You are on page 1of 25

Near Field Communication

TSKS03 Wireless System Report

Written by:

Techin Eamrurksiri Ang Qi Xiang

6 May 2012

Table of Contents
1. INTRODUCTION ......................................................................................................................... 1 1.1 RADIO FREQUENCY IDENTIFICATION .......................................................................................... 1 1.2 NEAR FIELD COMMUNICATION (NFC) ........................................................................................ 2 1.3 NFC APPLICATIONS ................................................................................................................... 3 1.3.1 E-Passport .......................................................................................................................... 3 1.3.2 Mobile Payment .................................................................................................................. 3 1.3.3 Replacement to Conventional Barcode................................................................................. 3 1.3.4 Logistic ............................................................................................................................... 4 1.4 DISTINCTION FROM RFID ........................................................................................................... 4 NFC TECHNOLOGY ................................................................................................................... 5 2.1 NFC MODE OF OPERATION ...................................................................................................... 5 2.2 NFC ARCHITECTURE .................................................................................................................. 5 2.2.1 RF Specification .................................................................................................................. 7 2.2.1.1 Signal Interface: Bit duration ........................................................................................... 7
2.2.1.2 2.2.1.3 2.2.1.4 2.2.1.5 Active Communication Mode...................................................................................................................... 8 Passive Communication ............................................................................................................................. 11 General Protocol flow ................................................................................................................................ 11 RF Collision Avoidance ............................................................................................................................. 13 Frame Response Time ................................................................................................................................ 15 Target State ............................................................................................................................................... 15 Frames ...................................................................................................................................................... 15

2.

2.2.2

Initialization at 106 kbps for Passive Communication .........................................................14

2.2.2.1 2.2.2.2 2.2.2.3

2.2.3 2.2.4 3

Initialization at 212 and 424 kbps for Passive Communication............................................16 Initialization at 106 , 212 and 424 kbps for Active Communication .....................................16

EXISTING THREATS TO NFC ...................................................................................................17 3.1 SECURITY & PRIVACY CONCERNS .............................................................................................17 3.1.1 EAVESDROPPING THREATS .....................................................................................................17 3.1.2 DATA MODIFICATION/REMOVAL THREATS.............................................................................18 3.1.3 MAN-IN-THE-MIDDLE THREATS .............................................................................................18 SOLUTIONS & RECOMMENDATIONS....................................................................................19 4.1.1 EAVESDROPPING ....................................................................................................................19 4.1.2 DATA MODIFICATION/REMOVAL ............................................................................................19 4.1.3 MAN-IN-THE-MIDDLE.............................................................................................................19 CONCLUSION ..............................................................................................................................20

APPENDIX ............................................................................. ERROR! BOOKMARK NOT DEFINED. BIBLIOGRAPHY .................................................................................................................................. .

1. Introduction

This report primarily focuses on the characteristic of Near Field Communication (NFC), how it works, what it is. The report will begin with a prior background knowledge which is required to understand the communication schemes of Radio Frequency Identification (RFID) and NFC technology. NFC is a subset of RFID, but distinct itself from RFID due to some improvements in terms of security. In 2004, Nokia, Phillips and Sony decided together to establish their own NFC community, which is called NFC Forum. NFC Forum [1] aims to enable interactions in mobile devices for electronic payment. NFC tags are small objects, sticker that are put on information contained NFC compatible devices. Hence, the information on the devices can be interpreted by other NFC devices. In 2006, Nokia announced Nokia 6131, the first commercial NFC mobile phone. However, Nokia 6131 and NFC are still not successful in the consumers market [2], as people were unaware of the benefits of NFC-enabled mobile phones. However, it was not until 2010 before NFC get the spotlight in the following the announcement of Samsung Nexus event, and also in Google I/O 2011 event by How to NFC which demonstrated the uses and benefits of NFC. 1.1 Radio Frequency Identification Radio-frequency identification (RFID) is a wireless technology that transmits information over radio wave from one point to another point. RFID uses tag that attached to a device as a transmitter, and the receiver or end device will connect to infrastructure.

RFID Receive

Infrastructure

Figure 1: RFID System Characteristic RFID can be divided into two types, namely the active system and passive system. Active system requires electrical power source to operate, the sources are either battery or powered infrastructure. Hence, the coverage area of active system is larger than the passive

device. However, active system has its own limitation on the power source that leads to higher cost, larger size and lower active time. Thus, passive system is more favorable in a practical aspect since passive system has indefinite operational time and small in size.

