Radio Frequency Identification (RFID) and Near Field Communication (NFC) Technologies: A Comprehensive Overview

Verified

Added on  2024/07/01

|6
|2032
|482
AI Summary
This document provides a comprehensive overview of Radio Frequency Identification (RFID) and Near Field Communication (NFC) technologies. It delves into the fundamental principles, components, and applications of RFID, including passive, active, and semi-passive tags, RFID readers, and security aspects. The document also explores NFC technology, its working principles, modes of operation, and security considerations. It highlights the similarities and differences between RFID and NFC, providing real-world examples of their applications. The document concludes by discussing the challenges and future directions of these technologies.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Que1:
In the Radio Frequency Identification processes, the radio waves are used to maintain the

frequency from different sources. With the help of Radio frequency identification (RFID)

technique, the objects are recorded in the system. It maintains records of tracked resources in

the system. Some parts of the RFID are determined in the system and they are:

1.
RFID tags: This system is connected with the resources through which data is
analyzed. Several applications use this feature like it is seen at the library where all

books are collected, supermarkets where all the items are recorded and many others. It

is also visible at animals and birds in the sanctuaries where tracking is required for

maintaining security. The amount of data mentioned on the tags is visible in the form

of reading, captured and interacted resources. Some other tools are given below:

Transponder: It is used in maintaining the signals by sending and receiving the
feedbacks of the signal.

Integrated Circuit: It helps in maintaining the information for collecting and storing
purpose.

The tags are classified into two different forms:

1.
Passive Tags: It is helpful in maintaining the energy through RFID and it doesn’t
maintain external power to use the RFID readers.

2.
Active Tags: It maintains a battery by which services are activated if it covers the
range of the reader.

3.
Semi-Passive Tags: It is used to provide transmission of signals using the RFID
reader services and uses features of own power supply.
(Hsu, Chen & Kang, 2008)
RFID Readers: These types of readers are useful in binding transceivers with multiple forms

of radio waves. It activates its facilities when the object is maintained in the range of the

reader. After this, the tag maintains the signal to transmit it’s information to the readers.

Some components of the RFID system are:

Signal Detector: It helps in maintaining the information and acknowledge about the feedback

signals from RFID tags.

RF Signal Generator: With the use of antennas the developed radio waves are transmitted.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Microcontroller: It helps in maintaining the data which is shared with the help of Tags.
This RFID tag is connected to the computer system in a simple manner. It is important to

know that the range of RFID reader is generated when tags are initialized and data is received

in the tags. This information is controlled in the computer systems with the help of

microcontrollers. The information about the current scenario is maintained with the help

information systems.

Security aspects for RFID tags are described as:

Replay Attacks: By this attack, data is manipulated by the attacker when originated data is

moving towards the receiver and send the appropriate feedback about the data.

Eavesdropping: This attack is possible only when the attacker access unauthorized user

information that is stored with the help of tags.

Physical Attacks: The attacker manipulates the information when it physically gets in touch

with RFID tags with the help of an object.

Spoofing: By using this scheme, attacker send the information with the help of alternative

tags and that tags are not original ones.

Near Field Communication (NFC): This technique is determined as a wireless

communication technique. The communications between NFC devices are possible when

they are close to one another and it provides radio waves to process data. By using, two forms

of devices at least one of the devices is maintained in its active form and the other one helps

to listen about it but it doesn’t generate radio waves. The information about the system is

shared with the help of smartphones.

2Reader/Writer mode: In the system, the information is similar to RFID. It makes use of

active devices and passive devices. By using electromagnetic induction data is read or writes

with the help of the information tag. For reading the information radio waves are generated in

active form.
(Yang, 2010)
Example: Smartphones are used to get information in NFC tags.

4.
Card Emulation mode: In this mode, the category of devices is very similar and they
both are inactive form. The mode of reading/write data also resembles the operating

systems.
Document Page
Example: In the network mobile phones are used to make payments. If it is required to
use both smartphones and other devices as payment mode then smartphones act as a

passive smart card and don’t allow evaluating the radio waves on their own. But it

makes a reply to the payments.

Security mode in NFC:

Data corruption: In this, the attacker alters the information which moves from source

to destination. It makes a false move in sending the information after corruption.

Viruses: Different viruses are maintained in mobile phones which provide data

leakage facility in the network.

