Explore chapters and articles related to this topic
Role of IoT and Sensors in Achieving Sustainability
Published in Sherin Zafar, Mohd Abdul Ahad, M. Afshar Alam, Kashish Ara Shakil, Green Automation for Sustainable Environment, 2020
Deepak Kumar Sharma, Shikha Brahmachari, Ishaan Srivastav
Near-field communication (NFC) belongs to the category of short-range wireless communication enabling transmission of data amongst devices by ensuring the devices are only a few inches apart. It establishes bidirectional transmission of data between devices equipped with NFC.NFC contains a tag consisting of a significant amount of data. This tag is only readable or rewritable, and changes can be made using a specific device. NFC operates in three communication modes: passive, active, and peer-to-peer mode. It supports peer-to-peer network topology. NFC works efficiently to connect, maintain, and control IoT devices installed in smart cities, medical and healthcare, workplace, etc. Smart phones integrated with RFID [12] readers make NFC customer-oriented; 13.56 MHz is the frequency band within which the NFC operates. Duration of bits is dependent on the mode of communication, the data transmission rate, and a divisor which exists for a particular mode and transmission rate.
Smart Cities
Published in Stuart Borlase, Smart Grids, 2018
Stuart Borlase, Mehdi Ganji, Mohammad Shahidehpour, Mark Wells, Jessie Denver, Kip Harkness, Adrienne Grier, Daniel Kushner, Mahsa Nicknam, Dolan Beckel, Eric Lambert, Paul Doherty, Gary Wong, Patrick Burgess
Our current generation of ICT tools and solutions is having the most impact on the average urban citizen in the form of mobile communications and devices. Breaking free of a wired world that forces a person to have to sit in one place to communicate, compute, and manage their lives, the world of smartphones, tablets, Apps, and a series of protocols and standards has been embraced by the market in meaningful and important ways. Urban citizens are emerging as people with a “connected life,” a life that has the expectation that information about everything should be immediate, accurate, and accessible. Free Wi-Fi connections, public transportation and map Apps, and mobile payments are already bars that have been set for cities to even begin to think of themselves as smart. The emerging standard of NFC is one area that is fast enabling an urban connected life to emerge as a standard way of life in a smart city. NFC is a set of standards for mobile devices that establish communication between devices by either touching them together or having them in close proximity to each other. NFC-enabled environments and Apps on mobile devices support mobile payment transactions and seamless data exchange, and create the opportunity to access the cloud as a temporary, wireless, mesh style network. The instant network feature of NFC environments brings a host of opportunity for new style Apps to be used by urban citizens in a smart city.
Location-Based Information
Published in Aaron Steinfeld, Jordana L. Maisel, Edward Steinfeld, Accessible Public Transportation, 2017
Aaron Steinfeld, Anthony Tomasic, Yun Huang, Edward Steinfeld
All of these tag technologies present some security problems because they can become vectors for cyber-tampering. For example, one attack was able to wipe data from certain phones through QR Codes or NFC tags (Musil, 2012). Of these, QR Codes are the most susceptible to tampering since they can be masked and replaced by a simple sticker. This easy attack vector, combined with issues associated with weather and damage, suggest implementers should focus on NFC and RFID solutions. NFC tags are much less expensive than RFID tags and can be read by many modern phones. NFC is becoming the standard for phone-based payment in transit settings and a number of phones have built-in NFC (e.g., most new Apple and Android phones). It is quite reasonable to envision a future where (a) a blind user swipes their phone over an NFC or RFID tag at a bus stop and is told the stop’s name and which bus will be arriving soon and then (b) swipes again when boarding the bus and told payment has been accepted and their balance. Payment with NFC already exists in some U.S. cities and a precursor RFID system for the blind that links real-time arrival information and when to get off is already on the market (PAVIP, 2009).
Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges
Published in IETE Technical Review, 2018
Bhagya Nathali Silva, Murad Khan, Kijun Han
NFC is a set of communication protocols used to communicate between two devices within the range of 10 cm [29]. In general, one device is portable for the purpose of getting the appropriate proximity. Full NFC-enabled device can read information stored in passive NFC tags, exchange information between two NFC-enabled devices and act as a smart card to perform transactions. Thus, it can be stated that NFC acts as an identification and communication technology [32]. Bluetooth is a technology that uses short wavelength radio signals to communicate among devices in a narrow proximity while reducing the power consumption [30]. Bluetooth works according to the master–slave architecture, and is primarily designed for low power consumption. The communication range varies with the propagation conditions, antenna configuration, battery conditions, etc.
Supporting People with Visual Impairments in Cultural Heritage: Survey and Future Research Directions
Published in International Journal of Human–Computer Interaction, 2022
Stella Sylaiou, Christos Fidas
Garrido et al. (2012) present an application developed to help blind or visually impaired people to move around different rooms in a museum (Baena Olive-Grove and Olive Oil Museum) and obtain information through audio, about the objects that surround them by touching them with their NFC mobile device. NFC is described as a combination of contactless identification and interconnection technologies that enable secure short-range communications between electronic devices. This instance or research is indicative of the often blurred line between monomodal audio aids focusing on exhibits, with those approaches primarily facilitating free movement in museum spaces.
Efficient Key Generation Techniques for Securing IoT Communication Protocols
Published in IETE Technical Review, 2021
Amol K. Boke, Sangeeta Nakhate, Arvind Rajawat
The association comprising of companies which deal with near field communication (called NFC Forum) launched this short-range communication protocol naming it NFC at around 2002. NFC was inspired by the RFID technology, as it also contains the NFC tags which communicate to each other over electromagnetic fields at frequency 13.56 MHz at the range of about 10 cm [10, 11]. NFC is widely used for mobile payments and in cards for payments at POS. As the technology evolved and adapted by more significant areas of society, security threats to the NFC became a more concern factor. Security in NFC can be ensured with physical proximity. Old NFC standard is susceptible to attacks like, eavesdropping, data modification, and data insertion. To overcome these concerns NFC Forum introduced Signature Type Definition (RTD 2.0) in 2015. This describes the ways NFC device can authenticate the data. After this modification, many have tried to further improve the security of NFC standard. Jin et al. [12] have worked on securing the NFS standard by modifying it to SecNFC. In this, they had worked on preventing eavesdropping by using inductive coupling at initiator device such as smartphone and e-ticking reader. Al-Tamimi et al. [13] secured NFC mobile online payments transaction by enhancing the classical EVM exchanged messages and introducing brand new security level Mobile Network Operator (MNO). Transactions are authenticated, authorized, and managed by this MNO level by connecting with its subsystem issuing bank through TLS. Again this method is just a proposal with some experimental data. As a matter of fact, these and many more are all just proposed techniques out in the open but not standardized as RTD 2.0. RTC 2.0 provides the data integrity and origin authentication and fails to provide data confidentiality [7]. Network Layer