Figure 2: Various types of RFID tags [3] 1.2 Near Field Communication (NFC) NFC is a form of short-range, high-frequency wireless communication technology that enables data transfer between a reader and a target when they are either place near together, or in contact. The target need not have a power source for a reader to scan it. Hence, due to its similarity, NFC can be seen as a subset of RFID. This technology helps to make the daily routine of consumers more convenient than ever by allowing data transfer with a simple touch. NFC allows two-way communications between electronic devices. It can be used to communicate wirelessly, though restricted by a limited range, with other devices using in active or peer-to-peer mode. The world has seen an increasing trend in the use of NFC today, with countries such as the US, China and India adopting NFC for the use of contactless and mobile payment. With mobile phone subscribers reaching nearly 5.6 billion across the globe in 2011 [10], the integration of NFC in mobile phones will have a far reaching potential to serve consumers access to a number of services and applications. Mobile tech giants such as Samsungs Galaxy II, Nokias C7 and Googles Nexus S have taken the lead to incorporate NFC capabilities in their mobile devices that allow them to read information from passive tags.

1.3 NFC Applications

Figure 3: NFC: What is and what is [4] As seen in figure 3, the integration of NFC in one device can conveniently allow consumers to access a number of applications similarly equipped with NFC technology. In this part, we will further elaborate a number of applications and the potential of NFC can bring to our daily lives. 1.3.1 E-Passport Contactless smart card has been integrated in most e-passports today, which provides authentication of the owner by a digital signature calculated over the personal data stored on the chip. This smart card operates at 13.56MHz, and is in accordance to ISO/IEC 14443 RFID standard. 1.3.2 Mobile Payment Cashless transaction can be implemented, which can be beneficial to both consumers and merchants. This allows proper documentation of expenditures and income respectively in a monthly receipt, eliminating the need of daily calculation. 1.3.3 Replacement to Conventional Barcode Misorientation, obstruction by dirt, clear line of sight and the limited data size stored are amongst the most common problems associated to conventional barcodes. As such, the creation of cheap NFC tags is seen as a replacement and answer to the shortcoming of barcodes. As it does not require a clear line of sight between reader device and tag, many
3

processes can now be automated. For example, NFC tags have already been implemented in sports events such as marathon, where NFC tags are being tied to participants shoes to register the start and end time of individuals during race. 1.3.4 Logistic NFC and RFID technology help increase the efficiency in automated sorting by machines. Already, the use of these technologies have been gaining momentum all around the in areas such as, but not limited to, healthcare, travel and sports. Hospitals today are using NFC to track its patients to improve documentation and to avoid wrong medication or therapies. Airports are increasingly using smartphones to serve as identification and plane tickets, a shift from the conventional check-in system that can be time consuming. Also, in sports event where it involves large number of participants, RFID tags are tied to their shoes that help to register the start and end time of individuals during the race. 1.4 Distinction from RFID

The contactless communication standard for interaction with smart cards (ISO-14443) provides a security layer, but the current communication standard for low-cost RFID tags (ISE-15693) is still unprotected. However, unlike RFID, NFC allows communication of both kinds of protocol types. Moreover, RFID automatically capture data from objects. NFC allows access to those tags not only from dedicated reader devices, but from devices we carry with us in our daily lives.

2. NFC Technology 2.1 NFC Mode of operation NFC has 2 modes of operation, namely communication mode and operating mode. NFC communication mode can be further divided into active mode and passive mode. In active mode, both devices generate a radio frequency (RF) field through power supplied to them, allowing them to act as an initiator or receive by transmitting or receiving data respectively [11]. The communication will only be terminated in the case where either device moves out of range, or a command is given to terminate it [13]. In passive mode, the initiator generates a RF field to establish communication with the target, while the passive device uses inductive coupling to transmit data. In this case, the target, which is not supplied by power, has to draw its operational power from the initiator. This is done so through the electromagnetic field generated from the initiator, inducing a current in the receiver end to modulate the existing field. In this case, communication will only be terminated in the case where target is removed or deactivated [8]. In operating mode, NFC listed all available actions for NFC device [5] to select. Both modes are based from the international standards, which are ISO-IEC 18092, NFC IP-1 and ISO-IEC 14443. The communication mode can be sub-divided into three categories. Firstly, the read/write mode that enables a NFC phone to read or write data in NFC data format from or to supported tag. Secondly, peer-to-peer mode enables devices to exchange data between each other. Lastly, the card enumeration enables NFC device to act as a reader when comes into contact with NFC-enabled tags. 2.2 NFC Architecture There are three different interfaces of NFC which are NFC-A, NFC-B and NFC-F. Both NFC-A and NFC-F are based on ISO18092 standard while NFC-B based on ISO14433 standard instead. Figure 4 shows the relationship between each interface of NFC.

Figure 4: Concept of NFC [5] NFC Forum Protocol Suite is a protocol defines by NFC forum [7], which can be further divided into 3 subparts, namely NFC Forums Digital Protocols, LLC-MAC1 Mapping and LLC. From figure 5, it is shown that the first layer LLC can be considered as both physical layer and data link layer. In this report, we will focus primarily on the lowest layer, namely the NFC forum digital protocols.

Figure 5: NFC Reference Model ISO-IEC 18092 mandates the communication over the RF interface for both NFC communication modes. Both communication mode must have the following requirements; modulation schemes, bit coding and transfer, start and end communication flag,

Logical link control-medium access control (LLC-MAC).

representation of bits and bytes, framing and error detection, protocol and parameter selection, and data exchange of NFC Interface and Protocol (NFCIP-1) devices. 2.2.1 RF Specification All NFC devices [6] must use carrier frequency ( at 13.56 MHz, while the minimum and
2

and maximum unmodulated RF field has to be between

respectively, both in order and root mean square (rms) value. In order for NFC to communicate in passive mode correctly, the target has to consecutively operate between . Furthermore, the initiator is required to induce a current in the

target. However, in active mode an initiator can generate RF field freely, but the generated RF field must be confined between specification of an external RF field be and . However, it is required that the . This threshold value

prevent disturbance from ongoing communication in order to avoid collision. These specifications are applicable for NFC devices operation in both active and passive mode. 2.2.1.1 Signal Interface: Bit duration

Every NFC devices needs to support communication using three types of bit rates. All of these bit rates are used in both active mode and passive mode at 106 kbps, 212 kbps and 424 kbps. The initiator will initialize the communication by choose the provided bit rates. Thus, the bit duration is calculated by this formula

Where D is the value of the divisor which depend on bit rates are given in table 1

Root Mean Square is a statistical calculation of magnitude over positive and negative value. It also known as quadratic mean.

bit rates ( kbps) 106 212 424

Divisor D 1 2 4

Table 1: Divisor D for each bit rates 2.2.1.2 Active Communication Mode

Figure 6: Pulse shape of ASK modulated at 106 kbps[6]

Bit Rates: 106 kbps: Figure 6 shows the pulse shape of amplitude modulated at 106 kbps. Communication from initiator to a target and vice versa shall have bit rates at 106 kbps with ASK3 as modulation scheme. ASK modulation is set at 100% modulation index4. The figure below show the pulse creates by RF operating field. In addition, the envelope of this

3 ASK Amplitude Shift Keying 4 Modulation Index It is the measure of the amplitude variation surrounding an unmodulated carrier.

Calculated by

RF field shall consistently decrease to less than 5% of remain less than 5% for a period longer than t2.

s initial value and it shall

However, if the envelope of the field does not decrease linearly, it has to be lowered to for the time between before and after local maximum. This is however, only applicable to the case where local maximum is not lower than 5 of When the envelope is between 90% and 110% of .

, overshoots period occurs. In this

case, the target is required to detect the End of Pulse after the value exceeds 5%, but remains below 60% of . The period t4 will define End of Pulse, and is shown in

table 2. This definition applies to all timing of modulation envelope.

Table 2: Value for each attribute of ASK pulse shape[6] Pulses length/Condition

Maximum Minimum

3.0 2.0 0.7 0.5

1.5 0

0.4 0

This standard specifies that coding rules are required to be used for bit representation and coding. The start of communication should start with a pulse. ONE can be represented by a pulse after a time of half bit duration. On the other hand, ZERO represented by no modulation occur for whole duration instead. However, there are two exceptions for the ZERO case. Firstly, if there are two or more ZERO consecutively, there will be a pulse occur at the beginning of the next bit duration. Secondly, if there is ZERO right after the start of communication, a pulse will occur at the beginning of that bit duration. At the end of the communication, the use of ZERO is followed by one bit without modulation.
9

Bit Rates: 212 and 424 kbps: The modulation schemes that use in bit rates 212 and 424 kbps remain ASK as in 106 kbps, but with different modulation index. The modulation index varies between 8% to 30% of the operating field. The rising and falling edge of modulation need to be consistent. During the initialization, period transmission and single device detection 5 (SDD) have to be identical. Figure 6 below shows the modulated waveform of the bit rates. a indicates its peak, while b indicates the minimum signal amplitude, while table 3 shows the period and amplitude at 212 kbps and 424 kbps respectively.

