Analysis of NFC Security, Wireless Networking Concepts and Ping Test

Verified

Added on  2023/06/10

|7
|1157
|119
Report
AI Summary
This report provides a comprehensive analysis of wireless networking concepts, with a specific focus on Near Field Communication (NFC) technology, its security vulnerabilities, and network configuration. It begins by explaining NFC's functionality, its modes of operation, and its reliance on RFID technology. The report then delves into the security challenges associated with NFC, including eavesdropping, data corruption, interception attacks, and theft risks, and proposes mitigation strategies such as secure communication channels and encryption. Furthermore, the document includes a practical analysis of wireless network configuration, including the use of ping tests to verify network connectivity, the impact of channel changes on access points, and the importance of matching passphrases for secure access. The report concludes by emphasizing the need for robust security measures to protect against potential breaches in NFC-enabled devices and wireless networks. Desklib provides this document along with numerous other solved assignments and resources for students.
Document Page
Running head: WIRELESS NETWORKING CONCEPTS
Wireless Networking Concepts
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
WIRELESS NETWORKING CONCEPTS
Part A: Comparative Analysis
Answer to Question 1:
NFC is used for short distance communication between two devices embedded with
NFC sensor. A tag is included in the NFC device with small transmitter that can be used for
transmitting information to the nearby device without any own source of power. NFC works
similarly with Bluetooth or Wi-Fi and other wireless signals. It uses the radio waves as the
medium for transition of the data but it needs to meet some specification for communicating
with the other device. The NFC operates on the RFID technology that utilizes an
electromagnetic induction for transmitting information (Chew et al., 2015). The NFC does
not need any power source, it can be turned on from the near electromagnetic field. 1356 Mhz
frequency is used by the NFC for transmitting the data at a speed of 106212 or 424 Kb per
second. This is quick for the transmission of music, picture and contact details. There are
three modes of operation for the NFC devices and mostly the peer to peer mode is used in the
smart phones for exchanging the information. The device that sends data is set as active while
the device receiving data is set as passive (Park, Ahn & Lee, 2017). There is also read write
mode is also used for transmission of data where the tag on the receiver device is used for
linking up with the receiver device. The NFC device can also be used as a smart card in the
car emulation mode and used as a contactless credit card for making payment or tapping into
different systems.
There are different security challenges and considerations associated with the NFC
technology and it should be mitigated for the management of the security breaches. There is a
risk of Eavesdropping because the third party does not needs to gain the access of each of the
single signal for gathering the private information. For the prevention of the eavesdropping
the secure communication channel should be used and the information should be encrypted
Document Page
2
WIRELESS NETWORKING CONCEPTS
before sending to the receiver (Prodanoff et al., 2016). There is a security challenge that the
data transmitted can be corrupted or manipulated due to interference or any criminal activity.
The NFC technology is also vulnerable to the interception attacks where a middle man can
get the access of the information transferred from two of the devices and for the prevention of
this attack an active pairing should be used and a secure communication link should be used
for the transmission of the data packets (Orozco et al., 2014). There is also risk of
interception and theft attacks that are similar with the interception attack and it needs to be
mitigated for keeping the information safe.
Answer to Question 2:
Document Page
3
WIRELESS NETWORKING CONCEPTS
a. Ping Test
For communicating with the laptop connected with the wireless network the interface
of the laptop should be changed to wireless and it is connected with the wireless access point
using the SSID and the passphrase. The laptops are assigned with a static IP address and the
gateway of the access point for communicating the laptops connected with the other access
point in the network. The laptops communicate with the gateway and communicate with the
switch.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
WIRELESS NETWORKING CONCEPTS
b. When the channel of any one of the access point is changed it does not affect the network
the only difference is that if two nearby router uses the same channel it can cause interference
and the signal becomes weak for the neighbour router.
c. If there is a mismatch of the passphrase between the access point and the client then then
the wireless access point should not allow the laptop to connect with the access point for
sending and receiving the data packets in the network.
Document Page
5
WIRELESS NETWORKING CONCEPTS
Bibliography
Chew, C. B., Mahinderjit-Singh, M., Wei, K. C., Sheng, T. W., Husin, M. H., & Malim, N.
H. A. H. (2015). Sensors-enabled smart attendance systems using NFC and RFID
technologies. Int. J. New Comput. Archit. Appl, 5, 19-29.
Orozco, J., Chavira, G., Castro, I., Bolaños, J. F., Sánchez, R. A., & Cantú, J. F. (2014).
Towards NFC and RFID Combination to Automatic Services. International Journal
of Engineering, 4(8), 8269.
Park, C. W., Ahn, J. H., & Lee, T. J. (2017). Fast object identification with mode switching
for coexistence of NFC and RFID. Transactions on Emerging Telecommunications
Technologies, 28(2), e2939.
Prodanoff, Z. G., Jones, E. L., Chi, H., Elfayoumy, S., & Cummings, C. (2016). Survey of
Security Challenges in NFC and RFID for E-Health Applications. International
Journal of E-Health and Medical Communications (IJEHMC), 7(2), 1-13.
Sekiguchi, T., Okano, Y., Ohmura, N., & Ogino, S. (2015, August). Study on effective
pattern of magnetic sheet attached on NFC antenna. In Radio-Frequency Integration
Technology (RFIT), 2015 IEEE International Symposium on (pp. 208-210). IEEE.
Sekiguchi, T., Okano, Y., Ohmura, N., & Ogino, S. (2015, November). A study on the
effective pattern of magnetic sheet considering their characteristics attached on NFC
antenna. In Antennas and Propagation (ISAP), 2015 International Symposium (pp. 1-
4). IEEE.
Wahab, M. H. A., Suhaimi, N. F. M., Mohsin, M. F. M., Mustapha, A., Samsudin, N. A., &
Ambar, R. (2018, June). NFC-based Data Retrieval Device. In Journal of Physics:
Conference Series (Vol. 1019, No. 1, p. 012084). IOP Publishing.
Document Page
6
WIRELESS NETWORKING CONCEPTS
Wu, C. C., Hsu, C. W., & Cheng, R. S. (2018, April). The digital signature technology for
access control system of mobile. In 2018 IEEE International Conference on Applied
System Invention (ICASI) (pp. 896-898). IEEE.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]