NFC: A review of technology, tags, applications and security

Abstract

Smart phones are on a course to becoming a need instead of just a want as users are integrating the devices into every aspect of their lives. Smart phones adoption also increases due to the convergence of value-added services in them. One of the technologies which will enhance this convergence is Near Field Communication (NFC). NFC is a short range high frequency wireless communication technology. It exchanges data between two devices having maximum distance of 4 inches (~10 cm). It is based on RFID technology and has different types of operating modes. NFC enabled mobile phone can be used in health care application; but this introduces some attacks on application. Major attacks are relay attack, eavesdropping, data insertion, data modification and denial of service (DOS). These attacks must be prevented for making NFC based application more secure. This paper reviews the NFC technology, its communication modes and operating modes along with applications in different modes; risks in NFC and its possible countermeasure. It also reviews different types of NFC tags.

Authors and Affiliations

Prasad S. Halgaonkar , Sukmal Jain, V. M. Wadhai

Keywords

Related Articles

Automatic Wrapper Generation for Search Engines Based on Visual Representation

Normally web databases are provides the information based on query representation. All the results are displayed without any structure. All extracted results are not provides any specific or perfect generation. It ca...

Comparison of EEA3 and EEA1 Algorithms in Terms of Encryption Time and Throughput

EEA3 (Evolved Packet System Encryption Algorithm 3) and EEA1 (Evolved Packet System Encryption Algorithm 1) are confidentiality algorithms that are used to en/decrypt blocks of data. In this paper we present the enc...

Recent Issues and Its Quick Fixes for Various Data Repositories

The aim of this study was to assess the issues and their quick fixes of databases. But the database accuracy has a trickle down effect in most implementations. This paper proposes the overall guidance about the techni...

Extraction of Frequent Subgraph from Graph Database

Graphs are promising abstraction of complex structured and semi-structured data. Graph mining techniques extract, analyze and summarize significant and useful information from the graph databases. Finding frequent su...

Comparative Study of Fractional Order Derivative Based Image Enhancement Techniques

In this paper, image enhancement based on fractional gradient is proposed. The Taylor’s Series is used to obtain a generalized expression for this Fractional order derivative. The Image is differentiated in both x and...

Download PDF file
  • EP ID EP27696
  • DOI -
  • Views 262
  • Downloads 4

How To Cite

Prasad S. Halgaonkar, Sukmal Jain, V. M. Wadhai (2013). NFC: A review of technology, tags, applications and security. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27696