Eavesdropping: It is very same as RFID eavesdropping that is maintained in NFC

modes. In this, an unauthorized user accesses the data resources in the system. It

keeps accessing the unauthenticated data.
(Park, Kwak, Kim, Won & Kim, 2006)
Document Page
Que2:
a.
Each laptop doesn’t maintain a valid connection with one another. These devices
send a request to different access points. This request moves forward to the

switches and response is achieved to multiple access points with the help of

particular device i.e. a laptop. The network is accessed with a good strength and

the devices performed well in the network. The energy is efficient to set access

points in the network.

b.
The network maintains different access points in the frequency bands. Different
people in the network mostly use a frequency band of 2.4GHz and due to this

bandwidth is maintained in the system. If access points are not maintained close to

the current network then there is no difference in selecting the channel. If data is

maintained on the same channel then accessing of resources is shared in the

network. If this form of bandwidth is used in the systems by one of them then the

complete bandwidth of this channel is maintained in two equal half of available

bandwidth. Various network accessing channels are performed a good aspect in

the system.

If bandwidth is not shared in the available bandwidth range then data is used to

other channels. In US 11 channels are used for 2.4 GHz and the channels are

overlapping on one another. In this, three channels are mentioned that don’t

intersect and they are 1,6,11. If in a case when channel 6 is used then 1 and 11

channels having the large bandwidth accessing points in the network. The channel

is maintaining signal ratio or better demonstrating the aspects of the verified

bandwidth ratio and each form of data is modified in the signal demonstration

tool. This made reliability to switched networks in the current channel.

In a high accessing points area there are so many access points for which different

channels like 1,6 and 11 are accessed. It is required to select a channel in the

system that maintains a weak signal amount. The access points perform this

functionality automatically in the network and choose the quietest options like

1,6,11. Most of the times the system works in a good manner but it is not always

supported. If the router is maintained on the ground floor and the gaming systems

maintained in the above floor. It is seen that router is maintained across the second

floor and it performs channel 1functioning. This accessing is not maintained in the

system because the router is performed functioning in weak signals and other

neighbor routers are in the strong signal network.
(Alkeem, Yeun & Baek, 2014)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
It is decided to choose a network which is best and appropriate. It is easy to
download Wi-Fi Analyzer in the android phones and tablets. Check the strength of

the signal with any router settings and maintains the systems in the computer

network. The channel is suited in the best case for attaining location areas. When

accessing network points are reset then scanning is performed in the best way. So

a new demonstration is maintained from time to time and channel is changed.

(Park, 2012)

It is required to maintain access points in different signals. The used channels are

maintaining the strength in the routers. It is easy to demonstrate the channel in the

mid channels like 3 or 9. If channel 3 is used to process. Then the access point

maintains 100% of the energy requirement in the first channel, about 10% ratio in

network channel 1 and 10% energy aspect in channel 6. Then a good performance

is maintained in the system. It is expected to set the router settings in default mode

1,6,11.

To maintain best accessing in the channel performance. There are access points in

the channel i.e. 3 or 9 and don’t maintain other accessing in the channel. The

channels are accessed through the simple network where each dataset is

demonstrated and maintains a good performance ratio. And every channel is

routed in the access points of the network area.

c.
The errors are occurred between the clients and the access points and network
issue arise in the system like network security keys are mismatched and the client

is unable to forward the request to the server. Each accessing of the channel is

performed in the channel and routers manage the signal strength efficiently.
(Lee,
Bang & Park, 2012)
Document Page
References
Hsu, C., Chen, Y., & Kang, H. (2008). Performance-Effective and Low-Complexity
Redundant Reader Detection in Wireless RFID Networks.
EURASIP Journal On Wireless
Communications And Networking
, 2008(1), 604747. doi: 10.1155/2008/604747
Yang, M. (2010). Controlled Delegation Protocol in Mobile RFID Networks. EURASIP
Journal On Wireless Communications And Networking
, 2010(1), 170150. doi:
10.1155/2010/170150

Park, N., Kwak, J., Kim, S., Won, D., & Kim, H. (2006). WIPI Mobile Platform with
Secure Service for Mobile RFID Network Environment.
Lecture Notes In Computer
Science
, 741-748. doi: 10.1007/11610496_100
Alkeem, E., Yeun, C., & Baek, J. (2014). Secure NFC Authentication Protocol Based on
LTE Network.
Lecture Notes In Electrical Engineering, 363-371. doi: 10.1007/978-3-
642-41671-2_46

Lee, J., Bang, H., & Park, N. (2012). Design of Mobile NFC Extension Protocol for
Various Ubiquitous Sensor Network Environments.
Computer Science And Its
Applications
, 715-722. doi: 10.1007/978-94-007-5699-1_73
Park, N. (2012). Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration
in U-Sensor Network Era.
Lecture Notes In Electrical Engineering, 265-271. doi:
10.1007/978-94-007-5083-8_33

Li, Y., Zhu, H., Gu, H., Dai, H., Fang, Z., Weadock, N. J., ... & Hu, L. (2013). Strong
transparent magnetic nanopaper prepared by immobilization of Fe3O4 nanoparticles in a

nanofibrillated cellulose network.
Journal of Materials Chemistry A, 1(48), 15278-15283.
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]