Radio Frequency Identification (RFID) and Near Field Communication (NFC) Technologies: A Comprehensive Overview
VerifiedAdded on 2024/07/01
|6
|2032
|482
AI Summary
This document provides a comprehensive overview of Radio Frequency Identification (RFID) and Near Field Communication (NFC) technologies. It delves into the fundamental principles, components, and applications of RFID, including passive, active, and semi-passive tags, RFID readers, and security aspects. The document also explores NFC technology, its working principles, modes of operation, and security considerations. It highlights the similarities and differences between RFID and NFC, providing real-world examples of their applications. The document concludes by discussing the challenges and future directions of these technologies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Que1:
In the Radio Frequency Identification processes, the radio waves are used to maintain the
frequency from different sources. With the help of Radio frequency identification (RFID)
technique, the objects are recorded in the system. It maintains records of tracked resources in
the system. Some parts of the RFID are determined in the system and they are:
1. RFID tags: This system is connected with the resources through which data is
analyzed. Several applications use this feature like it is seen at the library where all
books are collected, supermarkets where all the items are recorded and many others. It
is also visible at animals and birds in the sanctuaries where tracking is required for
maintaining security. The amount of data mentioned on the tags is visible in the form
of reading, captured and interacted resources. Some other tools are given below:
Transponder: It is used in maintaining the signals by sending and receiving the
feedbacks of the signal.
Integrated Circuit: It helps in maintaining the information for collecting and storing
purpose.
The tags are classified into two different forms:
1. Passive Tags: It is helpful in maintaining the energy through RFID and it doesn’t
maintain external power to use the RFID readers.
2. Active Tags: It maintains a battery by which services are activated if it covers the
range of the reader.
3. Semi-Passive Tags: It is used to provide transmission of signals using the RFID
reader services and uses features of own power supply. (Hsu, Chen & Kang, 2008)
RFID Readers: These types of readers are useful in binding transceivers with multiple forms
of radio waves. It activates its facilities when the object is maintained in the range of the
reader. After this, the tag maintains the signal to transmit it’s information to the readers.
Some components of the RFID system are:
Signal Detector: It helps in maintaining the information and acknowledge about the feedback
signals from RFID tags.
RF Signal Generator: With the use of antennas the developed radio waves are transmitted.
In the Radio Frequency Identification processes, the radio waves are used to maintain the
frequency from different sources. With the help of Radio frequency identification (RFID)
technique, the objects are recorded in the system. It maintains records of tracked resources in
the system. Some parts of the RFID are determined in the system and they are:
1. RFID tags: This system is connected with the resources through which data is
analyzed. Several applications use this feature like it is seen at the library where all
books are collected, supermarkets where all the items are recorded and many others. It
is also visible at animals and birds in the sanctuaries where tracking is required for
maintaining security. The amount of data mentioned on the tags is visible in the form
of reading, captured and interacted resources. Some other tools are given below:
Transponder: It is used in maintaining the signals by sending and receiving the
feedbacks of the signal.
Integrated Circuit: It helps in maintaining the information for collecting and storing
purpose.
The tags are classified into two different forms:
1. Passive Tags: It is helpful in maintaining the energy through RFID and it doesn’t
maintain external power to use the RFID readers.
2. Active Tags: It maintains a battery by which services are activated if it covers the
range of the reader.
3. Semi-Passive Tags: It is used to provide transmission of signals using the RFID
reader services and uses features of own power supply. (Hsu, Chen & Kang, 2008)
RFID Readers: These types of readers are useful in binding transceivers with multiple forms
of radio waves. It activates its facilities when the object is maintained in the range of the
reader. After this, the tag maintains the signal to transmit it’s information to the readers.
Some components of the RFID system are:
Signal Detector: It helps in maintaining the information and acknowledge about the feedback
signals from RFID tags.
RF Signal Generator: With the use of antennas the developed radio waves are transmitted.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Microcontroller: It helps in maintaining the data which is shared with the help of Tags.
This RFID tag is connected to the computer system in a simple manner. It is important to
know that the range of RFID reader is generated when tags are initialized and data is received
in the tags. This information is controlled in the computer systems with the help of
microcontrollers. The information about the current scenario is maintained with the help
information systems.
Security aspects for RFID tags are described as:
Replay Attacks: By this attack, data is manipulated by the attacker when originated data is
moving towards the receiver and send the appropriate feedback about the data.
Eavesdropping: This attack is possible only when the attacker access unauthorized user
information that is stored with the help of tags.
