COMPARATIVE STUDY OF NFC, BLUETOOTH, RFID AND IrDA

Similar documents
NEAR FIELD COMMUNICATION

NFC is the double click in the internet of the things

Introduction to Wireless Networking ECE 401WN Spring 2009

In the name of God, the most merciful Communication and Networking

Guide to Wireless Communications, 3 rd Edition. Objectives

Join the forward thinkers who rely on Toshiba for wireless connectivity ICs.

Case study of Wireless Technologies in Industrial Applications

Chapter 4: Communication Technology. Solutions

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD

Smart Campus an Android and Web based Application using. IoT and NFC Technology

Mobile Security Fall 2014

CHAPTER 3 BLUETOOTH AND IEEE

WIRELESS TECHNOLOGIES FOR THE INTERNET OF THINGS

Sensor Application for Museum Guidance

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

ASDF India Proceedings of the Intl. Conf. on Innovative trends in Electronics Communication and Applications

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

COMP327 Mobile Computing Session: Lecture Set 6 - The Internet of Things

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

Modulation. Propagation. Typical frequency bands

CEN 538 Wireless LAN & MAN Networks

EMBEDDED SYSTEMS PROGRAMMING Accessing Hardware

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Security in NFC Readers

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network

Wireless# Guide to Wireless Communications. Objectives

Attacks on NFC enabled phones and their countermeasures

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Naveen Kumar. 1 Wi-Fi Technology

A Proposed e-payment Service for Visually Disabled

Amarjeet Singh. February 7, 2012

Research on Modern Bluetooth Technology

Wireless Personal Area Networks & Wide Area Networks

Wireless# Guide to Wireless Communications. Objectives

Wireless Local Area Networks (WLAN)

Network Communications Standards. Applied Information Technology

Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

Jeffrey Price Dr. Konak IST 220 Bluetooth Technology

Computer Networks II Advanced Features (T )

EFFECTIVE GI-FI WIRELESS TECHNOLOGY

Bluetooth. Bluetooth Radio

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie

A Study Wireless Communication Domain

Bluetooth. March 28, 2005 Patrick Lui

ACR1255U-J1 Secure Bluetooth NFC Reader

Security of NFC payments

Chapter 9 Introduction to Networks

Wireless Grows Up. Craig J. Mathias. Principal, Farpoint Group. Strategic Interop - 10 September Our Objectives for This Morning

NFC in the PC environment

Bluetooth Communications App Using App Inventor

LTE : The Future of Mobile Broadband Technology

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Guide to Wireless Communications, Third Edition. Objectives

Application of information and communication technologies in home telehealth system

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

1 Wireless Network Architecture

5G radio access. ericsson White paper Uen June research and vision

Securing A Bluetooth Device

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Chapter 6 Wireless and Mobile Networks

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Smart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong

Last Lecture: Data Link Layer

Wireless Technologies

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Contents. Preface. Acknowledgments. xxiii. List of Acronyms i xxv

Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail

Cooperative Wireless Communications. Ashutosh Sabharwal

e-pg Pathshala Quadrant 1 e-text

UHF RFID Embedded in Electronic Devices. Chris Diorio CTO, Impinj Inc.

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

ACR1255 NFC Bluetooth Smart Card Reader

Optical Communications

Current Benefits and Future Directions of NFC Services

Corporate Profile. Applying minds to technology

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1

NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee

CompTIA FC0-U51. CompTIA IT Fundamentals.

Industrial Appliances Control Using Android Mobile & Bluetooth Technology

Connecting to the future ELATEC RFID SYSTEMS

Chapter 12. Network Organization and Architecture

Special Course in Computer Science: Local Networks. Lecture

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

A SURVEY ON NEAR FIELD COMMUNICATION IN MOBILE PHONES & PDAS

GOOGLE WALLET. Hardik Mangukiya ABSTRACT INDIA

WIRELESS SENSOR NETWORK

The mobile phone is the key

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

Networks: Communicating and Sharing Resources

Internet of Things (IoT)

Wireless? What? Why? How?

Transcription:

