Tuesday, 17 September 2013

Hello!!! friends

Learn more Explore more !!!

 Is it possible to login Gmail without using password ?
Yes,its Possible using  "NFC enabled tokens"
follow the link to know more
login gmail without using password

 Recent Smartphones are equipped with NFC feature ,and people say that it helps in high speed data communication .so to know more wat's NFC  and How does it work??
here we go !!!





What is NFC ?
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few inches. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between an NFC device and an unpowered NFC chip, called a "tag".
NFC standards cover communications protocols and data exchange formats, and are based on existing radio-frequency identification (RFID) standards including ISO/IEC 14443 and FeliCa.The standards include ISO/IEC 18092 and those defined by the NFC Forum, which was founded in 2004 by NokiaPhilips Semiconductors (has became NXP Semiconductors since 2006) and Sony, and now has more than 160 members. The Forum also promotes NFC and certifies device compliance.It fits the criteria for being considered a personal area network.

Uses NFC: 

NFC builds upon RFID systems by allowing two-way communication between endpoints, where earlier systems such as contactless smart cards were one-way only. It has been used in devices such as Google Nexus, powered with Icecream Sandwich, named with a feature called "Android Beam" which was first introduced in Google Nexus. Android Beam uses NFC to enable Bluetooth on both devices, instantly pair them, and disable Bluetooth once complete automatically on both devices. This only works between Android devices version Jelly Bean and above. It has also been used in Samsung Galaxy S III, with feature named as S-Beam. It is an extension of Android Beam, it uses the power of NFC (to share MAC Address and IP addresses) and then uses WiFi Direct to share file and docs. and pics. to share file. The advantage of using WiFi Direct over Bluetooth is that it is much faster than Bluetooth, having a speed of 300Mbit/s for sharing large files Since unpowered NFC "tags" can also be read by NFC devices, it is also capable of replacing earlier one-way applications.

Commerce

NFC devices can be used in contactless payment systems, similar to those currently used in credit cards and electronic ticket smartcards, and allow mobile payment to replace or supplement these systems. For example, Google Wallet allows consumers to store credit card and store loyalty card information in a virtual wallet and then use an NFC-enabled device at terminals that also accept MasterCard PayPass transactions.Germany,Austria,FinlandNew Zealand,Italy, Iran and Turkey, have trialed NFC ticketing systems for public transport. Vilnius fully replaced paper tickets for public transportation with ISO/IEC 14443 Type A cards on July 1, 2013.
India is implementing NFC based transactions in box offices for ticketing purposes.

Bluetooth and Wi-Fi connections

NFC offers a low-speed connection with extremely simple setup, and can be used to bootstrap more capable wireless connections. For example, the Android Beam software uses NFC to complete the steps of enabling, pairing and establishing a Bluetooth connection when doing a file transfer. Nokia, BlackBerry and Sony have used NFC technology to pair Bluetooth headsets, media players, and speakers with one tap in its NFC-enabled devices. The same principle can be applied to the configuration of Wi-Fi networks.

Social networking

NFC can be used in social networking situations, such as sharing contacts, photos, videos or files, and entering multiplayer mobile games. In the field of social networking NFC is very useful to exchange contacts and other files.

Identity and access tokens

The NFC Forum promotes the potential for NFC-enabled devices to act as electronic identity documents and keycards. As NFC has a short range and supports encryption, it may be more suitable than earlier, less private RFID systems.

Smartphone automation and NFC tags

Smartphones equipped with NFC can be paired with NFC Tags or stickers which can be programmed by NFC apps to automate tasks. These programs can allow for a change of phone settings, a text to be created and sent, an app to be launched, or any number of commands to be executed, limited only by the NFC app and other apps on the smartphone. These applications are perhaps the most practical current uses for NFC since it does not rely on a company or manufacturer but can be utilized immediately by anyone anywhere with an NFC-equipped smartphone and an NFC tag.

Comparisons with other Available Technology 


Security Aspects

Although the communication range of NFC is limited to a few centimeters, NFC alone does not ensure secure communications. In 2006, Ernst Haselsteiner and Klemens Breitfuß described different possible types of attacks, and detail how to leverage NFC's resistance to man-in-the-middle attacks to establish a specific key. Unfortunately, as this technique is not part of the ISO standard, NFC offers no protection against eavesdropping and can be vulnerable to data modifications. Applications may use higher-layer cryptographic protocols (e.g., SSL) to establish a secure channel.

Eavesdropping

The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters, but is typically a small number of metres. Also, eavesdropping is highly affected by the communication mode. A passive device that doesn't generate its own RF field is much harder to eavesdrop on than an active device. An attacker can typically eavesdrop within 10m and 1m for active devices and passive devices, respectively. With the use of a patch loop antenna it is possible to place a receiver close to the target and disguise it. This is much like ATM skimming in that it needs to be near the location however in this case no contact with the device or reader is required.

Data modification

It is easy to destroy data by using a jammer. There is no way currently to prevent such an attack. However, if NFC devices check the RF field while they are sending, it is possible to detect attacks.
It is much more difficult to modify data in such a way that it appears to be valid to users. To modify transmitted data, an intruder has to deal with the single bits of the RF signal. The feasibility of this attack, (i.e., if it is possible to change the value of a bit from 0 to 1 or the other way around), is amongst others subject to the strength of the amplitude modulation. If data is transferred with the modified Miller coding and a modulation of 100%, only certain bits can be modified. A modulation ratio of 100% makes it possible to eliminate a pause of the RF signal, but not to generate a pause where no pause has been. Thus, only a 1 that is followed by another 1 might be changed. Transmitting Manchester-encoded data with a modulation ratio of 10% permits a modification attack on all bits.

Relay attack

Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC. For this attack the adversary has to forward the request of the reader to the victim and relay back its answer to the reader in real time, in order to carry out a task pretending to be the owner of the victim's smart card. This is similar to a man-in-the-middle attack. For more information see a survey of practical relay attack concepts One of libnfc code examples demonstrates a relay attack using only two stock commercial NFC devices. It has also been shown that this attack can be practically implemented using only two NFC-enabled mobile phones.

Lost property

Losing the NFC RFID card or the mobile phone will open access to any finder and act as a single-factor authenticating entity. Mobile phones protected by a PIN code acts as a single authenticating factor. A way to defeat the lost-property threat requires an extended security concept that includes more than one physically independent authentication factor.

Walk-off

Lawfully opened access to a secure NFC function or data is protected by time-out closing after a period of inactivity. Attacks may happen despite provisions to shut down access to NFC after the bearer has become inactive. The known concepts described primarily do not address the geometric distance of a fraudulent attacker using a lost communication entity against lawful access from the actual location of the registered bearer. Additional features to cover such an attack scenario dynamically shall make use of a second wireless authentication factor that remains with the bearer in case of the lost NFC communicator. Relevant approaches are described as an electronic leash or its equivalent, a wireless key

use the links below to get more info about:

sources:

thanks for viewing....

No comments:

Post a Comment