Physical Attacks: The attacker manipulates the information when it physically gets in touch
with RFID tags with the help of an object.
Spoofing: By using this scheme, attacker send the information with the help of alternative
tags and that tags are not original ones.
Near Field Communication (NFC): This technique is determined as a wireless
communication technique. The communications between NFC devices are possible when
they are close to one another and it provides radio waves to process data. By using, two forms
of devices at least one of the devices is maintained in its active form and the other one helps
to listen about it but it doesn’t generate radio waves. The information about the system is
shared with the help of smartphones.
2Reader/Writer mode: In the system, the information is similar to RFID. It makes use of
active devices and passive devices. By using electromagnetic induction data is read or writes
with the help of the information tag. For reading the information radio waves are generated in
active form. (Yang, 2010)
Example: Smartphones are used to get information in NFC tags.
4. Card Emulation mode: In this mode, the category of devices is very similar and they
both are inactive form. The mode of reading/write data also resembles the operating
systems.
This RFID tag is connected to the computer system in a simple manner. It is important to
know that the range of RFID reader is generated when tags are initialized and data is received
in the tags. This information is controlled in the computer systems with the help of
microcontrollers. The information about the current scenario is maintained with the help
information systems.
Security aspects for RFID tags are described as:
Replay Attacks: By this attack, data is manipulated by the attacker when originated data is
moving towards the receiver and send the appropriate feedback about the data.
Eavesdropping: This attack is possible only when the attacker access unauthorized user
information that is stored with the help of tags.
Physical Attacks: The attacker manipulates the information when it physically gets in touch
with RFID tags with the help of an object.
Spoofing: By using this scheme, attacker send the information with the help of alternative
tags and that tags are not original ones.
Near Field Communication (NFC): This technique is determined as a wireless
communication technique. The communications between NFC devices are possible when
they are close to one another and it provides radio waves to process data. By using, two forms
of devices at least one of the devices is maintained in its active form and the other one helps
to listen about it but it doesn’t generate radio waves. The information about the system is
shared with the help of smartphones.
2Reader/Writer mode: In the system, the information is similar to RFID. It makes use of
active devices and passive devices. By using electromagnetic induction data is read or writes
with the help of the information tag. For reading the information radio waves are generated in
active form. (Yang, 2010)
Example: Smartphones are used to get information in NFC tags.
4. Card Emulation mode: In this mode, the category of devices is very similar and they
both are inactive form. The mode of reading/write data also resembles the operating
systems.
Example: In the network mobile phones are used to make payments. If it is required to
use both smartphones and other devices as payment mode then smartphones act as a
passive smart card and don’t allow evaluating the radio waves on their own. But it
makes a reply to the payments.
Security mode in NFC:
Data corruption: In this, the attacker alters the information which moves from source
to destination. It makes a false move in sending the information after corruption.
Viruses: Different viruses are maintained in mobile phones which provide data
leakage facility in the network.
Eavesdropping: It is very same as RFID eavesdropping that is maintained in NFC
modes. In this, an unauthorized user accesses the data resources in the system. It
keeps accessing the unauthenticated data. (Park, Kwak, Kim, Won & Kim, 2006)
use both smartphones and other devices as payment mode then smartphones act as a
passive smart card and don’t allow evaluating the radio waves on their own. But it
makes a reply to the payments.
Security mode in NFC:
Data corruption: In this, the attacker alters the information which moves from source
to destination. It makes a false move in sending the information after corruption.
Viruses: Different viruses are maintained in mobile phones which provide data
leakage facility in the network.
Eavesdropping: It is very same as RFID eavesdropping that is maintained in NFC
modes. In this, an unauthorized user accesses the data resources in the system. It
keeps accessing the unauthenticated data. (Park, Kwak, Kim, Won & Kim, 2006)
Que2:
a. Each laptop doesn’t maintain a valid connection with one another. These devices
send a request to different access points. This request moves forward to the
switches and response is achieved to multiple access points with the help of
particular device i.e. a laptop. The network is accessed with a good strength and
the devices performed well in the network. The energy is efficient to set access
points in the network.
b. The network maintains different access points in the frequency bands. Different
people in the network mostly use a frequency band of 2.4GHz and due to this
bandwidth is maintained in the system. If access points are not maintained close to
the current network then there is no difference in selecting the channel. If data is
maintained on the same channel then accessing of resources is shared in the
network. If this form of bandwidth is used in the systems by one of them then the
complete bandwidth of this channel is maintained in two equal half of available
bandwidth. Various network accessing channels are performed a good aspect in
the system.
