Near Field Communication Analysis

Great Essays
Introduction
Near-field communication (NFC) is a set of protocols that allow communication between two electronic devices. Most commonly this technology is used for communication between portable devices like smartphones. Even though it is a contact less system of communication, it requires that the devices are within 4 cm or 1.57-inch distance from each other (Carter & Faulkner, 2015). Basically, this technology relies on creating a low speed connection between the devices which has a very simple set up procedure. It has found application in a vast variety of applications, ranging from contact less payment from credit and debit cards as well as the smartphone based payment techniques, to the social networking applications and now has worked
…show more content…
The operation of NFC-enabled phones for data transmission is quite simple and basic. For example, in its card emulation mode, the protocol defines that the device should transmit a unique ID to the communicating device, at the least. To add to it further, there is also a defined NFC Data Exchange Format (NDEF) which can be used in data transmission, particularly for documents, images, MIME type information, etc. (NFC Forum, 2014). There is yet another protocol added, known as the Simple NDEF Exchange Protocol or SNEP, which further facilitates the transmission of messages between any two devices (macnn, 2011).
All the above-mentioned protocols are defined by the NFC forum. However, there are some protocols defined by the GSMA forum as well, which are commonly known as the GSMA NFC standards. These are applicable particularly to the smartphone devices and include facilities like trusted Services Manager, Single Wire Protocol and elements to increase security (GSMA, 2012).
Eavesdropping
…show more content…
In this, the unauthorized hacker, intercepts the transmission signal between the sender and receiver of the information and relay them such signals so that they both feel they are interacting with each other (Rouse, n.d.). Such an attack is very commonly used to bypass the cryptographic protocols that might be put in place to maintain data security. Eavesdropping as outlined above is an example of MITM attack. In such cases, even though the two parties communicating believe that they are talking with each other, the entire conversation or transmission of data is controlled by the unauthorized hacker. In certain cases, this is a highly simple process, for instance, in public Wi Fi networks, which are unencrypted, a hacker can easily initiate an MITM attack (Rouse,

Related Documents

  • Decent Essays

    E. Also suppose a malicious node M can hear A, B, C and D. The attack can be described as follows:[18] “To start the attack, M changes its MAC address to match A’s, moves closer to and out of the range of A. It then sends an RREP to B that contains a hop count to X that is less than the one sent by C, e.g., zero. Therefore B changes its route to the destination, X, to go through A, as illustrated in Figure. 1.4.…

    • 210 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    IEEE 806.15.4 aims at short distance double direction communication with lower complexity,…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Case Study

    • 333 Words
    • 2 Pages

    1. Message confidentiality means that a message being sent cannot be read by anyone other than the intended recipients, and message remains confidential and it cannot be read by unauthorized ones. Integrity defines the process of data is modified based on cryptographic procedures like hashing and message code techniques that ensures the message is not modified.…

    • 333 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    At schools they use them in the lunchrooms to make it easier for students to pay. All the student has to do is scan their finger and it pulls their account up. In businesses they use finger scanners to get to certain things, such as documents in a computer. They even talk about how you can buy a finger scanner for personal documents on your computer for $50.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Tapping: Monitoring unencrypted communications such as emails or telephone calls this could be dangerous when sensitive information is being sent over an unsecure connection to prevent this use trusted websites and a secure…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Mobile technology has advanced at an alarming rate over just the past decade alone. In the museum world it has also had numerous technological advances, some examples being audio tours, online catalogs, and phone apps. The main concern with technology now is if it's aiding or hurting the user. The case study Victoria López Benito conducted supports the view point of technology allowing individuals to further their knowledge. The use of mobile apps have the ability to distract viewers and take away from the exhibits.…

    • 983 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    1. Describe the communication process, and identify the key components. Communication is the process of sending information between two or more people and can be done in different mediums like oral, written, music and body language. The communication process is different steps that the message goes through before it gets to the receiver.…

    • 1589 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The appellant, Chester Comerford, was a licensed attorney and previous law professor who operated a website for a group whom he founded, called the guardians. The guardians questioned President Obama’s citizenship; in 2011 Comerford was convicted of aiding and abetting threats on the President, however the Supreme Court of the United States reversed his conviction the following year. After his conviction was reversed, Comerford went to a local merchant to purchase a smart-phone. Knowing that a phone could be tracked through GPS technology, Comerford disabled the GPS tracking capability, with help from online instructions.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cell phones have rapidly advanced and with it our ability to communicate. Cell phones gives us the ability to communicate socially both short distance and long distance in a matter of seconds. The advancement of cell phones has allowed us to socially expand! With the advancement of cell phones, we can communicate in so many different ways.…

    • 526 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction of the Canadian Mobile Industry Nowadays, mobiles become the necessity of peoples’ daily life. People keep their cell phone with them wherever they go and whatever they are doing. People communicate with each other on phone with SMS, mobile applications or through social media platforms when they are on the go.…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Morse Code Research Paper

    • 472 Words
    • 2 Pages

    Morse Code There are many different ways to communicate. Hundreds of years ago, if you wanted to communicate long distance, a message would be written and delivered by a carrier. It wasn’t until a tragedy entered a great painters life that he turned from painting to becoming a great inventor.…

    • 472 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This push is the direct result of consumer, developer and educator influence on Bluetooth design through their wallets, ideas, and research. Bluetooth will transform consumer markets in the future. Development of social structure, cultural values, and economic incentives has shaped Bluetooth development into a social construct of technology. Bluetooth is the most competitive wireless technology on the market. Global socket integration and radio communication allows Bluetooth devices to be produced around the…

    • 810 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    1  Abstract — Information sent and received in wireless communication systems can suffer from data losses due to multipath propagation, further leading to intersymbol interference. These conditions compromise the integrity of the information transmitted. This paper explores the Viterbi algorithm used to combat error bounds in convolutional codes, and develops a MATLAB-based alternative model of the algorithm for continuous time applications that is shown to significantly diminish the effects of intersymbol interference in the wireless transmission of a signal. I. INTRODUCTION Wireless communications is part of everyday life.…

    • 884 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    We may have imagined the feature as a place crawling with antennas and emitters, due to the huge growth of wireless communications. And it is seems that the current means of transferring data might already have a very serious competitor none other than the human…

    • 825 Words
    • 4 Pages
    Improved Essays