Near Field Communication Tyler Swofford Matthew Kotan Outline

  • Slides: 11
Download presentation
Near Field Communication Tyler Swofford Matthew Kotan

Near Field Communication Tyler Swofford Matthew Kotan

Outline What is Near Field Communication (NFC) How does it work Current applications for

Outline What is Near Field Communication (NFC) How does it work Current applications for NFC Key Companies Security Concerns

What is NFC is a transmission protocol It is designed for short range communication

What is NFC is a transmission protocol It is designed for short range communication It is based on Radio Frequency Identification (RFID) Unlike RFID it features two way communication In addition communication is limited to being between two devices

How Does it Work NFC devices use inductive coupling to generate radio signals These

How Does it Work NFC devices use inductive coupling to generate radio signals These radio signals are then used to transport information NFC devices can be either active or passive Active devices have their own power source Passive devices rely on active devices to function

Current Applications Data Exchange between mobile devices Simplify blue tooth pairing Wifi Authentication Can

Current Applications Data Exchange between mobile devices Simplify blue tooth pairing Wifi Authentication Can be used with Credit Cards as an alternative to magnetic strips Key for digital locks

Current Applications Improved Advertising with Smart Posters Pay parking meters using NFC enabled phones

Current Applications Improved Advertising with Smart Posters Pay parking meters using NFC enabled phones The Museum of London allows users with NFC enabled phones at exhibits to gain more information Samsung Tec Tiles offer interesting possibilities for daily task automation

Key Companies Multiple Big Players in this technology EBAY has Pay. Pal AT&T, T-Mobile

Key Companies Multiple Big Players in this technology EBAY has Pay. Pal AT&T, T-Mobile and Verizon have ISIS Google has Google Wallet

Security Concerns Interception attacks Man in the middle attacks Eavesdropping Data corruption and manipulation

Security Concerns Interception attacks Man in the middle attacks Eavesdropping Data corruption and manipulation Theft

Conclusion NFC is a short distance radio transmission protocol It can be used to

Conclusion NFC is a short distance radio transmission protocol It can be used to simplify many daily tasks Security is a large concern particularly man in the middle attacks Financial applications likely won't catch on until security issues have been addressed

References http: //electronics. howstuffworks. com/near-fieldcommunication. htm http: //www. addictivetips. com/hardware/what-is-nfc-how-it-works -what-are-its-practical-applications/ http: //gigaom. com/2011/12/16/forget-wallets-what-else-is-nfcgood-for/

References http: //electronics. howstuffworks. com/near-fieldcommunication. htm http: //www. addictivetips. com/hardware/what-is-nfc-how-it-works -what-are-its-practical-applications/ http: //gigaom. com/2011/12/16/forget-wallets-what-else-is-nfcgood-for/ http: //www. mobilolsen. com/blog/? p=364 http: //events. iaik. tugraz. at/RFIDSec 06/Program/papers/002%20 -%20 Security%20 in%20 NFC. pdf http: //www. nfc-forum. org

Near Field Communication Tyler Swofford Matthew Kotan

Near Field Communication Tyler Swofford Matthew Kotan