logo

Working Method and Security Considerations of RFID and NFC

   

Added on  2023-06-04

4 Pages971 Words368 Views
 | 
 | 
 | 
Running head: WIRELESS NETWORKING TECHNOLOGIES
Wireless Networking Technologies
Name of the Student
Name of the University
Author Note
Working Method and Security Considerations of RFID and NFC_1

1WIRELESS NETWORKING TECHNOLOGIES
Working Method of RFID and NFC:
The RFID is a digital technology stand for radio-frequency identification (Liu et al.,
2016). This technology is mainly used for the verification purpose which is similar to NFC
but used for different purpose. The RFID system is able to identify objectives automatically,
can collect the data about the identified object and can store this data to the database without
any type of human interaction (Oliveira et al., 2015). To identify the objectives the RFID uses
the radio waves same as the NFC. A basic RFID device consists of three parts which are
RFID tag, RFID reader and an antenna. The RFID tag consists of an antenna and an
integrated circuit. This RFID tag transmits a radio signal to the RFID reader, then the
transmitted signals converted into another form of data which is analysed in a computer
system for the verification purpose.
The NFC is another way of communication which stands for Near Field
Communication. This is basically a short range communication method which wirelessly
communicates through the radio waves. This NFC uses electromagnetic induction for the
communication which is an older method of communication used in the RFID (Hu et al.,
2018). For this type of communication, the devices may need to adhere. The NFC has total
three type of operation method for the communication. The first is peer-to-peer, the second
one is the read and writes mode and the third one is the card emulation. The peer-to-peer
operation is mostly used in the smartphone for the exchanging random information. The read
and write operation is one-way remission of data used for reading the data form other
devices. The NFC device can be used as a credit card which is contactless for making
payment in the case of card emulation operation. RFID and NFC both are used for
communicating with other devices but the purpose of the communication is different while
Working Method and Security Considerations of RFID and NFC_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents