StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Near field communication (NFC) and its validity as a secure system of data transfer - Essay Example

Cite this document
Summary
The increasing number of applications that require short-range wireless communication has led to an increase in technologies that are designed to meet such a need, including the Near Field Communication (NFC). The NFC is technology applied in the provision of short-range…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Near field communication (NFC) and its validity as a secure system of data transfer
Read Text Preview

Extract of sample "Near field communication (NFC) and its validity as a secure system of data transfer"

Near Field Commuication By Near Field Communication (NFC) The increasing number of applications that require short-range wireless communication has led to an increase in technologies that are designed to meet such a need, including the Near Field Communication (NFC). The NFC is technology applied in the provision of short-range wireless connectivity to allow for a two-way secure interaction between electronic devices. The communications are simple and unlike in most of the other wireless communications, they do not require user set-ups(Coskun, et al., 2011). The short range of the NFC s vital for its success in operation as it gives it a high level of inherent security.

Being a non-contact technology, the NFC is highly advantageous as it does not require establishment of physical electrical contact. As such, in applications such as those requiring the use of cards, there is no need of inserting cards that use NFC into the reader, thus avoiding any problems that may be associated with poor contact. It is important to note that NFC uses inductive-coupling at a license free frequency allocation in the radio spectrum HF portion(Ahson & Ilyas, 2012, p. 33). NFC has a set of standards that govern it thus allowing for connectivity between NFC devices from different manufacturers.

Besides creating the contactless environment for NFC interactions, the standards also determine the data transfer rates and the data formats. An NFC connection is simply achieved by bringing two electronic devices together within a close range to allow them to communicate. This eradicates the problem with identification and minimizes the issue with security, allowing for easier exchange of information. The NFC can be used for a variety of applications including in: mobile phones to transfer files from one handset to another; personal computers to link up networks for data transmission; point-of sale machines; turnstiles; parking meters; vending machines; and in other applications in the house or office, such as opening and closing of the garage doors(Finkenzeller, 2010, p. 80). The NFC connections could also be applied in the configuration of the connection between two devices that have wireless connections.

Bringing the devices together allows for the initiation of the NFC connection which in turn initiates the set-up procedure. Other long-range wireless devices including the Bluetooth could be configured through communication with the NFC interface(Coskun, et al., 2011). NFC are vulnerable to man-in-the-middle (MITM) attackswhich involve attackers succeeding in interception of the communication between two user devices and acting as a relay. In this case, the attacker proceeds to pass on the data either after reading it or modifying it.

Achievement of an MITM attack is unlikely due to the short distance requirement. Chances of an MITM attack can be minimized through the use of an active-passive mode of communication(Sharma, et al., 2013, p. 343). This would allow for the detection and hearing of any uninvited third party. As much as a short distance is used in NFC communications, this does not guarantee security, with various types of attacks having been identified as possibilities. One of the attacks is eavesdropping, where an attacker employs an antenna in recording of an NFC communication.

This can be prevented through establishment of a secure channel between the NFC devices(Ahson & Ilyas, 2012, p. 41). Another possible attack involves data modification in which case the attacker captures and modifies the communicated data using a radio frequency. This attack could be prevented using the RFID jammer. Spoofing is also a common attack when it comes to NFC networks, which involves the attacker pretending to be a different entity thus inducing a user into tapping its device against a given tag.

The countermeasure of such an attack involves proper configuration of the device develop a prompt message before initiating commands through NFC(Coskun, et al., 2011). However, these attacks are but a few of the downsides of the NFC, which are outweighed by the benefits which have allowed for a more state-of-the-art method of transfer of data and communication. ReferencesAhson, S. A. & Ilyas, M., 2012. Near Field Communications Handbook. Boca Raton: CRC Press.Coskun, V., Ok, K. & Ozdenizci, B., 2011. Near Field Communication (NFC): From Theory to Practice.

