Journal Press India®

Near Field Communication: A Review

Vol 1 , Issue 2 , April - June 2013 | Pages: 32-35 | Research Paper  

https://doi.org/10.51976/ijari.121308

| | |


Author Details ( * ) denotes Corresponding author

1. * Navneet Verma, Department of Electronics and Communications, Shri Venkateshwara University, Gajraula, Uttar Pradesh, India (navneetverma.cet@gmail.com)

The current state of the consumer electronics can be characterized by moving from a single purpose device to multifunctional devices and by moving from an isolated device to networked devices. In this last respect, it is important that people do not face the complexities of setting up network connections between devices. Cumbersome network settings can possibly be dealt with in the computer world but certainly not in the consumer electronics world.

Keywords

Near Field Communication; NFCIP-1 Wireless Devices; Faster Protocols; Bluetooth; Wireless Ethernet; PDA

  1. About nfc. (2012). Retrieved from http://www.nfc-forum.org/aboutnfc/
  2. Coskun, V., Ok, K., & Ozdenizci, B. (2012). , Near field communication from theory to practice [Kindle PC app]. Retrieved from Amazon.com
  3. Definition of: Rfid. (2012). Retrieved from http://www.pcmag.com/encyclopedia_term/0,2542,t=RFID&i=50512,00.asp
  4. Thangham, C. (2007, October 31). World’s smallest and thinnest rfid tag is powder made by hitachi. Retrieved from http://digitaljournal.com/article/244321/World_s_smallest_and_thinnest_RFID_tag_is_powder_made_by_Hitachi
  5. Rfid tag characteristics. (2012). Retrieved from http://www.zebra.com/id/zebra/na/en/index/rfid/faqs/rfid_tag_characteristics.html
  6. Iso/iec 18092:2004. (n.d.) Retrieved from http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=38578
  7. Planck, S. (2011, August 11). Nfc tag everything, respect nothing. nfc tag prices coming down to a sub 5 cent price point. Retrieved from http://www.nfcrumors.com/08-12-2011/nfc-tag-everything-respect-nothing-nfc-tag-prices-coming-down-to-a-sub-5-cent-price-point/
  8. Wang, J. (2012, December 21). Transforming business with mobile payments Retrieved from http://www.entrepreneur.com/article/222459
  9. Duprey, R. (2011, December 27). Wall Street’s best hidden stocks Retrieved from http://www.fool.com/investing/general/2011/12/27/wall-streets-best-hidden-stocks.aspx
  10. Nxpinvestors relations. (2012). Retrieved from http://investors.nxp.com/phoenix.zhtml?c=209114&p=irol-IRHome
  11. Identiveinvestors relations. (2012, April 23). Retrieved from http://www.identive-group.com/en/index.php?option=com_content&view=article&id=66&Itemid=89
  12. Nxpi. (2012). http://seekingalpha.com/symbol/ nxpi?source=search_general&s=nxpi
  13. NFC Forum: www.nfc-forum.org
  14. NFC World: www.nfcworld.com
  15. NFC Nokia: http://europe.nokia.com/nfc
  16. Office of the Information and Privacy Commissioner (IPC) of Ontario, Canada: www.ipc.on.ca
  17. Privacy by Design (PhD): www.PrivacybyDesign.ca
  18. Chris Foresman, “Near Field Communications: a technology primer,” ArsTechnica (February2011), at: http://arstechnica.com/gad gets/guides/2011 /02/near-field-communications-a-technology-primer.ars
  19. B. Joan, (n.d.). “Difference Between RFID and NFC,” Difference Between. Retrieved 2011, at www.differencebetween.net/technology/ difference-between-rfid-and-nfc/
  20. Harley Geiger, Center for Democracy and Trust, NFC Phones Raise Opportunities, Privacy and Security Issues (2011), at: www.cdt.org/blogs/ Harley-geiger/nfc-phones-raise-opportunities-privacyand-security-issues
  21. Attacking NFC Mobile Phones,” 2008 at: www.mulliner.org/nfc/feed/collin_mulliner_eusecwest08attacking_nfc_phones.pdf
  22. Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones,” International Conference on Availability, Reliability and Security, IEEE Computer Society, 2009, at www.mulliner.org/collin/academic/publications/vulnanalysisattacksnfcmobilephones_mulliner_2009.pdf
  23. Christian Kantner, Josef Langer, Gerald Madlmayr, Josef Scharinger, “NFC Devices: Securityand Privacy,” The Third International Conference on Availability, Reliability and Security, IEEE Computer Society, 2008, at:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4529403
  24. Dr. Marnix Dekker and Dr. Giles Hogben, European Network and Information Security Agency (ENISA),
  25. Appstore security: 5 lines of defense against malware (2011), at: www.enisa.europa.eu/act/ application-ecurity/smartphone-security-1/appst ore-security-5-lines-of-defenceagainst-malware
  26. Smart phones: Information security risks, opportunities and recommendations for users (2010), at www.enisa.europa.eu/act/it/oar/ smartphones-information-security-risks-opportunitiesand-recommendations-for-users
Abstract Views: 1
PDF Views: 172

Advanced Search

News/Events

Indira School of Bus...

Indira School of Mangement Studies PGDM, Pune Organizing Internatio...

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.