Figure 6: Modulated Waveform[6] 212 kbps tf tr y hf, hr Table 3: Value for each attribute 424 kbps

5 Single Device Detection is an algorithm used by initiator to detect one of many target in RF field.

10

Both 212 kbps and 424 kbps use Manchester (reverse amplitude and observe amplitude) for bit presentation and coding instead. For logic ZERO, the first half of the bit carries low amplitude, whereas the second half carries high amplitude. However in this case, the ONE and ZERO are represented as shown in the figure below.

Figure 7: Observed amplitude of Manchester bit encoding [6] 2.2.1.3 Passive Communication

There are two types of passive communication, from initiator to target and from target to initiator. In order to maintain the communication, during data transmission from initiator to target must be the same as in active mode. Bit Rates: 106 kbps from target to initiator: After the target sense RF with carrier frequency from initiator. Targets inductive coupling area will respond by generating subcarrier frequency through load switching. The load modulation has to exceed

, where H is root mean square value of magnetic strength. Subcarrier modulation modulates in similar way as active communication. However, the bit representation and coding will be similar to the operation in 212 kbps and 424 kbps, as mentioned in section 2.2.1.2, for active communication, but with an exception that forbids reverse polarity. The byte encoding starts from LSB first. Bit Rates: 212 kbps and 424 kbps from target to initiator: The target responds in the similar way in 106 kbps. However, as opposed to operation at 106 kbps, operations in 212 kbps and 424 kbps do not require a subcarrier frequency. The byte encoding starts from MSB first. 2.2.1.4 General Protocol flow

The general protocol flow allows operations for NFC devices to select. At the initial stage, all devices are set to target mode in default. While the devices are in target mode, it waits
11

for a command without generating a RF field. The device in target mode can only change its mode to initiator mode upon request. The application will choose communication mode (active or passive) and transfer speed (106, 212 and 424 Kbps) for each device. In this process, an initiator first performs a RF collision avoidance to detect external RF field. This is to detect the presence of other unintended receivers in the same vicinity. When no RF field is detected, the device will switch to initiator mode, and select either active or passive by application. If it is in passive communication mode, it will then perform an initialization and SDD in addition to speed selections. After finishing initialization, both devices will activate communication mode by random ID for transport protocol activation (NFCID36) using attribute request and attribute response (ATR). Parameter Selection will be done by Parameter Selection Request and Parameter Selection Response (PSL), which are used in the device configuration. Furthermore, Data Exchange Protocol Request and Data Exchange Protocol Response (DEP) establish the format of communication. Upon the completion of data transfer, the user is required to deselect command by using Deselect Request and Deselect Respond (DSL), before continuing the releasing process by using Release Request and Release Response that will terminate the transaction. The below summarized all of this processes.

6 NFCID3 is the identifier of initiator generated by an application for one communication period.

12

Passive Communication
Active Communication YES NO YES NO

Figure 8: Protocol Flowchart for initialization 2.2.1.5 RF Collision Avoidance

In order to get a good communication between NFC devices without interference from other frequencies, it is paramount for an initiator to ensure that there is no other RF field detected before it generates its own RF field. If the channel is free from RF field within the period of time delay ( ) greater than , RF Waiting time ( ) equals to , where initial , and n is the

random generate number for

has a value between 0 and 3, the initiator will switch

on. However, the initiator is required to wait for a period of time before starting its transmission.

13

On the other hand, Response RF Collision Avoidance is another procedure that activates in active communication mode to avoid data collision which done by simultaneously respond more than one target. The target waits for Active delay time ( Active Delay Time has its value between before turn itself on. , where and n

has the same value as before. After the initiator has switched on, it will wait for another Active Guard Time ( before start transmission. This guard time is greater than .

The summary of this process can be seen in figure 8. 2.2.2 Initialization at 106 kbps for Passive Communication Data Frames will transmit in pairs. The initiator starts a communication for the target to respond. However, before the communication can begin, it is required to perform RF collision avoidance first. The characteristic of initiator and target frame format can be seen in figure 9.

Figure 9: Initiator and Target Frame Format for NFC Frames [6]

14

2.2.2.1

Frame Response Time

Various commands have different response time, called Frame Response Time. Frame Response Time (FRT) from initiator to target is the time between the end of the last transmitted pulse generated by the initiator, and the first modulation within start bit transmitted by the target. In this case, n is equivalent to 9 so that all targets in a field can respond asynchronously, which is required for SDD. However, FRT from the target to initiator is the time between the last modulations transmitted by the target and the first pulse from initiator. This FRT value is .