New York: John Wiley & Sons.Finkenzeller, K., 2010. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification, and Near-Field Communication. 3rd ed. New York: John Wiley & Sons.Sharma, V., Gusain, P. & Kumar, P., 2013. Near Field Communication. Amsterdam, Netherlands, Atlantis Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Near field communication (NFC) and its validity as a secure system of Essay”, n.d.)
Near field communication (NFC) and its validity as a secure system of Essay. Retrieved from https://studentshare.org/information-technology/1673646-near-field-communication-nfc-and-its-validity-as-a-secure-system-of-data-transfer
(Near Field Communication (NFC) and Its Validity As a Secure System of Essay)
Near Field Communication (NFC) and Its Validity As a Secure System of Essay. https://studentshare.org/information-technology/1673646-near-field-communication-nfc-and-its-validity-as-a-secure-system-of-data-transfer.
“Near Field Communication (NFC) and Its Validity As a Secure System of Essay”, n.d. https://studentshare.org/information-technology/1673646-near-field-communication-nfc-and-its-validity-as-a-secure-system-of-data-transfer.
  • Cited: 0 times

CHECK THESE SAMPLES OF Near field communication (NFC) and its validity as a secure system of data transfer

Near Field Communication and Contactless Technologies

The paper "near field communication and Contactless Technologies" concerns that NFC technology is also compatible with the existing RFID structures making it easier for firms that already make use of these RFID structures to adopt this technology hence saving the cost starting from scratch.... The near field communication technology has been incorporated in contactless card standard hence making it possible to use devices which are NFC-enabled instead of credit and debit cards thereby reducing the weight to customers, For instance, there has been a proposal of several NFC – enabled smartphones to be used with Paywave, NFC-enabled makes it possible for users to make payments by using their phone devices in the place of credit or debit cards (visa 2012)....
6 Pages (1500 words) Assignment

NFC: Detailed Introduction and Operation

This connectivity if the object and the virtual communication system have been enabled by the introduction of modern technology, particularly NFC (near field communication), a device that is responsible for linking virtual information to different physical devices through proximity (Langer, & Roland, 2010).... NFC Technology Technical Principles and Historical Progression near field communication (NFC) is a high frequency wireless form of communication technology that enables effective exchange of data and information between devices that are four inches distance apart....
7 Pages (1750 words) Case Study

Oracle and a Secure System

This essay "Oracle and a secure system" is about a number of attacks that can attack the IPs and Oracle.... e has to be offered at a higher layer on the Open system Interconnection (OSI) Reference Model.... owever, how secure is it' Is it secure enough for Stockport PCT' Oracle focuses on the use of Internet Protocol, and in order to understand this better, these key ideas must be defined.... It also recognized that the client/server relational database model was showing signs of maturing and could no longer rely on this to achieve the expected year-on-year growth in revenue that its shareholders demanded....
11 Pages (2750 words) Essay

Distributed File Systems

276) emphasize that through catching the reliability and speed of access of data from the server is significantly increased.... 135), caching presents a challenge of consistency within the processes of file sharing and transfer within a distributed file system.... This means that the users of the system can access data with a guarantee of no delays in retrieval.... Additionally, caching is aimed at preventing repeated access same data or information....
8 Pages (2000 words) Essay

Data Communications and Networking

Correspondingly, the latest… near field communication is a technology, which is specially used in smart phones.... near field communication is a technology, which is specially used in smart phones.... It is in this context that the retail industry mainly uses the PCI-DSS system incorporated with the NFC technology to increase the security value of the customers' transactions (Times Internet Limited, “What is nfc and why is it in your phone?...
1 Pages (250 words) Assignment

Near Field Communications, Features of iAM 2

hellip; Generally, near field communication is effective in storing information.... The encryption of data is also important as it uses a language that only the user is able to understand hence keeping away imposers.... ear field communication (NFC) is defined as a set of standards that are used by smartphones in establishing radio communications between two gadgets through touching them or bringing them together at a closer distance.... The paper "near field Communications, Features of iAM 2" discusses that iAM application is able to encrypt data 256 bit....
5 Pages (1250 words) Essay

Near Field Communication by Want

This article a"near field communication by Want" presents an article, near field communication, that explains that near field communication (NFC) enables contactless communication between electronic devices within range of each other, including both tablets and smartphones.... One of the primary applications of NFC has to do with data transfer.... Its design allows for wireless data transfer including but not limited to mobile commerce, wireless keys, and electronic tickets (Sharma, Gusain & Kumar, 2013)....
1 Pages (250 words) Article

File Transfer Protocol

TP is usually preferred in scenarios that require having a secure transmission that is able to hide usernames and passwords.... This report "File transfer Protocol" presents the ability of FTP to access files from remote locations is an absolute necessity in this changing business environment.... File transfer Protocol (FTP) is regarded as a standard networking protocol that is utilized for transferring files from a particular host to another host....
12 Pages (3000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us