COMPARATIVE STUDY OF NFC, BLUETOOTH, RFID AND IrDA Akshay Sharma 1, Ameya Ambekar 2, Pavan Dahale 3, Priyansh Bendre 4, Prasad Halgaonkar 5 1,2,3,4,5 Computer Engineering Department MIT College of Engineering, Pune India ABSTRACT: NFC holds the potential of eliminating the requirement of setting up high-cost and complex IT infrastructure for solutions and services. It provides flexible and secure environment for easy access and development through lightweight portable devices. In NFC, a small amount of information stored in the tag is used to authenticate a device. The goal of this paper is twofold. First in this paper we trying to compare various wireless data transfer technology standards. And Secondly this paper further gives details about the benefits of using NFC over other mediums for secure authentication. Keywords: NFC, Bluetooth, BLE, Infrared, RFID [1] INTRODUCTION This paper is based on the comparative study of various wireless data transfer technologies, which are available easily on multiple platforms and are being used in our day-to-day life. These technologies include NFC, RFID, Bluetooth and Infrared. By Comparing these technologies we will try to conclude the technology which fits the best for authentication, ease of use, system requirements and is cost effective. Currently a new way of interaction approach by NFC technology, which is touching paradigm, has been in question. This interaction can be identified as "the deliberate bringing together of two devices, for the purpose of obtaining services". NFC as one of the enablers for ubiquitous computing is a combination of contactless identification and interconnection technologies which requires bringing two NFC compatible devices close to each other, essentially touching them. In accordance with, user first interacts with a smart object (either an NFC tag, NFC reader, or another NFC enabled mobile phone) using her NFC enabled mobile phone (in short: NFC mobile). After touching occurs, NFC mobile may further make use of received data, or may alternatively use provided mobile services such as opening a web page, making a web service connection etc. In this paper we will compare various aspects of these technologies and study their implementation, working and field of use in depth so as to get a clear understanding about the areas of implementation and better decision making in selection of these technologies for future use. 1

COMPARATIVE STUDY OF NFC, BLUETOOTH, RFID AND IrDA [2] NFC Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.57 in) [1] of each other. NFC-enabled devices can act as electronic identity documents and keycards. NFC offers a low-speed connection with simple setup that can be used to bootstrap more capable wireless connections. In an NFC model two devices are involved in the communication, which are called initiator and target. Initiator is an active NFC device which is responsible for starting the communication. [2.1] WORKING NFC uses an inductive coupling technique comparable to the transformer principle i.e. the magnetic nearfield of two conductor coils is used to pair the initiator (Polling) device and target (Listener) device. In this pairing of the coils of initiator and target, a passive listening device also affects the active polling device. A variation in the impedance of the listening device results in an amplitude or phase changes to the antenna voltage of the polling device, detected by the polling device. Fig 1: NFC Data transmission[2] [2.2] OPERATING MODES IN NFC Fig 2.: General Block diagram of NFC tag[3] Active and Passive are the two operating modes of NFC. In active mode, both the initiator and the target generate the RF signal on which the data is carried. In passive mode, RF signal is generated only by the initiator, and target communicates back to the initiator using a technique called load modulation. NFC uses two types of coding mechanism to transfer data, they are Manchester and Miller coding. In addition to the two operating modes, there are three operating modes for device communication. These three modes depend on the application. [4] 2.2.1. Reader/Writer Mode of operation the application transfers data in NFC forum defined message format. In this mode the NFC enabled mobile phone can perform read/write operation on NFC tags. In Reader Mode, NFC initiator reads data from the NFC tag where as in the writer mode, initiator writes data in to the tag. It should be noted that Reader/Writer mode of communication is not secure. 2

2.2.2. Card Emulation Mode In card emulation mode, the NFC enabled mobile device acts as a contactless smart card. The examples of smart card are debit card, credit card, access cards etc. Data transfer in this mode is highly secure. Card Emulation Mode is used regularly in the form of Android Pay and Apply Pay in USA. Card emulation mode is faster and much more secure than using a card with magnetic strip for transactions. 2.2.3. Peer to peer mode supports link level communication. It supports two NFC enabled device to exchange information such as a text message, contact record or data of any other kind. NFCIP-1 and LLCP are the two standardized options in peer to peer mode. This mode of communication is secure. [2.3] NFC SECURITY The Major threats to NFC s security can be categorized as Eavesdropping, Data corruption, Data modification, Imposter attacks(man in the middle). These attacks allow the attacker to breach the security aspect and manipulate the NFC transfer environment according to his will. 2.3.1 Eavesdropping is a common threat found in all wireless communication technologies. NFC is also a wireless communication interface between two entities. They use RF signals to communicate, so any equipment with an antenna in the range can receive the signal. The attacker can extract the information from the signal transmitted through experimentation and periodic analysis processes. This is very dangerous in the case of money payments, where the users use some secret password; the eavesdropper acquires this information and can misuse it. It is very difficult to prevent eaves dropping as the attacker who uses a very precise antenna can receive the signal even if the signal strength is too weak. The only solution to eavesdropping is to use a secure channel for communication. 2.3.2. Data Corruption and Manipulation : In NFC, data is sent from sender to receiver wirelessly. There are some specific formats for data to be sent, so that the receiver accepts and decodes it. The data which is not in the correct format is rejected. Data corruption and manipulation attack arises when an attacker in between corrupts or manipulates the data. The attacker may change the data format or change the contents in it, so that the data becomes useless or gets rejected as it reaches the receiver. For some coding schemes this attack is possible. The solution for this attack is to use a secure channel between the communicating parties. 2.3.3. Man in the middle attack is one step further to data corruption and manipulation attack. In this attack a third party intercepts the communication between two parties. The attacker acts as a relay between the sender and receiver and forwards data. The attacker can corrupt, alter, or discard the data being sent. Man in the middle attack is very difficult to achieve in NFC links and so it is not common. The solution for this attack is to use active-passive communication mode. [5] Fig 3. Man in the Middle attack[6] Though NFC faces these security issues but due to the physical device s access and the range of NFC tags make them practically really difficult to pull off and this makes NFC the most secure platform for authentication compared to RFID, Bluetooth and Infrared. 3

