ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Wireless Communication through Near Field&its Security

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)

Publication Date:

Authors : ; ; ;

Page : 1184-1187

Keywords : CAI Contextual Application Invocation; NFC Near Field Communication; protocol; network; Radio-Frequency Identification RFID; NDEF NFC Data Exchange Format;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper gives a complete idea about near field communication& analysis of security with respect to NFC. Near Field Communications (NFC) is a short-range wireless technology that allows mobile devices to actively interact with passive physical objects and other active mobile devices, connecting the physical world to mobile services in ways that empower and benefit users. We will also be using the term Tap n Go because it clearly conveys a visual image in which this technology is intended to be used. Near field communication is a set of principles for smart phones and alike devices to establish radio communication with each other by connecting them together or bringing them into compatibility which are usually not more than a few centimeters apart. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. This paper highlights the capabilities of near field communication and its potential to enhance everyday lives. It further describes how the NFC Forum works to drive NFC standardization and encourage its adoption in the market. . NFC allows for contextual application invocation (CAI) the execution of code on the phone as a result of our environment. NFC builds upon Radio-Frequency Identification (RFID) and contactless smartcard technologies that enable stored data to be actively read at a distance. RFID is a powerful enabling technology that is being applied in an astonishing range of applications and uses, from supply chain management and product inventory control to identity authentication and access control.

Last modified: 2021-06-30 21:15:01