0% found this document useful (0 votes)
100 views25 pages

Mini Project

Uploaded by

lalaspnup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
100 views25 pages

Mini Project

Uploaded by

lalaspnup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 25
A project report On NFC Technology in Banking Submitted to SUN INSTITUTE OF MANAGEMENT AND TECHNOLOGY, SHAHJAHANPUR AFFILIATED TO DR. APJ ABDUL KALAM TECHNICAL UNIVERSITY. LUCKNOW Submitted By Submitted To Mrs. Apoorva Gupta Mr. Horpreet Singh SIMT, Shahjahanpur Department of MBA SUN INSTITUE OF MANAGEMENT AND TECHNOLOGY (SIMT), 22-2023 [Page Particular Intraducation Biblography 1-Introduction- ‘There was a time when people had to exchange things for the things they needed. We then moved tocurrency which became easier to- manage and store when banks came into the picture. Then we had the glossy money, aneurwave of plastic credit and debit cards of course, which made our lives smooth as butter. Now, there! innovation in the financial services industry, Near Field Carsmunication technology (NFC) alms to-make banking futuristic. Imagine walking in to a convenience store and paying for stuff in seconds by tapping your phone.an the counter. Or better yet, paying with your wristhand or watch. What we arc describing to you isa future where the ‘wallet, paper ticket, loyalty eard, purse and eredit and debit card have all gone digital. It isa short-range, wireless link based on radio-frequency identification technology (RFIT) that has the ability totransfer small amounts of data bbehreen two devices held close-to each other, The SIM card ina phoneacts a smart card that identifies your account to a network. On NEC phones, the SIM card acts a Secure Element that can hold other apps such as payment cards, For banking, NFC identifies an individual and his/her bank account information to-a.computer device Similar ideas in advertising and industrial applications were not generally succecoful commercially, outpaced by technotogies such as QR codes, barcodes and UNF RFIO tags. NFC protocols established a generally supported standard. When one of the connected devices has Internet connectivity, the other can exchange data with online: services Near-field communication (NFC) deseribes a technology whieh can be used for contactless exchange of sats over short distances. Two NFC-capable devices are connected via a point-to-point contact over a distance of 0 to 2 cm. Thisconnection can be used to-exchange data (such as process data and maintenance and service information} between the devices. This interface can be used for parameterization af the component 2s well NEC enabled portable devices.can be provided with application software. for example, to read electronic tags or make payments when connected taan NFC-compliant apparatus. Earlier close-range communication used technology that was proprietary to the manufacturer for applications such as stock tickets, access control and payment readers.Like other proximity card technologies, NFC is bared ‘on inductive coupling between two so-called antennas present on NFC-enabled devices—for example a ‘smertehane end a printer—communieating in one or beth directions, using a frequency of 13.56 MHz in the clobally available unlicensed radio frequeney ISM band using the ISO/IEC 18000-3 air interface standard at data rates ranging fram 105 to 424 kbit/s. 2) Page (a) What is NFC? It isa short-range, wireless link based on radio-frequency Identification technology (AFIT) that has the ability to ‘transfer small amounts of data betwoon two devices held close to each ether. The SIM card in a phone acts a smart card that identifies your a¢count fe @ network. On NFC phones, the SIM card acts » Secure Element that ean hold ‘other apps such as payment cards. For banking, NFC Identifies an individual and his/her bank account information toa computer device. [NEC is something that we actually ee all around us, Think access eards for hotol rooms and offices, metro tain cards, car keys, estickets printout machines, ete. Most global mobile phones have NEC capabilities that can be used for various financial transactions. ‘The advantages that NFC transactions offer are galore. For starters, there is no need to hunt for that loose change. No need to count. No need to stand In those dreadful queuns for hours. Minimumfno transection errors, The money ix protected even when you lose your phone. To enable NFC transactions through your phone, you simply reed to have @ phone with an NFCchip and then have to dawnload an app (like Google Wallet or Apple Pay) that ‘connects with your bank aeeount/eredit card ar debit card ar a prepaid account that you have connected to, Let's do some number crunching now. According to.a report in Forbes magazine, the adoption of NFC in smart phones hae gained significant momentum, with mere than 550 milion handsets expected to include the technology by 2016. And according to Juniper research, $180 billion worth of goods and services worldwide will be paid for using NFC in about three years. I we take another country speeifie example, in Australia, contactless NFC paymen the country have increased from being 18% ofall scheme debit card transactions at the start of 2013 to 60% in the last one year, according