Table 4 : Frame Response Time Table 2.2.2.2 Target State

Target state is how a target response to initiator when receive a valid frame. All target states are POWER-OFF state, SENSE state, RESOLUTION state, SELECTION state and SLEEP state. 2.2.2.3 Frames

There are three different types of frames format in NFC. Firstly, short frame that is used to start the communication between both devices. The characteristic of short frame is shown in figure 10, where it contains 7 data bits and without parity bit. This frame is transmitted by LSB first.

Figure 10: Short Frame Format for 106 kbps[6]


15

Standard frame is used for data transfer. It has up to n byte while n shall be greater than or equal to 1.Hence, the total bit contian for data bits equals to .

Figure 11: Standard Frame Format for 106 kbps[6] 2.2.3 Initialization at 212 and 424 kbps for Passive Communication The communication will first start with 48 bits of ZEROs, followed by 16 bits Synchronous pattern (SYNC), where 8 bits length field is the number of byte to be transmitted plus 1, and n is number of data input. The overall frame structure shows in the figure 12.

Figure 12: Frame Format for 212 and 424 kbps [6] 2.2.4 Initialization at 106, 212 and 424 kbps for Active Communication The initiator initializes by choosing from three available bit rates before performing RF collision avoidance. However, the initiator is required to follow the time chart by performing RF collision avoidance first, before sending Attribute Request (ATT_REQ) at selected speed, and turns off its RF.

16

Existing Threats to NFC

NFC communications has emerged as one of the most pervasive computing technologies, and its potential can still be far-reaching in this digital age. Not only does NFC application enhance consumers experience by making payment convenient, retailers benefit greatly through this paperless technology and the increase in efficiency, which helps to reduce cost of operating. However, it is also inevitably that this technology is coupled with security, privacy and reliability issues. In this section, we will draw our discussion on the shortcoming of NFC technology, and the possible solutions to tackle on them. 3.1 Security & Privacy Concerns NFC is a technology for high frequency wireless short-distance point-to-point communication. This implies that with its limited operational range, NFC basedtransmissions are inherently secure. Therefore, it prevents eavesdropping by third-party, which helps to enhance better communication security. However, the limited range of NFC does not simply imply that it is invulnerable to attackers. According to Ernst Haselsteiner and Klemens Breitfur [16], eavesdropping threats, data modification/removal threats and man-in-the-middle threats are three most common problems faced by NFC. On the other hand, Kazmi pointed other vulnerabilities present in NFC are spoofing, traffic analysis and one of its application to identify objects [3] uniquely concern and worry several people who think that frequent use of this technology will put more pressure on persons and organizations privacy. 3.1.1 Eavesdropping Threats Eavesdropping threats threaten the privacy of consumers where unintended recipients are able to intercept and read messages between an initiator and receiver [14]. In the case when an initiator tries to transfer data in active mode with stronger modulation, an attacker in close proximity is able to retrieve a usable RF signal. On the other hand, a passive device that does not generate its own RF field would be harder to attack than an active device.

17

3.1.2 Data Modification/Removal Threats Unauthorized data modification and removal can pose a high security threat to consumers. In this case, an attacker sniffs the network traffic from the initiator and manipulates the original data that is being transferred, before transmitting it back to the receiver. 3.1.3 Man-in-the-Middle Threats In man-in-the-middle attack, an attacker intercepts a communication and relaying messages between two systems, impersonating the systems and making them to believe that they are communicating to each other over a private connection when the attacker actually controls it. This can pose a significant threat to both security and privacy to consumers, as confidential and sensitive information can be extracted from unaware victims though this form of attack.

18

Solutions & Recommendations

4.1.1 Eavesdropping As mentioned in section 3.1.1, data transmitted in passive mode is harder to be eavesdropped as compared to active mode. However, it is not possible for all applications to operate in passive mode, especially for an initiator. Therefore, the best solution to eavesdropping is to establish a secure channel between two devices using standard key agreement protocols such as Diffe-hellman key exchange (D-H)7. In this case, both parties can jointly establish a shared secret key over an insecure communications channel and exchange data. 4.1.2 Data Modification/Removal Similarly as mentioned in section 4.1.1, a secure channel can be established to prevent attackers from accessing the communication between two parties. In addition, NFC devices can also be designed to continuously check the radio frequency field while transmitting information, and to discontinue its transmission when a threat is detected. 4.1.3 Man-in-the-Middle Although the threat of man-in-the-middle attack can be detrimental, it is however near impossible to achieve a man-in-the-middle attack on NFC link. Since this form of attack can only take place after an attacker has intercepted the data between two parties, a secure channel can be established, as mentioned in 4.1.1 to prevent eavesdropping. Alternatively, consumers can also mitigate the risk of such attack by using an active-passive communication mode such that one party continuously generates the RF field. In this instance, the active party can listen to the RF field while sending data to detect any disturbances resulted by attackers.

