NFC: A review of technology, tags, applications and security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
Smart phones are on a course to becoming a need instead of just a want as users are integrating the devices into every aspect of their lives. Smart phones adoption also increases due to the convergence of value-added services in them. One of the technologies which will enhance this convergence is Near Field Communication (NFC). NFC is a short range high frequency wireless communication technology. It exchanges data between two devices having maximum distance of 4 inches (~10 cm). It is based on RFID technology and has different types of operating modes. NFC enabled mobile phone can be used in health care application; but this introduces some attacks on application. Major attacks are relay attack, eavesdropping, data insertion, data modification and denial of service (DOS). These attacks must be prevented for making NFC based application more secure. This paper reviews the NFC technology, its communication modes and operating modes along with applications in different modes; risks in NFC and its possible countermeasure. It also reviews different types of NFC tags.
Authors and Affiliations
Prasad S. Halgaonkar , Sukmal Jain, V. M. Wadhai
Rxc Based Parity Sharing For Error Correction
Single error correction (SEC) code are used to detect and correct single bit errors by using hamming code method.SEC code requires more parity check bits. Product code can be detect and correct the single bit error....
A Study on Jamming and Wormhole Attacks in Wireless Mesh Network
Wireless Mesh Networks (WMNs) is a network ,where data is transmitted using mesh networking. It is an arising technology in recent days due to its simple installation, low cost ,self connectivity of nodes ,flexibility a...
Decentralized information accountability framework for cloud
With the rapid changes around and the increasing demands for computing solutions, cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Users’ data are usuall...
A New Dynamic Privacy Grid Mechanism for Location Based Services
Appropriate to the nature of the data being swap over between the user and the server, the common changing of the user’s name provides modest shield for the user’s privacy. A more recent investigation of the mix-zone...
A Novel Method for Crawl Forum Threads
In internet crawler it is program that visits websites and reads their pages and other information in order to create entries for a search engine index. Now we introducing forum crawler which traverses the web forum...