scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A Survey on Near Field Communication (NFC) Technology

01 Aug 2013-Wireless Personal Communications (Springer US)-Vol. 71, Iss: 3, pp 2259-2294
TL;DR: This paper presents the concept of NFC technology in a holistic approach with different perspectives, including communication essentials with standards, ecosystem and business issues, applications, and security issues.
Abstract: Near Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of people throughout the world that offers diverse services ranging from payment and loyalty applications to access keys for offices and houses. Eventually NFC technology integrates all such services into one single mobile phone. NFC technology has emerged lately, and consequently not much academic source is available yet. On the contrary, due to its promising business case options, there will be an increasing amount of work to be studied in the very close future. This paper presents the concept of NFC technology in a holistic approach with different perspectives, including communication essentials with standards, ecosystem and business issues, applications, and security issues. Open research areas and further recommended studies in terms of academic and business point of view are also explored and discussed at the end of each major subject's subsection. This comprehensive survey will be a valuable guide for researchers and academicians as well as for business world interested in NFC technology.
Citations
More filters
Journal ArticleDOI
TL;DR: This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly.
Abstract: The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications.

1,025 citations

Journal ArticleDOI
12 Jan 2017-Sensors
TL;DR: This paper has presented and compared several low-cost and non-invasive health and activity monitoring systems that were reported in recent years and compatibility of several communication technologies as well as future perspectives and research challenges in remote monitoring systems will be discussed.
Abstract: Life expectancy in most countries has been increasing continually over the several few decades thanks to significant improvements in medicine, public health, as well as personal and environmental hygiene. However, increased life expectancy combined with falling birth rates are expected to engender a large aging demographic in the near future that would impose significant burdens on the socio-economic structure of these countries. Therefore, it is essential to develop cost-effective, easy-to-use systems for the sake of elderly healthcare and well-being. Remote health monitoring, based on non-invasive and wearable sensors, actuators and modern communication and information technologies offers an efficient and cost-effective solution that allows the elderly to continue to live in their comfortable home environment instead of expensive healthcare facilities. These systems will also allow healthcare personnel to monitor important physiological signs of their patients in real time, assess health conditions and provide feedback from distant facilities. In this paper, we have presented and compared several low-cost and non-invasive health and activity monitoring systems that were reported in recent years. A survey on textile-based sensors that can potentially be used in wearable systems is also presented. Finally, compatibility of several communication technologies as well as future perspectives and research challenges in remote monitoring systems will be discussed.

795 citations


Cites methods from "A Survey on Near Field Communicatio..."

  • ...NFC only supports P2P communication between two devices, so it is not appropriate for wearable BSN systems [196,197]....

    [...]

  • ...On the other side, NFC is a low cost, low power wireless technology with a communication range of ~20 cm....

    [...]

  • ...Izumi et al. [36] developed a wearable system that incorporated a near field communication (NFC) module, a three-axis accelerometer, and an ECG processor chip....

    [...]

  • ...There are a few other wireless technologies for short-range communication such as Infrared Data Association (IrDA), Ultra-Wide Band (UWB), Radio Frequency Identification (RFID), Near Field Communication (NFC) and WiFi are also available....

    [...]

  • ...The measurements obtained by the sensors connected in a wireless Body Sensor Network (BSN) [8,12–14] are transmitted to a nearby processing node using a suitable communication protocol, preferably a low-power and short-range wireless medium, for example, Bluetooth [15,16], ZigBee [15,17], ANT [15,18,19] Near Field Communications (NFC) [20,21]....

    [...]

Journal ArticleDOI
TL;DR: A hierarchical architecture of the smart factory was proposed first, and then the key technologies were analyzed from the aspects of the physical resource layer, the network layer, and the data application layer, which showed that the overall equipment effectiveness of the equipment is significantly improved.
Abstract: Due to the current structure of digital factory, it is necessary to build the smart factory to upgrade the manufacturing industry. Smart factory adopts the combination of physical technology and cyber technology and deeply integrates previously independent discrete systems making the involved technologies more complex and precise than they are now. In this paper, a hierarchical architecture of the smart factory was proposed first, and then the key technologies were analyzed from the aspects of the physical resource layer, the network layer, and the data application layer. In addition, we discussed the major issues and potential solutions to key emerging technologies, such as Internet of Things (IoT), big data, and cloud computing, which are embedded in the manufacturing process. Finally, a candy packing line was used to verify the key technologies of smart factory, which showed that the overall equipment effectiveness of the equipment is significantly improved.

