SmartServe Task 1
SmartServe Task 1
1
1. NFC and Its Core Concepts
What is NFC?
It is commonly used in smartphones, smart cards, and devices for mobile payments, identity
verification, smart locks, and more.
• One device, such as a smartphone or NFC reader, creates an alternating magnetic field
using radio frequency waves at 13.56 MHz.
• The other device, often an NFC tag, responds to this field and is typically powered by
it, meaning it does not need a separate battery.
• This setup allows two devices to exchange small data packets wirelessly and securely
within a close range.
• Range: Up to 4 cm
• Frequency: 13.56 MHz
• Data Rate: Up to 424 kbps
• Power Source: Passive tags draw power from the initiating device
• Device Roles: One device initiates communication (active), the other responds
(passive)
There are three main modes in which NFC devices can operate:
2. Reader/Writer Mode
2
• Example: Tapping your phone on a museum exhibit or poster to read information
stored in the tag.
3. Peer-to-Peer Mode
How It Works:
RFID uses radio frequency waves to identify and track tags attached to objects. Unlike NFC,
RFID doesn't need the devices to be very close or aligned — and it doesn't use magnetic field
induction.
3
Key Points:
How It Works:
Bluetooth is a wireless technology that allows devices to communicate over short to medium
ranges. BLE is a low-energy version ideal for smart devices and wearables.
Key Points:
C. QR Codes
How It Works:
QR codes are 2D barcodes scanned using a phone camera. They encode information (like links,
text, or payment info) and don’t need special hardware.
Key Points:
How It Works:
These are smart payment cards that contain a secure microchip. They support both contact
and contactless transactions.
4
Key Points:
E. Ultrasonic Communication
How It Works:
This method uses high-frequency sound waves (above human hearing range) to transmit data
between devices, usually via built-in microphones and speakers.
Key Points:
F. UWB (Ultra-Wideband)
How It Works:
UWB is a radio-based technology that uses very low energy for short-range, high-bandwidth
communications. It allows precise distance measurement.
Key Points:
• Range: Up to 10 meters
• Precision: Very accurate location tracking (within centimeters)
• Use Cases: Digital car keys (Apple U1 chip), indoor navigation, AR/VR spatial
positioning
A. Technical Challenges
• Short Range: NFC only works within a few centimeters, which limits use in some
applications.
• Slow Data Rate: Data speed (up to 424 kbps) is much slower compared to Bluetooth
or Wi-Fi.
5
• Device Compatibility: Not all phones or systems support all NFC modes.
• Software Diversity: Different devices and OS handle NFC operations in their own
ways.
• Limited Functionality: NFC tags and devices often have limited memory and
processing capabilities.
B. Security Issues
• Relay Attacks: A hacker can “relay” the signal between two NFC devices to steal
information.
• Eavesdropping: Though difficult due to short range, signals can still be intercepted
with special tools.
• Data Corruption: If NFC data is altered in transit, it can cause errors in the transaction.
• Unauthorized Access: Poor app design or weak security can allow attacks through
NFC services.
1. Encryption: Data is scrambled into a secret code when sent between devices, so only
the correct recipient can read it.
2. Tokenization: Replaces actual card info with a one-time-use “token” during payment.
3. Biometric Verification: Uses face, fingerprint, or eye scan to authorize NFC
transactions.
4. Secure Element (SE): A special chip inside the phone where sensitive data is stored
safely.
5. Trusted Execution Environment (TEE): A secure part of the processor that handles
sensitive operations.
6. App-Based Permissions: NFC usage is controlled by app settings (e.g., requiring a
PIN or biometric before access).
• Cost of Implementation: Extra chips (like SE) make devices more expensive.
• User Awareness: Many users don’t know about the security options or how to use
them.
• Fragmentation: Not all devices or regions support the same security models.
5. NFC Architecture
NFC systems use a layered architecture to handle all operations—from hardware
communication to user apps.
A. Main Layers
6
• Application Layer: Apps like Google Pay, e-ticketing, smart locks, etc.
• Middleware Layer: Connects the app with the hardware (includes Android’s NFC
stack, drivers, etc.)
• Hardware Layer: NFC chip, antenna, Secure Element (SE), TEE.
Event tickets,
Type 2 106 kbps 48 bytes–2 KB Rewritable
tags
Advanced
Type 3 212/424 kbps Up to 1 MB ID systems
features
High security,
Type 4 106–424 kbps Up to 32 KB Banking
encrypted
Long range
Type 5 ~53 kbps Varies Industrial use
(ISO 15693)
Core Features: