Details

Near Field Communication (NFC)


Near Field Communication (NFC)

From Theory to Practice
2. Aufl.

von: Vedat Coskun, Kerem Ok, Busra Ozdenizci

91,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 28.12.2011
ISBN/EAN: 9781119965787
Sprache: englisch
Anzahl Seiten: 390

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab – Istanbul research centre which conducts intense research on NFC technology.</b> <p>In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail.</p> <p>Key Features:</p> <ul> <li>Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis</li> <li>Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives</li> <li>Discusses methods, techniques and modelling support including UML are demonstrated with real cases</li> <li>Contains case studies such as payment, ticketing, social networking and remote shopping</li> </ul> <p>This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.</p>
<b>Preface xv</b> <p><b>Acknowledgments xxiii</b></p> <p><b>List of Acronyms xxv</b></p> <p><b>1 Executive Summary 1</b></p> <p>1.1 Towards NFC Era 2</p> <p><i>1.1.1 Ubiquitous Computing</i> 2</p> <p><i>1.1.2 Mobile Phones</i> 3</p> <p><i>1.1.3 Technological Motivation of NFC</i> 4</p> <p><i>1.1.4 Wireless Communication, RFID, and NFC</i> 4</p> <p>1.2 Evolution of NFC 4</p> <p><i>1.2.1 Earlier Form of RFID: Barcode Technology</i> 4</p> <p><i>1.2.2 RFID Technology</i> 5</p> <p><i>1.2.3 Earlier Form of Smart Cards: Magnetic Stripe Cards</i> 6</p> <p><i>1.2.4 Smart Card Technology</i> 6</p> <p><i>1.2.5 NFC as a New Technology</i> 7</p> <p>1.3 NFC Essentials 7</p> <p><i>1.3.1 Smart NFC Devices</i> 8</p> <p><i>1.3.2 Standardization of NFC Enabled Mobile Phones</i> 8</p> <p><i>1.3.3 General Architecture of NFC Enabled Mobile Phones</i> 10</p> <p><i>1.3.4 Near Field Communication Interface and Protocol (NFCIP)</i> 11</p> <p>1.4 NFC Operating Modes and Essentials 11</p> <p><i>1.4.1 NFC Operating Modes</i> 11</p> <p><i>1.4.2 Reader/Writer Mode Essentials</i> 12</p> <p><i>1.4.3 Peer-to-Peer Mode Essentials</i> 13</p> <p><i>1.4.4 Card Emulation Mode Essentials</i> 13</p> <p><i>1.4.5 Case Studies</i> 13</p> <p>1.5 SE and Its Management 14</p> <p><i>1.5.1 Over-the-Air Technology</i> 15</p> <p><i>1.5.2 GlobalPlatform Card Specification</i> 15</p> <p><i>1.5.3 Trusted Service Manager</i> 16</p> <p><i>1.5.4 UICC Management Models</i> 16</p> <p><i>1.5.5 Multiple SE Environments</i> 16</p> <p>1.6 NFC Application Development 17</p> <p><i>1.6.1 JSR 257</i> 18</p> <p><i>1.6.2 JSR 177</i> 18</p> <p>1.7 NFC Security and Privacy 19</p> <p><i>1.7.1 Why is Security Important?</i> 19</p> <p><i>1.7.2 Primary Goals of Security Measures</i> 20</p> <p><i>1.7.3 Vulnerability, Threat, Attack, and Risk</i> 21</p> <p><i>1.7.4 Security Tools and Mechanisms</i> 21</p> <p><i>1.7.5 NFC Security</i> 22</p> <p><i>1.7.6 Privacy, Legal, and Ethical Aspects</i> 24</p> <p>1.8 NFC Business Ecosystem 25</p> <p><i>1.8.1 Stakeholders in NFC Ecosystem</i> 27</p> <p><i>1.8.2 Understanding NFC Business Models</i> 28</p> <p><i>1.8.3 Business Model Approaches</i> 30</p> <p>1.9 Usability in NFC 30</p> <p>1.10 Benefits of NFC Applications 31</p> <p><i>1.10.1 Future Scenarios on NFC</i> 32</p> <p>1.11 NFC Throughout the World 33</p> <p><i>1.11.1 NFC Cities</i> 33</p> <p><i>1.11.2 NFC Trials and Projects</i> 34</p> <p>1.12 Status of Academic Research on NFC Literature 36</p> <p>1.13 Chapter Summary 39</p> <p>References 39</p> <p><b>2 Towards NFC Era 41</b></p> <p>2.1 Ubiquitous Computing and NFC 41</p> <p><i>2.1.1 Ubiquitous Computing</i> 41</p> <p><i>2.1.2 New Communication Interface Alternative for Mobile Phones: NFC Technology</i> 42</p> <p>2.2 Mobile Phones 43</p> <p><i>2.2.1 Features of a Mobile Phone</i> 44</p> <p><i>2.2.2 Mobile Phone Network</i> 45</p> <p><i>2.2.3 Mobile Phone Architecture</i> 46</p> <p>2.3 Wireless Communication as a Communication Media for NFC Technology 47</p> <p><i>2.3.1 Wireless, Mobile, and Nomadic Communication</i> 48</p> <p><i>2.3.2 Wireless and Mobile Communication Technologies</i> 48</p> <p>2.4 RFID Technology 50</p> <p><i>2.4.1 Earlier Form of RFID: Barcode Technology</i> 51</p> <p><i>2.4.2 Barcodes vs. RFID Tags</i> 53</p> <p><i>2.4.3 Essentials of RFID Technology</i> 53</p> <p><i>2.4.4 RFID Tags as Transponders</i> 54</p> <p><i>2.4.5 RFID Readers</i> 55</p> <p><i>2.4.6 Frequency Ranges</i> 55</p> <p><i>2.4.7 Operating Principles of RFID Technology</i> 55</p> <p><i>2.4.8 Near Field vs. Far Field Transmission</i> 57</p> <p><i>2.4.9 Common RFID Applications Throughout the World</i> 58</p> <p>2.5 Smart Card Technology 58</p> <p><i>2.5.1 Earlier Form of Smart Card: Magnetic Stripe Cards</i> 59</p> <p><i>2.5.2 Evolution of Smart Cards</i> 60</p> <p><i>2.5.3 Types of Smart Cards: Capability Based Classification</i> 60</p> <p><i>2.5.4 Smart Card Operating System (SCOS)</i> 61</p> <p><i>2.5.5 Types of Smart Cards: Mechanism Based Classification</i> 63</p> <p><i>2.5.6 Smart Card Applications</i> 67</p> <p>2.6 Comparison between RFID Tags and Contactless Smart Cards 67</p> <p>2.7 More on NFC 68</p> <p><i>2.7.1 Inherent Security and Pairing Capability of NFC</i> 70</p> <p>2.8 Chapter Summary 70</p> <p>Chapter Questions 71</p> <p>References 71</p> <p><b>3 NFC Essentials 73</b></p> <p>3.1 Introduction to NFC 73</p> <p>3.2 Standardization and Development Efforts of NFC Enabled Mobile Phones 76</p> <p><i>3.2.1 NFC Forum</i> 76</p> <p><i>3.2.2 GlobalPlatform</i> 79</p> <p><i>3.2.3 GSM Association (GSMA)</i> 80</p> <p><i>3.2.4 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC)</i> 80</p> <p><i>3.2.5 ECMA International</i> 81</p> <p><i>3.2.6 ETSI and ETSI Smart Card Platform (ETSI SCP)</i> 81</p> <p><i>3.2.7 Java Community Process (JCP)</i> 81</p> <p><i>3.2.8 Open Mobile Alliance (OMA)</i> 81</p> <p><i>3.2.9 3rd Generation Partnership Project (3GPP)</i> 82</p> <p><i>3.2.10 EMVCo</i> 82</p> <p>3.3 General Architecture of NFC Enabled Mobile Phones 82</p> <p><i>3.3.1 Secure Element</i> 83</p> <p><i>3.3.2 NFC Interface</i> 86</p> <p><i>3.3.3 Interface between SE and NFC Controller</i> 86</p> <p><i>3.3.4 Host Controller and HCI</i> 89</p> <p>3.4 Physical Layer of NFC 92</p> <p><i>3.4.1 ISO/IEC 14443 – Proximity Contactless Smart Card Standard</i> 92</p> <p><i>3.4.2 Near Field Communication Interface and Protocol (NFCIP)</i> 94</p> <p><i>3.4.3 Data Transmission on RF Layer</i> 96</p> <p>3.5 Reader/Writer Operating Mode Essentials 99</p> <p><i>3.5.1 Protocol Stack Architecture of Reader/Writer Mode</i> 100</p> <p><i>3.5.2 NFC Forum Mandated Tag Types</i> 101</p> <p><i>3.5.3 NDEF</i> 102</p> <p>3.6 