Features of information protection in NFC
DOI 10.31673/2412-9070.2018.042529
Abstract
At present, the implementation of wireless technologies in various applications is being observed. They replace advanced technologies and make communication between devices more convenient and easy for the user. Near Filed Communication (NFC) is evolving with technologies such as Wi-Fi, Wi-MAX. This technology is designed to transmit information over short distances. NFC technology is used on mobile devices. It is a logical continuation of RFID technologies (Radio Frequency Identification). NFC supports RFID standards ISO 14443 / mifare, Feli Ca as well as ISO / IEC 18092. Devices can operate in both active and passive modes. The passive mode operates according to the same principles as the non-contact RFID card. This mode increases the autonomy of the portable device and allows you to use the NFC technology even when the power is off. NFC can be used in all cases where contactless cards are used, and card standard compliance allows the use of existing infrastructure. For example, mobile purchase of tickets in public transport is an extension of the existing non-contact infrastructure; mobile payments — the device acts as a payment card; Electronic Board — A mobile phone is used to read RFID tags, from outdoor bulletin boards to get information on the go. Also, other NFC applications in the future may include: Identity; traveler's card; mobile trade; electronic money; electronic purchase of tickets (air tickets, concert tickets, and others); electronic keys — car keys, home / office keys, hotel room keys, etc. There are variants of cryptography that are used in the labels. The scope of the labels is examined on specific examples using the NFC Prestigio PKR1 keychain. The problem of protection of information is studied and ways of its solution are proposed. It is proposed to expand the scope of application of NFC, introducing it into various telecommunication systems.
Keywords: NFC technology; NFC tag; RFID technology; QR code; modulation; protocol; interface; cryptography; NFC mobile device; Wi-Fi technology.
References
1. Билайн. Бесконтактные платежи: приложи телефон к турникету — и ты в метро! URL: http://habrahabr.ru/company/beeline/blog/128564/.
2. i-Free. СКУД - NFC и контроль доступа. URL: http://nfc-services.ru/products/skud.
3. Tesa. Технология NFC в электронных замках TESA. URL: http://www.tesa.ru/news/132.
4. Голышко А. Мобильная лавка // Мобильные телекоммуникации. 2011. С. 26–31.
5. Олифер В. Г., Олифер Н. А. Компьютерные сети. Принципы, технологии, протоколы. СПб: Питер, 2006.
6. Потресов С. Билайн: мобильный проездной. URL: http://www.mobile-review.com/articles/2012/bee-nfc-metro.shtml.
7. A Sophisticated RFID Application on Multi-Factor Authentication / J. C. Liou а. о. // Information Technology: New Generations (ITNG), 2011 Eighth International Conference on. IEEE, 2011. С. 180–185.
8. Haselsteiner E., Breitfuss K. Security in near field communication (NFC) // Workshop on RFID Security RFIDSec. 2006.
9. http://nfcukraine.com/
10. http://www.i-free.com/