logo

Working of RFID and NFC: Current Security Considerations and Challenges

4 Pages662 Words401 Views
   

Added on  2023-06-04

About This Document

This article discusses the working of RFID and NFC technologies, their security challenges, and considerations. It explains the unauthorized reading, falsification of content, and attacks in the back end system. The article provides insights into the current security challenges and considerations of RFID and NFC.

Working of RFID and NFC: Current Security Considerations and Challenges

   Added on 2023-06-04

ShareRelated Documents
Running head: Wireless
Wireless
Name of the Student
Name of the University
Author’s Note
Working of RFID and NFC: Current Security Considerations and Challenges_1
2
Wireless
Working of RFID and NFC
Radio Frequency Identification and Near Field Communication have been two global
wireless communication technologies that have been providing various opportunities in the
development in the communication (Hu et al., 2018). Both technologies have been providing
one-way communication and helps in communicating without a direct line of sight. RFID have
been three components including Tag, Antenna and Reader. RFID has been working on low
frequency range of 125-134 kHz band, high frequency range of 13.56 MHz band and Ultra high
frequency range of 856-960 MHz band. RFID systems can be active with its own power source
broadcasting up to 100 meters and ideal for location (rama mohan Reddy & Reddy, 2018). It has
been passive with no power source and powered by reader by reading range from near contact to
25 meters.
NFC has been developed for enabling secure mobile payments and limited to singular
and close proximity interactions. This technology have enabled devices for both Android and
Windows supported. NFC works at frequency of 13.56 MHz same s RFID. However, NFC has
been able of two way communication used for complex interactions including peer-to-to peer
connection.
Current security considerations and challenges
Various security challenges have been faced by both technologies in the market. Some of
these are discussed below:
Unauthorized reading: NFC devices are vulnerable to unauthorized reading of data and
information stored by NFC radio interface. This treat has been high level as it deals with the
mobile payments including credit card information.
Working of RFID and NFC: Current Security Considerations and Challenges_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Smartphone NFC Technology Security and Issues Literature Review 2022
|11
|3952
|106

Reconfigurable RFID Antennas and Applications
|5
|3515
|443

WIRELSS TECHNOLOGIES [BY NAME] [INSTITUIONAL AFFLIATION] [DATE].
|12
|398
|384

Working Method and Security Considerations of RFID and NFC
|4
|971
|368

Ethical issues associated with various technologies Article 2022
|5
|677
|30