Peer-to-Peer Operating Mode Essentials 108</p> <p><i>3.6.1 Protocol Stack Architecture of Peer-to-Peer Mode</i> 108</p> <p><i>3.6.2 LLCP</i> 109</p> <p>3.7 Card Emulation Operating Mode Essentials 111</p> <p><i>3.7.1 Protocol Stack Architecture of Card Emulation Mode</i> 111</p> <p>3.8 Chapter Summary 112</p> <p>Chapter Questions 113</p> <p>References 113</p> <p><b>4 NFC Operating Modes 115</b></p> <p>4.1 Mobile Interaction Techniques 115</p> <p><i>4.1.1 NFC Technology Interaction Technique</i> 117</p> <p>4.2 Classification of NFC Devices 118</p> <p><i>4.2.1 Active vs. Passive Devices</i> 118</p> <p><i>4.2.2 Initiator vs. Target Devices</i> 119</p> <p>4.3 Reader/Writer Mode 119</p> <p><i>4.3.1 Smart Poster</i> 120</p> <p><i>4.3.2 Generic Usage Model</i> 121</p> <p><i>4.3.3 Leading Applications</i> 123</p> <p><i>4.3.4 Use Cases on Reader/Writer Mode</i> 125</p> <p><i>4.3.5 Underlying Application Benefits</i> 127</p> <p>4.4 Peer-to-Peer Mode 128</p> <p><i>4.4.1 Generic Usage Model</i> 129</p> <p><i>4.4.2 Leading Applications</i> 129</p> <p><i>4.4.3 Use Cases on Peer-to-Peer Mode</i> 130</p> <p><i>4.4.4 Underlying Application Benefits</i> 131</p> <p>4.5 Card Emulation Mode 131</p> <p><i>4.5.1 Generic Usage Model</i> 132</p> <p><i>4.5.2 Leading Applications</i> 133</p> <p><i>4.5.3 Use Cases on Card Emulation Mode</i> 134</p> <p><i>4.5.4 Underlying Application Benefits</i> 135</p> <p>4.6 Overview on Benefits of Operating Modes 135</p> <p>4.7 Case Studies 136</p> <p><i>4.7.1 Reader/Writer Mode Case Study: NFC Shopping</i> 137</p> <p><i>4.7.2 Peer-to-Peer Mode Case Study: NFC Gossiping</i> 141</p> <p><i>4.7.3 Card Emulation Mode Case Study: NFC Ticketing</i> 142</p> <p>4.8 Chapter Summary 148</p> <p>Chapter Questions 148</p> <p>References 148</p> <p><b>5 Developing NFC Applications 151</b></p> <p>5.1 Initial Steps in NFC Application Development 151</p> <p>5.2 Why Java? 152</p> <p><i>5.2.1 Why did we Choose Java?</i> 152</p> <p><i>5.2.2 Why is Java the Favorite?</i> 153</p> <p>5.3 Setting up the Environment for Java ME and NFC Programming 155</p> <p>5.4 Introduction to Mobile Programing 158</p> <p><i>5.4.1 Java ME Building Blocks</i> 160</p> <p><i>5.4.2 MIDlets</i> 161</p> <p><i>5.4.3 Package javax.microedition.lcdui</i> 164</p> <p><i>5.4.4 Creating a New MIDlet Project</i> 165</p> <p><i>5.4.5 Inside a MIDlet Suite (MIDlet Packaging)</i> 168</p> <p><i>5.4.6 A More Detailed User Interface MIDlet</i> 171</p> <p><i>5.4.7 Push Registry</i> 177</p> <p>5.5 NFC Application Development 179</p> <p>5.6 Reader/Writer Mode Programing 179</p> <p><i>5.6.1 Package javax.microedition.contactless</i> 181</p> <p><i>5.6.2 Package javax.microedition.contactless.ndef</i> 183</p> <p><i>5.6.3 Package javax.microedition.contactless.rf</i> 185</p> <p><i>5.6.4 Package javax.microedition.contactless.sc</i> 185</p> <p><i>5.6.5 A Reader/Writer Mode Application</i> 185</p> <p><i>5.6.6 NFC Push Registry</i> 199</p> <p>5.7 Peer-to-Peer Mode Programing 200</p> <p><i>5.7.1 Package com.nokia.nfc.p2p</i> 200</p> <p><i>5.7.2 Package com.nokia.nfc.llcp</i> 201</p> <p><i>5.7.3 A Peer-to-Peer Mode Application</i> 204</p> <p>5.8 Card Emulation Mode Programing 211</p> <p><i>5.8.1 Accessing Secure Element Using JSR 257</i> 212</p> <p><i>5.8.2 Accessing Secure Element Using JSR 177</i> 212</p> <p>5.9 Reader/Writer Mode Case Study: NFC Shopping 215</p> <p>5.10 Peer-to-Peer Mode Case Study: NFC Gossiping 223</p> <p>5.11 Chapter Summary 236</p> <p>Chapter Questions 238</p> <p>References 239</p> <p><b>6 NFC Security and Privacy 241</b></p> <p>6.1 Security in General 241</p> <p><i>6.1.1 Why is Security Important?</i> 242</p> <p><i>6.1.2 Primary Goals of Security Measures</i> 243</p> <p><i>6.1.3 Vulnerability, Threat, Attack, and Risk</i> 248</p> <p><i>6.1.4 Principles of Security</i> 253</p> <p>6.2 Security Tools and Mechanisms 257</p> <p><i>6.2.1 Cryptography</i> 257</p> <p><i>6.2.2 Symmetric Cryptography</i> 258</p> <p><i>6.2.3 Asymmetric Cryptography</i> 259</p> <p><i>6.2.4 Hashing</i> 261</p> <p><i>6.2.5 Message Authentication Code (MAC) and HMAC</i> 261</p> <p><i>6.2.6 Digital Signature and Mobile Signature</i> 261</p> <p><i>6.2.7 Comparing Security Mechanisms</i> 262</p> <p><i>6.2.8 Digital Certificates and Certificate Authority</i> 263</p> <p><i>6.2.9 Do Not Keep Cryptographic Algorithms Secret</i> 263</p> <p><i>6.2.10 Key Types: Symmetric Key, Private Key, Public Key, Master Key, and Session Key</i> 264</p> <p><i>6.2.11 Key Management and its Importance</i> 264</p> <p><i>6.2.12 WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access)</i> 264</p> <p><i>6.2.13 Other Security Components</i> 264</p> <p>6.3 NFC Security Framework 265</p> <p><i>6.3.1 Security Issues on NFC Tag</i> 266</p> <p><i>6.3.2 Security Issues on NFC Reader</i> 268</p> <p><i>6.3.3 Security Issues on Smart Card</i> 269</p> <p><i>6.3.4 Security Issues on Communication</i> 270</p> <p><i>6.3.5 Middleware and Backend System Security</i> 272</p> <p><i>6.3.6 Standardized NFC Security Protocols</i> 272</p> <p>6.4 Privacy, Legal, and Ethical Aspects 277</p> <p><i>6.4.1 It is a Different World</i> 278</p> <p><i>6.4.2 Some Examples on Privacy Issues</i> 279</p> <p><i>6.4.3 Summary on Privacy and Countermeasures</i> 280</p> <p><i>6.4.4 Some Proposals for Providing Privacy on Tags</i> 280</p> <p><i>6.4.5 What to do for Protecting Privacy</i> 281</p> <p>6.5 Chapter Summary 281</p> <p>Chapter Questions 282</p> <p>References 282</p> <p><b>7 NFC Business Ecosystem 283</b></p> <p>7.1 Business Ecosystem 283</p> <p><i>7.1.1 Generic Features of a Business Ecosystem</i> 285</p> <p><i>7.1.2 Business Ecosystem of NFC</i> 286</p> <p>7.2 Stakeholders in NFC Ecosystem 286</p> <p><i>7.2.1 Standardization Bodies and Other Contributors</i> 287</p> <p><i>7.2.2 NFC Chip Set Manufacturers and Suppliers</i> 288</p> <p><i>7.2.3 Secure Element Manufacturers and Suppliers</i> 288</p> <p><i>7.2.4 Mobile Handset Manufacturers and Suppliers</i> 290</p> <p><i>7.2.5 Reader Manufacturers and Suppliers</i> 290</p> <p><i>7.2.6 Mobile Network Operators</i> 290</p> <p><i>7.2.7 Trusted Service Managers</i> 290</p> <p><i>7.2.8 Service Providers</i> 292</p> <p><i>7.2.9 Merchants/Retailers</i> 293</p> <p><i>7.2.10 Customers</i> 293</p> <p>7.3 Business Models 293</p> <p><i>7.3.1 Key Indicators in NFC Business Models</i> 295</p> <p><i>7.3.2 Business Model Alternatives</i> 297</p> <p><i>7.3.3 General Revenue/Expenditure Flow Model</i> 300</p> <p>7.4 Case Study: NFC Ticketing 301</p> <p>7.5 Additional Reading: Pay-Buy-Mobile Project by GSMA 304</p> <p>7.6 Chapter Summary 308</p> <p>Chapter Questions 