If bandwidth is not shared in the available bandwidth range then data is used to
other channels. In US 11 channels are used for 2.4 GHz and the channels are
overlapping on one another. In this, three channels are mentioned that don’t
intersect and they are 1,6,11. If in a case when channel 6 is used then 1 and 11
channels having the large bandwidth accessing points in the network. The channel
is maintaining signal ratio or better demonstrating the aspects of the verified
bandwidth ratio and each form of data is modified in the signal demonstration
tool. This made reliability to switched networks in the current channel.
In a high accessing points area there are so many access points for which different
channels like 1,6 and 11 are accessed. It is required to select a channel in the
system that maintains a weak signal amount. The access points perform this
functionality automatically in the network and choose the quietest options like
1,6,11. Most of the times the system works in a good manner but it is not always
supported. If the router is maintained on the ground floor and the gaming systems
maintained in the above floor. It is seen that router is maintained across the second
floor and it performs channel 1functioning. This accessing is not maintained in the
system because the router is performed functioning in weak signals and other
neighbor routers are in the strong signal network. (Alkeem, Yeun & Baek, 2014)
a. Each laptop doesn’t maintain a valid connection with one another. These devices
send a request to different access points. This request moves forward to the
switches and response is achieved to multiple access points with the help of
particular device i.e. a laptop. The network is accessed with a good strength and
the devices performed well in the network. The energy is efficient to set access
points in the network.
b. The network maintains different access points in the frequency bands. Different
people in the network mostly use a frequency band of 2.4GHz and due to this
bandwidth is maintained in the system. If access points are not maintained close to
the current network then there is no difference in selecting the channel. If data is
maintained on the same channel then accessing of resources is shared in the
network. If this form of bandwidth is used in the systems by one of them then the
complete bandwidth of this channel is maintained in two equal half of available
bandwidth. Various network accessing channels are performed a good aspect in
the system.
If bandwidth is not shared in the available bandwidth range then data is used to
other channels. In US 11 channels are used for 2.4 GHz and the channels are
overlapping on one another. In this, three channels are mentioned that don’t
intersect and they are 1,6,11. If in a case when channel 6 is used then 1 and 11
channels having the large bandwidth accessing points in the network. The channel
is maintaining signal ratio or better demonstrating the aspects of the verified
bandwidth ratio and each form of data is modified in the signal demonstration
tool. This made reliability to switched networks in the current channel.
In a high accessing points area there are so many access points for which different
channels like 1,6 and 11 are accessed. It is required to select a channel in the
system that maintains a weak signal amount. The access points perform this
functionality automatically in the network and choose the quietest options like
1,6,11. Most of the times the system works in a good manner but it is not always
supported. If the router is maintained on the ground floor and the gaming systems
maintained in the above floor. It is seen that router is maintained across the second
floor and it performs channel 1functioning. This accessing is not maintained in the
system because the router is performed functioning in weak signals and other
neighbor routers are in the strong signal network. (Alkeem, Yeun & Baek, 2014)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
It is decided to choose a network which is best and appropriate. It is easy to
download Wi-Fi Analyzer in the android phones and tablets. Check the strength of
the signal with any router settings and maintains the systems in the computer
network. The channel is suited in the best case for attaining location areas. When
accessing network points are reset then scanning is performed in the best way. So
a new demonstration is maintained from time to time and channel is changed.
(Park, 2012)
It is required to maintain access points in different signals. The used channels are
maintaining the strength in the routers. It is easy to demonstrate the channel in the
mid channels like 3 or 9. If channel 3 is used to process. Then the access point
maintains 100% of the energy requirement in the first channel, about 10% ratio in
network channel 1 and 10% energy aspect in channel 6. Then a good performance
is maintained in the system. It is expected to set the router settings in default mode
1,6,11.
To maintain best accessing in the channel performance. There are access points in
the channel i.e. 3 or 9 and don’t maintain other accessing in the channel. The
channels are accessed through the simple network where each dataset is
demonstrated and maintains a good performance ratio. And every channel is
routed in the access points of the network area.
c. The errors are occurred between the clients and the access points and network
issue arise in the system like network security keys are mismatched and the client
is unable to forward the request to the server. Each accessing of the channel is
performed in the channel and routers manage the signal strength efficiently. (Lee,
Bang & Park, 2012)
download Wi-Fi Analyzer in the android phones and tablets. Check the strength of
the signal with any router settings and maintains the systems in the computer
network. The channel is suited in the best case for attaining location areas. When
accessing network points are reset then scanning is performed in the best way. So
a new demonstration is maintained from time to time and channel is changed.
