Downloads: 129 | Views: 276
Comparative Studies | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.9 / 10
Wireless Communication through Near Field & its Security
Vikas Nivrutti Dhakane, Gaurav Mahavir Phade, Sachin Dadaso Pandhare
Abstract: This paper gives a complete idea about near field communication & analysis of security with respect to NFC. Near Field Communications (NFC) is a short-range wireless technology that allows mobile devices to actively interact with passive physical objects and other active mobile devices, connecting the physical world to mobile services in ways that empower and benefit users. We will also be using the term Tap n Go because it clearly conveys a visual image in which this technology is intended to be used. Near field communication is a set of principles for smart phones and alike devices to establish radio communication with each other by connecting them together or bringing them into compatibility which are usually not more than a few centimeters apart. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. This paper highlights the capabilities of near field communication and its potential to enhance everyday lives. It further describes how the NFC Forum works to drive NFC standardization and encourage its adoption in the market. . NFC allows for contextual application invocation (CAI) the execution of code on the phone as a result of our environment. NFC builds upon Radio-Frequency Identification (RFID) and contactless smartcard technologies that enable stored data to be actively read at a distance. RFID is a powerful enabling technology that is being applied in an astonishing range of applications and uses, from supply chain management and product inventory control to identity authentication and access control.
Keywords: CAI Contextual Application Invocation, NFC Near Field Communication, protocol, network, Radio-Frequency Identification RFID, NDEF NFC Data Exchange Format
Edition: Volume 3 Issue 12, December 2014
Pages: 1184 - 1187
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Downloads: 90 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K