309</p> <p>References 309</p> <p><b>8 Secure Element Management 311</b></p> <p>8.1 Introduction to OTA Technology 311</p> <p><i>8.1.1 OTA Technology and Mobile Device Management</i> 312</p> <p><i>8.1.2 OTA Technology and UICC Based SEs</i> 313</p> <p>8.2 GlobalPlatform Specifications 314</p> <p><i>8.2.1 GlobalPlatform Card Specification</i> 314</p> <p><i>8.2.2 GlobalPlatform Messaging Specification</i> 316</p> <p>8.3 Life Cycle Management of SEs 316</p> <p><i>8.3.1 TSM in NFC Environment</i> 317</p> <p><i>8.3.2 Actors and Their Functional Roles in GlobalPlatform</i> 318</p> <p><i>8.3.3 UICC Based SE: Security Domains and Hierarchy</i> 320</p> <p><i>8.3.4 UICC Management Models</i> 320</p> <p>8.4 Multiple SE Environments 325</p> <p><i>8.4.1 Architecture without Aggregation</i> 325</p> <p><i>8.4.2 Architecture with Aggregation</i> 326</p> <p>8.5 Alternative TSM Based OTA Management Model 326</p> <p>8.6 Chapter Summary 328</p> <p>Chapter Questions 329</p> <p>References 329</p> <p><b>9 NFC Cities and Trials 331</b></p> <p>9.1 NFC Cities 331</p> <p><i>9.1.1 City of Oulu</i> 331</p> <p><i>9.1.2 City of Nice</i> 337</p> <p><i>9.1.3 Smart Urban Spaces</i> 339</p> <p>9.2 NFC Trials and Projects 341</p> <p><i>9.2.1 Contactless Payment Trials</i> 341</p> <p><i>9.2.2 Transport and Other Ticketing Trials</i> 345</p> <p><i>9.2.3 Other Trials</i> 347</p> <p>9.3 Chapter Summary 349</p> <p>References 349</p> <p><b>Index 351</b></p>
<p>“While NFC is a very specific and limited protocol, the fact that this book covers all aspects of NFC and how it relates to many other communication methods makes the book very useful to a wide audience and an interesting read.”  (<i>IEEE Microwave Magazine</i>, 1  September 2013)</p> <p> </p>
<b>Dr. Vedat Coskun,</b> <b>Isik University, Turkey</b> Vedat Coskun received his MS degree from Naval Postgraduate School, U.S.A., and PhD degree from Yildiz Technical University both in Computer Science in 1990 and 1998, respectively. <p><b>Kerem Ok,</b> <b>Isik University, Turkey</b> Kerem Ok received his MS degree from Isik University, Turkey and currently studying his PhD degree in Information Technology in Istanbul University.</p> <p><b>Busra Ozdenizci,</b> <b>Isik University, Turkey</b> Busra Ozdenizci received her BS double degree in Information Technology and Business Administration from Isik University, Turkey and currently studying her MS degree in Information Technology in the same University.</p>
This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab – Istanbul research centre which conducts intense research on NFC technology. <p>In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail.</p> <p>This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.</p> <p>Key Features:</p> <ul> <li>Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis</li> <li>Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives</li> <li>Discusses methods, techniques and modelling support including UML are demonstrated with real cases</li> <li>Contains case studies such as payment, ticketing, social networking and remote shopping</li> </ul>

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €
Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
von: Richard W. Middlestead
PDF ebook
171,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €