Near-field communication (NFC) is a set of protocols that allow communication between two electronic devices. Most commonly this technology is used for communication between portable devices like smartphones. Even though it is a contact less system of communication, it requires that the devices are within 4 cm or 1.57-inch distance from each other (Carter & Faulkner, 2015). Basically, this technology relies on creating a low speed connection between the devices which has a very simple set up procedure. It has found application in a vast variety of applications, ranging from contact less payment from credit and debit cards as well as the smartphone based payment techniques, to the social networking applications and now has worked …show more content…
The operation of NFC-enabled phones for data transmission is quite simple and basic. For example, in its card emulation mode, the protocol defines that the device should transmit a unique ID to the communicating device, at the least. To add to it further, there is also a defined NFC Data Exchange Format (NDEF) which can be used in data transmission, particularly for documents, images, MIME type information, etc. (NFC Forum, 2014). There is yet another protocol added, known as the Simple NDEF Exchange Protocol or SNEP, which further facilitates the transmission of messages between any two devices (macnn, 2011).
All the above-mentioned protocols are defined by the NFC forum. However, there are some protocols defined by the GSMA forum as well, which are commonly known as the GSMA NFC standards. These are applicable particularly to the smartphone devices and include facilities like trusted Services Manager, Single Wire Protocol and elements to increase security (GSMA, 2012).
Eavesdropping …show more content…
In this, the unauthorized hacker, intercepts the transmission signal between the sender and receiver of the information and relay them such signals so that they both feel they are interacting with each other (Rouse, n.d.). Such an attack is very commonly used to bypass the cryptographic protocols that might be put in place to maintain data security. Eavesdropping as outlined above is an example of MITM attack. In such cases, even though the two parties communicating believe that they are talking with each other, the entire conversation or transmission of data is controlled by the unauthorized hacker. In certain cases, this is a highly simple process, for instance, in public Wi Fi networks, which are unencrypted, a hacker can easily initiate an MITM attack (Rouse,