to an article in ednet.com, Wearable technology devices kes fitness bands, watches etc {re already on their way te become touch and pay devices. Current examples being the Apple Watch and Qptalio Contactless Mini Tag which tied up with the Spenish bank Caixa Bank for the launch of contactless EMV payment Wristbands, As the NFC functions continue te evelve, it can hopefully soon be integrated to e-Commerce applications within the home. What it means for the future of banking? Like we said earlier, retail banking has never been better, From having te go to brick and mortar bank cutiets to having plastic eards in our packets to banking through the digital medium, we have already come long way. Further contactless payment systems such as an NFC mobile wallet is only going to boost the convenience Further. This will lead to even better security and analysis of our personal finances, in addition to the ease of Just carrying our cell phone to market to shop or transact, a|Page IEICE Bank has been the pioneer in adopting cutting edge technology to drive convenience to its customers. tn ‘onder to make all canteen transactions cashless, ICICI Bank has launched NFC based payments for Its employeer. Popularly known as Campus Payment Solution, the idea behind the product is to give a cashless end convenient Tap f Pay experience to employees, Over the Counter payments can be made By Just tapping the hone, with an NFC tag, on a Point of Sale machine, The lunch has been successful with more than 7500, employees using this payment option for their day to day payments within the campus, ICICI Bank plans to san roll out this unique and effective payment solution for the masses november, tworfintech companies started testing thelr products. The other four stated in November. ‘Among the first two firms is Jaipur-based Natural Support Consultancy Services Pvt. Ltd. It has started testing = Product called eRupay, which uses near-field communication (NFC) based prepaid card and Point of Sate (Pos) ‘The company has already tied-up with Punjab National Bank for ‘The focus is en merchant and offline digital payments in remote locations, It will help to process payments through NFC without the need for internet connectivity. The prepaid card can be recharged for a maximum of §2,000 8 day and 820,000. month through PNB's branches, ATMs, business correspondents, and #2 an. a[Page ased Nucleus Software Exports Ltd. has started testing its product PaySe. Evan PaySis an offline a: Similarly, Dat well as online digital payment smartcard that uses the NFC technalagy. The card can be accepted through Payoe devices that accept payments and store electronic cash in the offline mode. The payment works independently of ‘a bank account, Among the four entities that started testing in December is Mumbai-based Tap Smart Data Information Services Private Lid. It's product Clty Cash also uses NFC technology using a prepaid card to facilitate offline person-to- ‘merchant {P2M) transactions. Customers can use it as a travel pass ta pay far hu tekets and as a wallet for Payment at select merchants, Fine Paytech is one of the investors that is backing the company. ‘Similarly, Dalhi-based Nucleus Software Exports Ltd, has started testing its product PaySe. Even PayS isan offline as well as online digital payment smarteard that uses the NF technology. The card can be accepted through PaySe ‘devices that accept payments and store electronic cash in the offline mode. The payment works independently of a bank aceount ‘Among the four entities that started testing in December Is Mumbal-based Tap: Smart Data Information Services Private Ltd. t's product City Cash also uses NFC technology using @ prepaid card to faciitate offline person-to~ merchant (P2M) transactions. Customers can use it as a travel pass to pay for bus tickets and as 3 wallet for payment at select merchants. Fn Paytech is one of the investors that is backing the company. pracie current foep cura 5|Page 1.b). Working Principle of NEC Now that we know what NFC Is, how claes it work? Just like Bluetooth and Wi-Fi, and all manner of other wireless signals, NFC works on the principle of sending information over radia waves. Near Field Cammunication is anether standard for wiroless data transitions, This means that devices must adhere ta certain spectfications in order to communicate with each othar properly. The technology used In NFC is based on older RFID (Radio-frequency Identineation) ideas, which used electromagnetic Induction in order to transmit information, This marks the one major difference between NFC and Bluetooth/WiFiThe former can be used to induce electric ‘currents within passive components as well as just send data, This means that passive devices don’t require thelr ‘own power supply, They can instead be powered by tha olectromagnetle field produced by an active NFC component when it comes into range. Unfortunately, NFC technology does not command enough inductance to charge eur smartnhanes, but Ql wireless charging is based on the same prinelile, Read/wite mode, on the other hand, is one-way data transmission, The active device, possibly your smartphone, links up with another device in arder to read information from it. NFC advert tags use this mode. The final mode of operation is cand emulation. The NFC device can function as a sriartar contactless credit card and make payments oF tap Into public transport systems, User with NFC Mobile Smart Objects Vy) Touch Based Interaction Touch Based Paradigm for NFC 61Page 1.c). NFC Operations Modes. NFC devices are unique in that they support four modes of operation: reader/writer, peer-to-peer, card emulation and wireless charging. The different operating modes are based on the ISO/IEC 18052 NFC IP-1 and ISO/IEC 14443 contactless smart card standards. In reader/writer made, the NFC device Is capable of reading NFC Forur-mandated tag types, such as 2 tag embedded In an NEC smart poster. The reader/writer mode on the RF interface ie compliant with the ISO 14443, land Felia schemes. In Peer-to-Peer mode, two NFC devises ean exchange data, For example, yoU can share Bluetooth or Wi link set- Up parameters of you can exchange data such as virtual business cards or digital photos. Peer-to-Peer made is standardized on the ISO/IEC 18092 standard, In Card Emulation made, the NFC device appears to an external reader much the same as a traditional contactless smart card. This enables contactless payments and ticketing by NFC dovices without changing the existing infrastructure, In Wireless Charging made, small loT devices such as # Bluetooth headset, fitness tracker or smartwatch can be changed with the contactless transfer af up tol Waf pawer, Reader/Writer Mode Peer-to-Peer Mode Card Emulation Mode « Increases mobility « Easy data exchange * Physical object « Decreases physical © Device pairing elimination effort ® Access control * Ability to be adapted by many scenarios « Easy to implement 7| Page (1.d). NFC Security: There are several important areas for near field communications security. Each possibly vulnerability just be addressed and resolved. They are the four major NFC-security areas are listed below: (i) Eavesdropping (il) Data corruption (ii) Data modification (v) Man-in-middle attack These represent some of the ways in which NFC security could be compromised. Althaugh the shert range over which communications Is possible reduces the possibilty of any threats, it does not ensure complete NFC security, fand.asa result each NFC security issue must be addressed to ensure that it is not possible to breach. (i): Eavesdropping Although near field communication is @ short range technology - ax the name implies - this dows not make it immune te security attacks. As NFC uses radio waves to communicate, and these propagate in the vicinity of the transmitter, and not just to the wanted receiver, it is possible for unwanted users te pick UP the signals. The: technology to recelve this signals is not difficult to create, Although the range of NFC is limited to a fewe centimetres, it |s still possible for 2 possible attacker to retrieve usable signals up to distances, often up to 1 metre away for passive signals, and for active mode distances of Up to 10 metres may be at risk. eis dificult to prevent eavesdropping as signals need to be raizby received by the required receiver and this requires a certain signal strength. An eavosdropper does not need to receive all communications - f only 3 parcantage are received this may be adequate. Also the attacker may use large and sophisticated antennas~ often loglsties ofthe legitimate receiver at the point-of-sale terminal, ete may restrict the antenna size and performance. “This requires signals to be sufficiently strong to ensure reable communications. BlPage Data corruption ‘This near field communications security issue is essentially a form of denial of service attack. Rather than just data that may be listening to the communications, the attacker may try te disturb the communications by sen} valid, or even blocking he channel so that the legitimate data is corrupted. For this the attacker does net need to be able to decipher the valid data being sent. Itis possible for NFC devices to detect this form of NFC security attack. By Istening when data is transmitted they will be able to detect any attack of this form because the power required to successfully attack a system Is significantly higher than that which can be detected by the NFC device transmitting the dat iii) - Data modification ‘This form of NFC security issue involves the attacker aiming to arrange forthe receiving davice to receive data that has been manipulated in some form. This data will naturally have to be in the correct format fort to be accepted. This form of attoek ig possible for some bits under different coding schemes, There are a number of ways to provide protection against this form of security attack. It is Impossible fer an attacker to modify all the dats transmitted at the 106 Baud data rate in active mode. As a result, the 106 Baud data rate, active mode would be required for data transfer in both directions, However ths is the most vulnerable mode to eavesdropping. ‘The best option is to use a secure channel as this provides the greatest level of NFC security. e@lipace fiv)- Man-in-thi iddle attack This form of NFC security issue involves two party communication being intercepted by a third party, The third party acts a5 a relay, but using information received and meditying iif required to enable the atacker to achieve their alms. This must obviously be achieved without the two original parties knowing that there is an interceptor between them, ‘tis particularly difficult to achieve a man-in-the-middle attack om an NFC link To completely minimis the risk, it I= best to use an active-passive communication mode. In this way it would be possible to hear and detect any unwanted third party. Overview of NEC Application Near Field Communication (NFC) is 8 set of short-range wireless technologies, typically requiring a distance of Sem or less to initiate a connection, NFC allows you to share small payloads of data between an NFC tag and an Android-powered device, or between two Androld-powered devices ‘Tags can range in complexity. simple tags offer just read and write semanties, sometimes with one-time pragremmable areas to make the card readonly. More complex tags offer math operations, end Rave cryptographic hardware to authenticate access to a sector. The most sophisticated tags contain operating le executing on the tag. The data stored In the tag can also be m standard environments, allowing complex interactions with ead written In a variety of'formats, but many of the Android framework APls are based around @ NFC Foru called NDEF (NEC Data Exchange Format) |Android-powered devices with NFC simultaneously support three main modes ef operation: {o}-Reader/writer mode, allowing the NFC deviee to read andjor write passive NFC tags and stickers, liowing the NFC device to exchange data with other NFC peers; this operation mode is used by (b)-P2P mode, Android Beam, {fe} Card emulation mode, allowing the NFC device Itself to ect as an NFC card. The amulated NEC card can then be ‘accessed by an external NEC reader, such as an NFC point-of-sale terminal. tol Pece 1.f). Other Innovat Bengalur-based Naffa Innovations Pvt. Lid. uses sound waves for fast and secure traniactions, Branded Tonetag, the company ures encrypted sound waves to make affine, proximity-hased contacts payrnents. It oth be used on any existing device, including feature phones, ToneTag is testing offline payments to merchants vie UF! {unified payments interface). To make a payment, customers need to tap their phanes.oa the TaneTag’s cesice ‘A sound wave Is emitted that carries data, which ic received by the merchant's device, completed. It works just like NFC payments. The company has multiple patents for the technoloary Muses. Bengaluru-based Ubona Technologies Pvt. Utd. uses sound waves for multiple uses. One af their offering: verification and identification of customers using their voice. The company iz testing veive-based UPI alata ‘can be used fer person-to-person (P2P] and P2M offline payments Ubona Technologies has also supported (incubsted) Ultra a company that uses very high frequency and inaudis ‘sound waves for data transfer between two mobile devices. The sound waves are emitted and received using © phone's speaker and microphone and can be used for payments. ‘The last company that RBI has selected for the regulatory sandbox is Eroute Technologies Prt. Ltd. hazed in Nowe “The company is testing 2 UPL-based afffine mobile solution that uses 2 smartcard thet has #0 embedded SIM, Payments will be made using the SIM Tookit menu. ‘These six entities were part of the first cohort of RBI's regulatory sandbox. The centre! bank has started #¢¢ appliestions for the secend cohort on 24 December 2020, which ends on 15 February 2021. The theme for this ‘cross-border payments. 11 [Page '1.G). RBI Focus BI is imple menting the regulatory sandbox in three areas. One, where regulations gre absent. Two, where there's a need to ease regulations for enabling Innovation. Three, the proposed innovation shows the "promise of easing ‘or effecting financial services delivery ina significant vray and ofine payment by NFC". ‘The regulator has also shortlisted a few areas of focus, including segments where there's a need for innovation products and services, ad it feels that the Implementation of new technology can help. In the first phase or first cohort, the regulator recelved 32 entries, and it has selected six for the test phase. The first phase’s theme was retail payments with » focus on mobile payments, offline payment solutions, and -contaetess payments, i2| Page 2. Objectives of NF 1 NFC technology 50 far looks to be safer than other forms of communication, Because the range issa short, hackers would have to be almost impossibly nearby to jack your info. Even then, they'd have todo it when you were intentionally transmitting that infarmation (say, to buy groceries; it wauldn’t work all the tine, However, i's possible yeu might establish communication with a fraudulent tae, or that a business might keep your information and seit. I you consider it easier to use @ single mobile device to make payments, gain entrance, enable ‘transportation, read information and share with friends easier, then yes. It will make your life easier twe compare NFC and EMV then NFC Technology is More Secure than EMV. NFG technology offers three key security features — biometrics, sacure element chips and tokeniration. These elements are ‘exponentially mare secure than EMV because they are unique to a specific device and individual user. aa|Pece 3-Research methodology: 1.DATACOLLECTION. PRIMARY DATA: Data was collected through questionnatre, 2, SAMPLING SIZE. allappraximately 36 respondents were chosen on a convenience sampling basis. 3, SAMPLING AREA, ‘The sample of survey respondents comprises of peoples of Greater Noida. 4, SAMPLING TECHNIQUES, Non-probabilty sampling techniques were used under non-probability technique, convenience sampling techniques were used, STATISTICAL TOOLS . Ms.excel,goagle form, (3.1)-Data collection We have refered to this detail websites for collecting. data on NFC based on the data be have frame of some Question for the prospective audience. Please refar below far thesome question saulted with in the question. Near field communication uses electromagnetic radio fields to allow two cempatibie devices to exchange data and share information when patted clase to each other. Typlealy the devices must be within four to five entimatres of each ather to work. This i In contrast to far field eemmunication which operates across great distances, Your smartphone or other NFCeainpatible device sends aut radio frequency s\gnals that interact with an NFC {8 found in compatible card readers and tmart posters, The signal ereates a current that flows through the NFC tag.and allows the device and the tag to communicate with one another. Typically one device, the tag, Is passive and only sends out information while the other device, the smartphone in this case, is active and can both send and receive information. NFC provides numerous ways to make payments, retrieve information, and evan exchange videos or information with friends on the go. Swiping your smartphone at a supermarket checkout instantly pays for ‘Your groceries without digging inte your wallet for a credit-card. Passing your phone over a friend's phane- allows you to share a-website link while waving the phone fn front of a pestor or dicplay with a NFC tag in it shows information abaut what you're viewing. This fs an excellent way to learn more about exhibits in a ‘museum oF upcoming events [n your community. NEC allows your business to provide fast, secure ways for eustamers to pay at the register withaut digging ‘hrough thelr wallets fer various credit cards. It also lets customers stare coupons and redeem customer loyalty points without carrying around extra papers and cards. It also offers ways to send information to custamers using smart posters and displays with a NFC tag inside. A visitor would swipe thelr phone to learn more about historic monuments or famous pieces af artwork, ‘Some smartphones have NFC integrated into the smartphone itself while others can use NEC when 2 SIM card ‘or microSD card compatible with NFC is installed. Checking your phone manufacturer's website and pulling up Your specific madel should present a list of features and will include HFC if itis avaitable. Well-known NFC compatible phones include Google's Nexus 5, Samsung's Galaxy $l, and the BlackBerry Bold (versions 9900 and 9830). Near field cerumunication technology Is expanding and wil be available on both SIM cards and microSD cards, Purchasing one of these two cards and inserting, as you don't remave the card. ta your smartphone lets you use NFC technology as lang a5 [Page Do you use smart phones for online transactions? Yes No Maybe Based on the above detailed description on NFC, would you like to use NFC in your daily life? Yes No Maybe NFC technology can be useful on offline mode, would you prefer to use NFC? for e.g transactions in flights can be easily made through NFC technology. Yes No Maybe NFC can be a better alternative for online platform for sharing files and information. Would you like to use NFC for file sharing? Yes No Maybe: If any online platform technology like NFC can secure online transactions and will restrict fraud which are happening now a days, then would you like to use this technology? Yes No Maybe ahiPage 4.Data analysis- Do you use smart phones for online transactions? 35 responses @ Yes @No @ Maybe aT|Page NFC can be a better alternative for online platform for sharing files and information. Would you like to use NFC for file sharing? 35 responses @ Yes @No © Maybe agleoge NFC technology can be useful on offline mode. would you prefer to use NFC? for e.g transactions in flights can be easily made through NFC technology. 34 responses @ ves @No © Maybe 5-Finding a result- _Based on the research methodology which Ihave followed to carry out this analysis | have created a Google form ‘containing some questions on NFC technology as discussed above. Based an the response which | have recieved, | have reached to a.eanelution that maximum of the audience has given a green flag to this technology and have ‘appreciated the features which | have discussed on the form. Summarising it we can say that this NFC tecnology can make its presence in the market and will be a-successful technology platform for its users: 6- Limitations of NFC - 2} Mejor hardware manufacturers outside of Motorola, Nokia, and Philips are not yet supporting itdue to its less demand and popularity. A recent survey concluded that 60 % of population had not yet heard of NFC (bh-As NFC uses radio waves for data transfer there ean be 2 number of possible security attacks while transmission € transaction which can be categorized as Eavesdropping, Date corruption, Data modification, Imposter ‘attacks(man in the middle), and Theft (NFC device is stolen). [c-Peaple find selfish benefits aut of every new technology. Same is the case with NFC where fraudsters ean direct victim to a weong website by replacing original tag at public places with their corrupted one. {d)-There is urgent need for a secure channel and complex data encryption techniques along wiith device protection using a code ar password in order to avoid above mentioned security attack. {2} Using NFC devices can affect porzonal primacy ss semeone could read UID of a NFC tag froma distance and ‘identify the perzon’s in and out time when the same phone passes ata later time. 2)Page (f-AFC's operating range it just 10 em.as inductive coupling works for short distances, compared te Blustoath’s 10 meters and Wi-Fi’s 100 meters, (a}-Maximum data transfer rate for NFC Iz 424 Kits per second making it unsuitable for large amount of data transfers, compared to Bluetooth’: 3 Mbps and WiFi's 54 Mbps. (h}Mafia Fraud attack er the relay attack can defeat the protocols with a atsumptien of praximity by placing two special communication devices (called the “ghost” and the “leeck") between the victim reader and the victim t36. ‘This range extension by the attackers can lead to high level of insecurity especially in the case of NFC-enabled transactions. mpage ZSUGGESTION — 4.Add @ multhfactor authentication feature Simply requiring the submission of a single password before granting access to your customer's bank account Is a defense system which can be beaten.By adding 2 multt-factor authentication feature such as generated one-time passwords or fingerprints - you add an additianal layer of defense which cannot easily be deceived. 2. Encourage the use of NFC-embedded SIM cards While you can’t force this security option on your eensumers, you can highly suggest it. An NEC-embedded SIM card is a SIM card that allaws consumers to securely download their credit card information into the Near Field Communication (NFC}SIM ear 3, Fingerprinting device Introduction of Fingerprinting devices adds another dimension in banking mobile apps. It ‘obtains various sets of signals such as IP address, location, time of the day, device type, locetion, sereen sale, tbrowsor otc. 4. Utilize behavior analysis there Is specialized software on the market that will monitor and analyze the login location and activity and online account activity of consumers. Thanks to this technelagy, yourmabile Banking could flag abnormal behavior or further investigation Further investigation could be an email or text alert to the customer advising of suspicious activity, or a call from the bank further investigating the suspicious activity. 5. Offer real-time text and email alors It is safe toassume someone using meblle banking on their smartphone has direct access to their email and/or text messages, W[Page 8-Conclusion- [Near Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of peaple throughout the world thatoffers diverse services ranging from paymentand loyalty applications to access keys for offices and houses, Eventually NFC technology integrates such services into one single mobile phone, NFC technology has emerged lately, and consequently nat much academic source Is available yet. On the contrary, dus ta its promising business case options, there will be an increasing amount of work to be studied in the very close future. This paper presents the concept of NFC technology in aholistic approach with different perspectives, including communication essentials with standards, ecosystem and business ‘issues, applications, and security issues. Open research areas and further reeammended studies in terms of academic and business point of view are also explored and discussed at the end of each major subject's subsection, This comprehensive survey will be a valuable guide for researchers and academicians as well as for business world interested in NFC technelegy. This paper covered the entire details of Near Field Communication (NFC) technelogy. NFC can be combined with existing infrared, Bluetooth technologies for improving the range of NFC. NFC offers a secure and simple way for ‘transferring data between two electronic devices, Another advantage of NFC is its compatibility with RFID ‘technology. NFC is actually based on RFID technology. RFIO uses magnetic field induction ta init; ‘communication between electronic devices in close vicinity. NFC operates at 13.96MHz and has 424kbps maximum data transfer rate. NFC Is complementary to Bluetoath and 802.11 with their long distance capabilities. This paper discussed the concepts of NFC technology in a detailed manner Including working, transmission details, protocols and standards, application scenarios, future market, security standards and vendors’ chipsets available for this standard. 9-Biblography. htt :/veww resoarchgate, net/figure/Summary-of =5 Alternatives fig?_ 757675463 ttos://mail,coogle.com/mail/u/O/#inbox/Qgre/HrhzenmebbGBsfOQgFRmkpB« hitps://wnew google cornfsearch?sxsrf=ALeKHOOKSESbd agnO4mOUPliSqgm’ ahi MES AIEIS1225698948e/=2_t YOWaPNDCSOPVaYGICAR=nfeHullsfarmsin#tankinggogenteBgs lep=C

You might also like