used to break similar issues. Using applicable encryption fashion depends on the use case. In sensitive surroundings, where further security is needed, asymmetric cryptography should be used despite of its increased sale time property. Using NFC bias will affect particular sequestration by tractability. Conceivably someone could read UID of a NFC label from a distance and see that the same phone passes at a after time. Having GPS in the cell phone will help bushwhacker to leg point your position. Cell phone affected by malware can collect all of the information stored in the cell phone or the information compartmented by the keyboard and can shoot it back to the bushwhacker. No mistrustfulness NFC technology will ease our life. Its touch and go installation will be delightful for the people. But, this technology isn\'t develop yet and has lots of security and sequestration issues. Using NFC bias for entertainment will be delightful. But for business use we suppose that this technology isn\'t yet ready. and sequestration pitfalls faced by NFC, discussion and critical analysis of these issues by looking from different aspects? Impact of sequestration issues on diurnal life will also be addressed.
[1] Near Field Communication, White paper, ECMA international, December 2003 [2] Irene Luque Ruiz and Miguel Ángel Gómez-Nieto, “University Smart Poster: Study of NFC Technology Applications for University Ambient”, Córdoba, Spain, 2008 [3] PäiviJaring, ViliTörmänen, ErkkiSiira, and TapioMatinmikko, ”Improving Mobile Solution Workflows and Usability Using Near Field Communication Technology”, Technical Research Center of Finland Oulu, Finland, Springer-Verlag Berlin Heidelberg, pp. 358–373, 2007 [4] Eamonn O’Neill, Peter Thompson, Stavros Garzonis, and Andrew Warr,” Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices”, UK, 2007 [5] ECMA-340 Standard, Near Field Communication Interface and Protocol (NFCIP-1), 2nd edition, December 2004 [6] GiulianoBeneli and Alessandro Pozzebon,”Near Field communication and Health: Turning a mobile phone into an interactive Multipurpose Assistant in health care scenarios”, Italy,2010 [7] Collin Mulliner,” Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones”, Fraunhofer Institute for Secure Information Technology (SIT),2008 [8] Gauthier Van Damme and KarelWouters, “Practical Experiences with NFC Security on Mobile Phones, Belgium, 2008 [9] Renee Montes,”Examining the technology,security and application of NFC and Evaluateing the possible success of near field communication application in US Markets”, Master thesis , Bowie State Univerity,May 2009 [10] Gauthier Van Damme and KarelWouters, “Practical Experiences with NFC Security on Mobile Phones, Belgium, 2008 [11] Ernst Haselsteiner and KlemensBreitfu, “Security in Near Field Communication (NFC) - Strengths and Weaknesse”,Philips Semiconductors, Mikronweg , Gratkorn, Austria, 2006 [12] Gerald, Josef,Christian and Josef Scharinger, “NFC Devices: Security and Privacy, ARES 08 proceedings of the 2008 Third International Conference on Availability, Reliability and Security, IEEE Computing Society, Washington, DC, USA, 2008 [13] Lishoy Francis, Gerhard Hancke, Keith Mayes, and KonstantinosMarkantonakis,” Practical NFC Peer-to-Peer Relay Attack using Mobile Phones”,UK,2010 [14] Renee Montes,”Examining the technology,security and application of NFC and Evaluateing the possible success of near field communication application in US Markets”, Master thesis , Bowie State Univerity,May 2009 [15] Ernst Haselsteiner and KlemensBreitfu, “Security in Near Field Communication (NFC) - Strengths and Weaknesse”,Philips Semiconductors, Mikronweg , Gratkorn, Austria, 2006 [16] MatijaBumbak,” Analysis of potential RFID security problems in supply chains and ways to avoid them”, Master thesis,May 2005 [17] Rhys Williams, “NFC and RFID: Data security and privacy issues”, Bird & Bird United Kingdom, USA, April 3, 2007 [18] Paillès, J.C. Gaber, C. Alimi, V. Pasquet, M , “ Payment and Privacy: A key for the development of NFC mobile “,ENSICAEN, GREYC Lab., Univ. of Caen, France , 03 June 2010 [19] Eamonn O’Neill, Peter Thompson , Stavros Garzonis and Andrew Warr,” Reach out and touch: using NFC and 2D barcodes for service discovery and interaction with mobile devices”, UK, 2006
Copyright © 2023 Hineeth Kumar SP, Karthik N Gowda, Yogesh S, Likith S, Nandini S. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET53246
Publish Date : 2023-05-28
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here