COMPARATIVE STUDY OF NFC, BLUETOOTH, RFID AND IrDA [3] BLUETOOTH Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves) from fixed and mobile devices, and building personal area networks (PANs). Invented by telecom vendor Ericsson in 1994. [3.1] WORKING OF BLUETOOTH The Bluetooth standard, like WiFi, uses the FHSS technique (Frequency-Hopping Spread Spectrum), which involves splitting the frequency band of 2.402-2.480 GHz into 79 channels (called hops) each 1MHz wide, then transmitting the signal using a sequence of channels known to both the sending and receiving stations. The Bluetooth standard is based upon a master/slave operational mode. The term "piconet" is used to refer to the network formed by one device and all devices found within its range. Up to 10 piconets can coexist within a single coverage area. A master can be simultaneously connected to as many as 7 active slave devices. Devices in a piconet have maximum of 8 devices. Bluetooth enables two piconets to be linked to one another in order to form a wider network, called a "scatternet". [7] [3.2] TYPICAL BLUETOOTH CONNECTION Establishing a connection between two Bluetooth devices: 1. Passive mode 2. Inquiry: Finding access points 3. Paging: Synchronizing with access points 4. Access point service discovery 5. Creating a channel with access point 6. Pairing using PIN (security) 7. Using the network [3.3] SMART DEVICES WITH BLUETOOTH Bluetooth low energy (BLE) which works on Bluetooth 4.0 is designed to be more intelligent (hence: Bluetooth Smart) about managing those connections, especially when it comes to conserving energy. As of press time, the Apple MacBook Air, Mac Mini desktop, Motorola Droid RAZR and the Apple iphone 4S.Some Bluetooth Smart peripherals include the MotoACTV fitness tracker and music player, as well as an exercise heart-rate monitor. The Bluetooth SIG expects nearly every new smartphone and notebook shipping this year to include a Smart Ready radio. more than 30,000 companies innovate thousands of products with Bluetooth functionality each year, with more than 8.2 billion Bluetooth products in use. Bluetooth 1.0 can link devices within a radius of about 33 feet. Bluetooth 2.0,within a radius of about 100 feet. Bluetooth 4.0 has a theoretical range of up to 200 feet. The Bluetooth specification stipulates a minimum range of 33 feet, but the maximum range is determined only by the output power of the device. [8] [4] RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object. [4.1] WORKING OF RFID 4

In a basic RFID system, tags are attached to all items that are to be tracked. These tags are made from a tiny tag-chip, sometimes called an integrated circuit (IC), that is connected to an antenna that can be built into many different kinds of tags including apparel hang tags, labels, and security tags, as well as a wide variety of industrial asset tags. The tag chip contains memory which stores the product's electronic product code (EPC) and other variable information so that it can be read and tracked by RFID readers anywhere.[9] An RFID reader is a network connected device (fixed or mobile) with an antenna that sends power as well as data and commands to the tags. The RFID reader acts like an access point for RFID tagged items so that the tags' data can be made available to business applicationsz 1. Electronic Lock/Electronic key for RFID based lock 2. RFID antenna for vehicular access control 3. Hospitals and healthcare 4. Libraries 5. Museums RFID in the form of tickets used for transit will demand 800 million tags in 2016. The tagging of animals (such as pigs, sheep and pets) is substantial as it continues to be a legal requirement in many more territories, with 420 million tags being used for this sector in 2016. In total, IDTechEx expects that 8.9 billion tags will be sold in 2015 and 10.4 billion in 2016.[10] Fig 5. General Block of RFID tag [11] [4.2] TYPES OF RFID TAGS AND RANGE Low Frequency (LF) Passive RFID Tags -read distance of 30 cm (1 foot) or less - usually 10 cm (4 inches) High Frequency (HF) Passive RFID Tags - maximum read distance of 1.5 meters (4 foot 11 inches) Ultra High Frequency (UHF) Passive RFID Tags - minimum read distance of over 1 meter or 3 feet. Ultra High Frequency Active RFID Tags - up to 500 meter read range (1,500 feet) Super High Frequency Active RFID Tags - up to 100 meter read range (325 feet) [5] IrDA IrDA (Infrared Data Association) is an industry standard for wireless communication with infrared light. Many laptops sold today are equipped with an IrDA-compatible transceiver that enables communication with other devices, such as printers, modems, LANs, or other laptops. The transfer speed ranges from 2400 bps to 5

COMPARATIVE STUDY OF NFC, BLUETOOTH, RFID AND IrDA 4 Mbps. There are two IrDA operation modes. The standard mode, SIR, accesses the infrared port through a serial interface. This mode works on almost all systems and is sufficient for most requirements. The faster mode, FIR, requires a special driver for the IrDA chip. Not all chip types are supported in FIR mode because of a lack of appropriate drivers. Set the desired IrDA mode in the BIOS of your computer. The BIOS also shows which serial interface is used in SIR mode. [5.1] WORKING OF IRDA IR Sensors work by using a specific light sensor to detect a select light wavelength in the Infra-Red (IR) spectrum. By using an LED which produces light at the same wavelength as what the sensor is looking for, you can look at the intensity of the received light.[12] The distance an infrared signal can travel varies. but is usually less than 50 feet for household electronics. Typically it is upto 1m. It is most commonly used in Television and air-conditioner remote controls and is actively used in thermographic cameras and other LOS (line of sight) data transfer devices. [6] COMPARISONS We will try to compare the discussed technologies with respect to some important aspects to deduce the functionalities and imply the field of usage and other criteria s for a technology. [6.1] RANGE The devices need different operating ranges for different functionalities. Using a long ranged communication protocol everywhere is not feasible, optimal or secure. Fig 6.Practical working ranges Bluetooth 4.0 has a theoretical range of 200 feet whereas NFC can theoretically work only in the proximity of 10cm. Comparing the ranges of these technologies in the form of charts. We can easily configure and select what kind of channel we need to use in our system. [6.2] SPEED OF TRANSFER Transfer speeds of these technologies vary immensely because of the final application domain of these technologies require diverse and optimal speeds. Transfer speeds in ideal conditions - Bluetooth: 25mbps 6

RFID: 424kbps IrDA: 115kbps NFC: 424kbps (work going on in 1mbps sector) [6.3] COST Cost is the most important factor for selecting a particular technology over another because of its widespread usage and cost effectiveness in different environments. Generally NFC tag s cost range from 40-50INR. RFID tags cost very similar to the NFC tags which is 20-30INR. Bluetooth and infrared are active devices and need energy so the cost of operation and system cost is comparatively higher than NFC and RFID systems. The cost for Bluetooth ranges from 350-500INR and cost of IrDA 100-150INR is around. [7] CONCLUSION Fig 7. Cost Comparison of technologies The importance and scope of NFC has increased tremendously in the past few years. It is being used for many new field of application, which were not even considered in the spectrum of NFC in the past. NFC has reached the point where the future developments have started taking shape in the form of cardless payments, data transfer, smart applications and so on. 7

COMPARATIVE STUDY OF NFC, BLUETOOTH, RFID AND IrDA We can now conclude with facts that NFC is the best option for authentication purposes as it consumes phenomenally less power than any other transfer mechanism and is much more secure and abstract in initiation of any data transfer. NFC s small range, cheap investment, low system requirements and support from major manufacturers all work in favor in NFC s deployment in the fields where optimal and secure authentication with low power requirements are the priority. [8] ACKNOWLEDGEMENTS The authors are extremely thankful to Prof. R. Bedi and MIT College of Engineering, Pune for their invaluable time and suggestions towards the market survey for improvement of this paper. [9] REFERENCES [1]Wikipedia, Near Field Communications, https://en.wikipedia.org/wiki/near_field_communication, 13 th March 2017 [2,3] Stephen Ming, Introduction to NFC, 2007, University of Hemington [4] Anusha Rahul, NFC Technology a Survey, 2015, IJCI [5] Gareema Jain, NFC: Limits and Future scope, 2015, IJCTA [6] Mauro Conti, Nicola Dragoni, Viktor Lesyk, Survey of Man in the Middle Attacks, IEEE 1555-877X, 2016, IEEE 8

[7] Roger M Whitekar, Leigh Hodge, Imrich Chalamtec, Scatternet: A Survey, 2014, Elsevier. [8] Range of Bluetooth http://www.tutorialreports.com/wireless/bluetooth/architecture.php, 201 [9] IMPINJ, http://www.impinj.com/resources/about-rfid/how-do-rfid-systems-work/, 2013 [10] IMPINJ, Wikipedia, http://www.impinj.com/resources/about-rfid/how-do-rfid-systems-work/, 2013 [11] Wikipedia, Infra-Red, https://en.wikipedia.org/wiki/infrared, 2017 [12] Ahmed Ali, Assessment and Comparison of Commonly used Wireless Technologies from Mobile payment Systems Perspective, IJSEA, 2014 9