736 citations


Cites background from "A Survey on Near Field Communicatio..."

  • ...With the development of RFID, the Near-Field Communication (NFC) has been studied as an access to manufacturing resources [36]....

    [...]

Journal ArticleDOI
TL;DR: This review introduces future innovations and a research agenda for cloud computing supporting the transformation of the volume, velocity, variety and veracity into values of Big Data for local to global digital earth science and applications.
Abstract: Big Data has emerged in the past few years as a new paradigm providing abundant data and opportunities to improve and/or enable research and decision-support applications with unprecedented value for digital earth applications including business, sciences and engineering. At the same time, Big Data presents challenges for digital earth to store, transport, process, mine and serve the data. Cloud computing provides fundamental support to address the challenges with shared computing resources including computing, storage, networking and analytical software; the application of these resources has fostered impressive Big Data advancements. This paper surveys the two frontiers – Big Data and cloud computing – and reviews the advantages and consequences of utilizing cloud computing to tackling Big Data in the digital earth and relevant science domains. From the aspects of a general introduction, sources, challenges, technology status and research opportunities, the following observations are offered: (i...

545 citations

Journal ArticleDOI
TL;DR: Several inspiring use case scenarios of Fog computing are described, several major functionalities that ideal Fog computing platforms should support and a number of open challenges toward implementing them are identified to shed light on future research directions on realizing Fog computing for building sustainable smart cities.
Abstract: The Internet of Things (IoT) aims to connect billions of smart objects to the Internet, which can bring a promising future to smart cities. These objects are expected to generate large amounts of data and send the data to the cloud for further processing, especially for knowledge discovery, in order that appropriate actions can be taken. However, in reality sensing all possible data items captured by a smart object and then sending the complete captured data to the cloud is less useful. Further, such an approach would also lead to resource wastage (e.g., network, storage, etc.). The Fog (Edge) computing paradigm has been proposed to counterpart the weakness by pushing processes of knowledge discovery using data analytics to the edges. However, edge devices have limited computational capabilities. Due to inherited strengths and weaknesses, neither Cloud computing nor Fog computing paradigm addresses these challenges alone. Therefore, both paradigms need to work together in order to build a sustainable IoT infrastructure for smart cities. In this article, we review existing approaches that have been proposed to tackle the challenges in the Fog computing domain. Specifically, we describe several inspiring use case scenarios of Fog computing, identify ten key characteristics and common features of Fog computing, and compare more than 30 existing research efforts in this domain. Based on our review, we further identify several major functionalities that ideal Fog computing platforms should support and a number of open challenges toward implementing them, to shed light on future research directions on realizing Fog computing for building sustainable smart cities.

341 citations

References
More filters
Book
23 May 2003
TL;DR: In this paper, the authors provide a standard reference for people working with RFID technology, including electron data carrier architecture and common algorithms for anticollision, and a detailed appendix providing up-to-date information on relevant ISO standards and regulations, including descriptions of ISO 14443 for contactless ticketing and ISO 15693 covering the smartlabel.
Abstract: RFID (Radio Frequency Identification) is used in all areas of automatic data capture allowing contactless identification of objects using RF. With applications ranging from secure internet payment systems to industrial automation and access control, RFID technology solutions are receiving much attention in the research and development departments of large corporations. RFID is a major growth are in auto ID, allowing emergency vehicles to safely trip traffic signals, and providing the technology behind contactless smart cards, "autopiloting" cars, and production automation. Fully revised and updated to include all the latest information on industry standards and applications, this new edition provides a standard reference for people working with RFID technology.Expanded sections explain exactly how RFID systems work, and provide up-to-date information on the development of new tags such as the smart label. This book provides updated coverage of RFID technologies, including electron data carrier architecture and common algorithms for anticollision. It details the latest RFID applications, such as the smartlabel, e-commerce and the electronic purse, document tracking and e-ticketing. It includes a detailed appendix providing up-to-date information on relevant ISO standards and regulations, including descriptions of ISO 14443 for contactless ticketing and ISO 15693 covering the smartlabel.A leading-edge reference for this rapidly evolving technology, this text is of interest to practitioners in auto ID and IT designing RFID products and end-users of RFID technology, computer and electronics engineers in security system development and microchip designers, automation, industrial and transport engineers and materials handling specialists. It is also a valuable resource for graduate level students in electronics and industrial engineering design.

2,233 citations

Journal ArticleDOI
Mark D. Weiser1
TL;DR: In the long run, the personal computer and the workstation will become practically obsolete because computing access will be everywhere: in the walls, on your wrist, and in 'scrap' computers lying about to be used as needed.
Abstract: The author suggests that, due to the trends of unobtrusive technology and more intrusive information, the next phase of computing technology will develop nonlinearly. He states that, in the long run, the personal computer and the workstation will become practically obsolete because computing access will be everywhere: in the walls, on your wrist, and in 'scrap' computers (i.e., like scrap paper) lying about to be used as needed. The current research on ubiquitous computing is reviewed. >

1,327 citations

BookDOI
18 Jun 2010
TL;DR: The Third Edition of RFID: The Architecture of Electronic Data Carriers focuses on the architecture of Transponders and Contactless SmartCards, as well as security and selection Criteria for RFID Systems, which addresses attacks on RFID systems.
Abstract: Preface to the Third Edition List of Abbreviations 1 Introduction 1.1 Automatic Identification Systems 1.2 A Comparison of Different ID Systems 1.3 Components of an RFID System 2 Differentiation Features of RFID Systems 2.1 Fundamental Differentiation Features 2.2 Transponder Construction Formats 2.3 Frequency, Range and Coupling 2.4 Active and Passive Transponder 2.5 Information Processing in the Transponder 2.6 Selection Criteria for RFID Systems 3 Fundamental Operating Principles 3.1 1-Bit Transponder 3.2 Full- and Half-Duplex Procedure 3.3 Sequential Procedures 3.4 Near-Field Communication (NFC) 4 Physical Principles of RFID Systems 4.1 Magnetic Field 4.2 Electromagnetic Waves 4.3 Surface Waves 5 Frequency Ranges and Radio Licensing Regulations 5.1 Frequency Ranges Used 5.2 The International Telecommunication Union (ITU) 5.3 European Licensing Regulations 5.4 National Licensing Regulations in Europe 5.5 National Licensing Regulations 5.6 Comparison of National Regulations 6 Coding and Modulation 6.1 Coding in the Baseband 6.2 Digital Modulation Procedures 7 Data Integrity 7.1 The Checksum Procedure 7.2 Multi-Access Procedures Anticollision 8 Security of RFID Systems 8.1 Attacks on RFID Systems 8.2 Protection by Cryptographic Measures 9 Standardisation 9.1 Animal Identification 9.2 Contactless Smart Cards 9.3 ISO/IEC 69873 Data Carriers for Tools and ClampingDevices 9.4 ISO/IEC 10374 Container Identification 9.5 VDI 4470 Anti-theft Systems for Goods 9.6 Item Management 10 The Architecture of Electronic Data Carriers 10.1 Transponder with Memory Function 10.2 Microprocessors 10.3 Memory Technology 10.4 Measuring Physical Variables 11 Readers 11.1 Data Flow in an Application 11.2 Components of a Reader 11.3 Integrated Reader ICs 11.4 Connection of Antennas for Inductive Systems 11.5 Reader Designs 11.6 Near-Field Communication 12 The Manufacture of Transponders and Contactless SmartCards 12.1 Glass and Plastic Transponders 12.2 Contactless Smart Cards 13 Example Applications 13.1 Contactless Smart Cards 13.2 Public Transport 13.3 Contactless Payment Systems 13.4 NFC Applications 13.5 Electronic Passport 13.6 Ski Tickets 13.7 Access Control 13.8 Transport Systems 13.9 Animal Identification 13.10 Electronic Immobilisation 13.11 Container Identification 13.12 Sporting Events 13.13 Industrial Automation 14 Appendix 14.1 Contact Addresses, Associations and TechnicalPeriodicals 14.2 Relevant Standards and Regulations 14.3 Printed Circuit Board Layouts References Index

1,231 citations

Patent
21 May 2010
TL;DR: In this paper, an antenna configured for efficient far field communication at a first frequency, an inductive element including a plurality of series-connected co-connected portions, including a first coiled portion and a second co-iled portion, and at least one reactive element parallel connected between the first and the second coiled portions, wherein the reactive element has a lower impedance at the first frequency than at the second frequency.
Abstract: Apparatus including: an antenna configured for efficient far field communication at a first frequency; an inductive element including a plurality of series-connected coiled portions, including a first coiled portion and a second coiled portion, wherein the inductive element is configured to provide near field communication at a second frequency; and at least one reactive element parallel connected between the first coiled portion and the second coiled portion, wherein the at least one reactive element has a lower impedance at the first frequency than at the second frequency.

306 citations

Journal ArticleDOI
TL;DR: The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding ofRFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
Abstract: RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.

223 citations