(Park, 2012)
It is required to maintain access points in different signals. The used channels are
maintaining the strength in the routers. It is easy to demonstrate the channel in the
mid channels like 3 or 9. If channel 3 is used to process. Then the access point
maintains 100% of the energy requirement in the first channel, about 10% ratio in
network channel 1 and 10% energy aspect in channel 6. Then a good performance
is maintained in the system. It is expected to set the router settings in default mode
1,6,11.
To maintain best accessing in the channel performance. There are access points in
the channel i.e. 3 or 9 and don’t maintain other accessing in the channel. The
channels are accessed through the simple network where each dataset is
demonstrated and maintains a good performance ratio. And every channel is
routed in the access points of the network area.
c. The errors are occurred between the clients and the access points and network
issue arise in the system like network security keys are mismatched and the client
is unable to forward the request to the server. Each accessing of the channel is
performed in the channel and routers manage the signal strength efficiently. (Lee,
Bang & Park, 2012)
References
Hsu, C., Chen, Y., & Kang, H. (2008). Performance-Effective and Low-Complexity
Redundant Reader Detection in Wireless RFID Networks. EURASIP Journal On Wireless
Communications And Networking, 2008(1), 604747. doi: 10.1155/2008/604747
Yang, M. (2010). Controlled Delegation Protocol in Mobile RFID Networks. EURASIP
Journal On Wireless Communications And Networking, 2010(1), 170150. doi:
10.1155/2010/170150
Park, N., Kwak, J., Kim, S., Won, D., & Kim, H. (2006). WIPI Mobile Platform with
Secure Service for Mobile RFID Network Environment. Lecture Notes In Computer
Science, 741-748. doi: 10.1007/11610496_100
Alkeem, E., Yeun, C., & Baek, J. (2014). Secure NFC Authentication Protocol Based on
LTE Network. Lecture Notes In Electrical Engineering, 363-371. doi: 10.1007/978-3-
642-41671-2_46
Lee, J., Bang, H., & Park, N. (2012). Design of Mobile NFC Extension Protocol for
Various Ubiquitous Sensor Network Environments. Computer Science And Its
Applications, 715-722. doi: 10.1007/978-94-007-5699-1_73
Park, N. (2012). Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration
in U-Sensor Network Era. Lecture Notes In Electrical Engineering, 265-271. doi:
10.1007/978-94-007-5083-8_33
Li, Y., Zhu, H., Gu, H., Dai, H., Fang, Z., Weadock, N. J., ... & Hu, L. (2013). Strong
transparent magnetic nanopaper prepared by immobilization of Fe3O4 nanoparticles in a
nanofibrillated cellulose network. Journal of Materials Chemistry A, 1(48), 15278-15283.
Hsu, C., Chen, Y., & Kang, H. (2008). Performance-Effective and Low-Complexity
Redundant Reader Detection in Wireless RFID Networks. EURASIP Journal On Wireless
Communications And Networking, 2008(1), 604747. doi: 10.1155/2008/604747
Yang, M. (2010). Controlled Delegation Protocol in Mobile RFID Networks. EURASIP
Journal On Wireless Communications And Networking, 2010(1), 170150. doi:
10.1155/2010/170150
Park, N., Kwak, J., Kim, S., Won, D., & Kim, H. (2006). WIPI Mobile Platform with
Secure Service for Mobile RFID Network Environment. Lecture Notes In Computer
Science, 741-748. doi: 10.1007/11610496_100
Alkeem, E., Yeun, C., & Baek, J. (2014). Secure NFC Authentication Protocol Based on
LTE Network. Lecture Notes In Electrical Engineering, 363-371. doi: 10.1007/978-3-
642-41671-2_46
Lee, J., Bang, H., & Park, N. (2012). Design of Mobile NFC Extension Protocol for
Various Ubiquitous Sensor Network Environments. Computer Science And Its
Applications, 715-722. doi: 10.1007/978-94-007-5699-1_73
Park, N. (2012). Mobile RFID/NFC Linkage Based on UHF/HF Dual Band’s Integration
in U-Sensor Network Era. Lecture Notes In Electrical Engineering, 265-271. doi:
10.1007/978-94-007-5083-8_33
Li, Y., Zhu, H., Gu, H., Dai, H., Fang, Z., Weadock, N. J., ... & Hu, L. (2013). Strong
transparent magnetic nanopaper prepared by immobilization of Fe3O4 nanoparticles in a
nanofibrillated cellulose network. Journal of Materials Chemistry A, 1(48), 15278-15283.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.