E Commerce Assignment
E Commerce Assignment
E Commerce Assignment
INTRODUCTION
OBJECTIVES OF NFC
NFC has become an attractive research area for many academics due
to its exploding growth and its promising applications and related
services. Due to its nature, large proportion of the NFC research can
be represented as design science research which aims to propose an
innovative design artifact and has a problem relevance and rigorous
nature. As we shall present, for the last few years, there has been a
considerable amount of increase in the number of research papers and
activities concerning NFC.
NFC makes it easier to load multiple cards
into a single phone for payments, municipal transit, building access,
opening car doors and other use cases. However, understanding the
status of NFC research area is necessary to maintain the
advancement of knowledge in NFC.
NFC OPERATING CHARACTERISTICS
It is capable to form a peer-to-peer network for data communication.
13.56 MHz band is unlicensed in all the countries. The technology works
when NFC enabled devices brought within close proximity i.e., a small
distance around 4 to 20 cm. It can provide transfer data rate of up to 424
Kbps. It also allows data transfer in the chunks of 106 Kbps and 212 Kbps.
It can provide a bandwidth of approximately 2 MHz’s.
NFC STANDARDS
ISO (18092), ECMA (340) and ETSI are popular NFC standards. It
supports smart cards like Mifare and Felica. NFC has two standards:
NFCIP-1 and NFCIP-2. NFCIP-1 is defined in the ECMA-340 standard.
This mode is intended for peer-to-peer data communication between
devices which is divided into two variants: active and passive mode.
NFCIP-2 is specified in ECMA-352 which defines how to automatically
select the correct operation mode when starting communications.
MODES OF OPERATIONS
1.ACTIVE MODE
NFC device operating in active mode generates its own carrier frequency,
resulting its own RF field for transmission purpose. It is equipped with a
power supply for operation. Active NFC device act as an initiator in
communication. Two active NFC devices can alternatively generate RF
field to form a two-way communication link to transfer data. NFC device
operating in passive mode would not be able to generate its own carrier
frequency.
2.PASSIVE MODE
Passive device acts as a target. Initiator device produces RF field for
communication and Target device use inductive coupling for responding
them back. Target device modulates to initiator’s RF field, for replying to
initiator. Target device uses power from initiator’s generated RF
electromagnetic field and saves energy. Resultant, Passive device can be
provided a small battery for its operation to restrict energy sources
consumption.
MODES OF COMMUNICATIONS
1.PEER-TO-PEER
3.CARD EMULATION
BENEFITS
1.EAVESDROPPING
It is a wireless communication interface so eavesdropping is a big issue.
A secure channel must be established. Diffie-Hellman can be used for key
exchange to generate a symmetric key which further can be used with
AES or 3DES encryption.
2.DATA CORRUPTION
Instead of eavesdropping an attacker may disturb the transmitted data.
This can be detected by checking RF field as the power needed for
corrupting data is higher than detected by NFC.
3.DATA MODIFICATION
It is different from data corruption as in this case attacker wants receiver
to get the malicious data. It can be prevented by regularly checking RF
field by active sending device or a secure channel should be used as
described.
4.DATA INSERTION
Attacker sends his own data along with the data transmitted by both
parties. The best solution is to minimize the delay. The attacker cannot be
faster than the active device 20 in this case. A secure channel can also be
used as remedy.
5.MAN-IN-THE-MIDDLE ATTACK
Attacker can easily implement this attack by generating his own
electromagnetic field to induce the receiver. Practically this attack is not
possible but it is good habit by sender to listen to RF field before sending
data to check for any disturbance present in the channel.
NFC STATISTICS