Diffle-Hellman key exchange (D-H) is a specific method of exchanging cryptographic keys.

19

Conclusion

With 5.6 billion mobile subscribers all around the world, the integration of NFC into mobile phones will help to bring convenience to consumers and improve consumer experience tremendously. On March 2012, IT giant Apple has filed a new patent on the use NFC on it devices, letting speculators to believe that this technology will soon be integrated in its new iPhone 5. Therefore, it would be just a matter of time before all other IT, commerce, transportation and other institutions jump into NFC technology, revolutionizing once again the way payments and transactions are made today. However, it is important to note that security and privacy risks can still be present in these NFC-enabled devices. Therefore, before consumers can gain the confidence in the use of NFC technologies, it is important that adequate measures are put in place to protect them from being the potential victims of piracy.

20

Appendices

Standard ISO 18092 (NFCP-1)

Properties NFC Interface and Protocol -1 Short range wireless communication standard Perform inductive coupling at 13.56 MHz Two modes of communication active or passive within 10cm range Similar to current RFID standards Operates on data rates on 106, 212 and 424 Kbits/s NFC Interface and Protocol 2 Based on previous NFC and RFID standards In this standard framework of other three standards are defined. o ISO 18092 (NFC standard) o ISO 14443 (Proximity card standard) o ISO 15693 (Vicinity card standard) o This NFC standard is compatible with current deployed NFC and RFID systems NFC Interface and Protocol 1, Radio Frequency Interface test methods Protocol Test Methods

ISO 21481 (NFCIP-2)

ISO 22536 (NFCIP-1) ISO 23917 (NFCIP-1) ISO 28361

NFC Wired Interface

Table 5: NFC standards [8]

Bibliography

[1] "History of NFC," [Online]. Available: http://www.nearfieldcommunication.org/history-nfc.htm. [Accessed 13 April 2012]. [2] "NFC on Google trends," Google, [Online]. Available: https://www.google.com/trends/?q=Near+Field+Communication&ctab=0&geo=all&date=all&sort=0. [Accessed 5 May 2012]. [3] R. Want, "Introduction to RFID," IEEE Computer Society, no. January-March, pp. 25-33, 2006. [4] "NFC: What is and what is," 11 January 2011. [Online]. Available: http://gadgetclick.wordpress.com/2011/01/26/nfc-what-is-and-what-is/. [Accessed 12 April 2012].

[5] K. Tagawa, "Why NFC is Bigger than Paying With Your Mobile Phone," in 4G World NFC Summit, 2011.

[6] I. Standard, "ISO-IEC 18092," Switzerland, 2004. [7] C. Pettey, "Gartner," Gartner, Inc., 4 August 2011. [Online]. Available: http://www.gartner.com/it/page.jsp?id=1759714. [Accessed 10 April 2012]. [8] "Near Field Communication and Mobile Technology," 8 March 2011. [Online]. Available: http://www.nfc.cc/technology/nfc. [Accessed 28 March 2012]. [9] H. R. Kazmi, "Security and Privacy Issues in Near Field Communication (NFC) Systems," Royal Institute of Technology, Sweden, Stockholm, 2011. [10] ECMA international, "Near Filed Communication," in ECMA international, December 2003.

[11] R. Williams, in NFC and RFID: Data security and privacy issue, Bird & Bird United Kingdom, 2007.

[12] H. R. Kazmi, "Security and Privacy Issues in Near Field Communication System," Royal Institute of Technology , Sweden, 2011. [13] N. Forum, "Logical Link Control Protocol : Technical Specification," 2011.

[14] Nokia, "Introduction to NFC," 19 April 2011.

[15] M. M. A. Allah, "Strength and Weakness of Near Field Communication (NFC) Technology," Global Journal of Computer Science and Technology, vol. 11, no. 3, 2011. [16] E. Haselsteiner and K. Breitfur, "Security in Near Field Communication (NFC)," Austria.

You might also like