NFC: A review of technology, tags, applications and security

Abstract

Smart phones are on a course to becoming a need instead of just a want as users are integrating the devices into every aspect of their lives. Smart phones adoption also increases due to the convergence of value-added services in them. One of the technologies which will enhance this convergence is Near Field Communication (NFC). NFC is a short range high frequency wireless communication technology. It exchanges data between two devices having maximum distance of 4 inches (~10 cm). It is based on RFID technology and has different types of operating modes. NFC enabled mobile phone can be used in health care application; but this introduces some attacks on application. Major attacks are relay attack, eavesdropping, data insertion, data modification and denial of service (DOS). These attacks must be prevented for making NFC based application more secure. This paper reviews the NFC technology, its communication modes and operating modes along with applications in different modes; risks in NFC and its possible countermeasure. It also reviews different types of NFC tags.

Authors and Affiliations

Prasad S. Halgaonkar , Sukmal Jain, V. M. Wadhai

Keywords

Related Articles

Location Fixing by 3 DF Stations using Triangulation Method

One of the most important requirements placed on EW (Electronic Warfare) systems is the location of threat emitters. The paper deals with the location of an object at unknown position, on which bearings are taken fro...

Open Assessment for Collective Information with competent User Revocation in Cloud Computing

Cloud Computing provides an efficient solution for storing and sharing data resources among group members but the security and the identity of cloud users may be in trouble and sharing our secure data among groups is...

Novel Iris Recognition Techniques using Energy Compaction and Partial Energies of Transformed Iris Images with Cosine-Kekre and CosineHartley Hybrid Wavelet Transforms

The paper presents novel Iris Recognition technique using Energy Compaction and Partial Energies of transformed iris images with the Hybrid wavelet transform namely ‘Cosine-Kekre’ and ‘Cosine-Hartley’ Hybrid wavelet...

To Develop an Efficient Approach to NCL Selection In DTNS Based on a Probabilistic Selection Metric

Caching is an additional way to supply data access. Cooperative caching in wireless ad hoc networks was studied in which each node caches pass-by data based on data popularity, so that queries in the potential can be...

An Overview on Template Matching Methodologies and its Applications

A very common task in pattern recognition is template matching. The detection and recognition of objects in images is a key research topic in the computer vision community. Within this area, image recognition and in...

Download PDF file
  • EP ID EP27696
  • DOI -
  • Views 270
  • Downloads 4

How To Cite

Prasad S. Halgaonkar, Sukmal Jain, V. M. Wadhai (2013). NFC: A review of technology, tags, applications and security. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27696