Near Field Communication (NFC) – From Theory to Practice
Home > Computing and Information Technology > Business applications > Near Field Communication (NFC) – From Theory to Practice
Near Field Communication (NFC) – From Theory to Practice

Near Field Communication (NFC) – From Theory to Practice


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.

Table of Contents:
Preface xv Acknowledgments xxiii List of Acronyms xxv 1 Executive Summary 1 1.1 Towards NFC Era 2 1.1.1 Ubiquitous Computing 2 1.1.2 Mobile Phones 3 1.1.3 Technological Motivation of NFC 4 1.1.4 Wireless Communication, RFID, and NFC 4 1.2 Evolution of NFC 4 1.2.1 Earlier Form of RFID: Barcode Technology 4 1.2.2 RFID Technology 5 1.2.3 Earlier Form of Smart Cards: Magnetic Stripe Cards 6 1.2.4 Smart Card Technology 6 1.2.5 NFC as a New Technology 7 1.3 NFC Essentials 7 1.3.1 Smart NFC Devices 8 1.3.2 Standardization of NFC Enabled Mobile Phones 8 1.3.3 General Architecture of NFC Enabled Mobile Phones 10 1.3.4 Near Field Communication Interface and Protocol (NFCIP) 11 1.4 NFC Operating Modes and Essentials 11 1.4.1 NFC Operating Modes 11 1.4.2 Reader/Writer Mode Essentials 12 1.4.3 Peer-to-Peer Mode Essentials 13 1.4.4 Card Emulation Mode Essentials 13 1.4.5 Case Studies 13 1.5 SE and Its Management 14 1.5.1 Over-the-Air Technology 15 1.5.2 GlobalPlatform Card Specification 15 1.5.3 Trusted Service Manager 16 1.5.4 UICC Management Models 16 1.5.5 Multiple SE Environments 16 1.6 NFC Application Development 17 1.6.1 JSR 257 18 1.6.2 JSR 177 18 1.7 NFC Security and Privacy 19 1.7.1 Why is Security Important? 19 1.7.2 Primary Goals of Security Measures 20 1.7.3 Vulnerability, Threat, Attack, and Risk 21 1.7.4 Security Tools and Mechanisms 21 1.7.5 NFC Security 22 1.7.6 Privacy, Legal, and Ethical Aspects 24 1.8 NFC Business Ecosystem 25 1.8.1 Stakeholders in NFC Ecosystem 27 1.8.2 Understanding NFC Business Models 28 1.8.3 Business Model Approaches 30 1.9 Usability in NFC 30 1.10 Benefits of NFC Applications 31 1.10.1 Future Scenarios on NFC 32 1.11 NFC Throughout the World 33 1.11.1 NFC Cities 33 1.11.2 NFC Trials and Projects 34 1.12 Status of Academic Research on NFC Literature 36 1.13 Chapter Summary 39 References 39 2 Towards NFC Era 41 2.1 Ubiquitous Computing and NFC 41 2.1.1 Ubiquitous Computing 41 2.1.2 New Communication Interface Alternative for Mobile Phones: NFC Technology 42 2.2 Mobile Phones 43 2.2.1 Features of a Mobile Phone 44 2.2.2 Mobile Phone Network 45 2.2.3 Mobile Phone Architecture 46 2.3 Wireless Communication as a Communication Media for NFC Technology 47 2.3.1 Wireless, Mobile, and Nomadic Communication 48 2.3.2 Wireless and Mobile Communication Technologies 48 2.4 RFID Technology 50 2.4.1 Earlier Form of RFID: Barcode Technology 51 2.4.2 Barcodes vs. RFID Tags 53 2.4.3 Essentials of RFID Technology 53 2.4.4 RFID Tags as Transponders 54 2.4.5 RFID Readers 55 2.4.6 Frequency Ranges 55 2.4.7 Operating Principles of RFID Technology 55 2.4.8 Near Field vs. Far Field Transmission 57 2.4.9 Common RFID Applications Throughout the World 58 2.5 Smart Card Technology 58 2.5.1 Earlier Form of Smart Card: Magnetic Stripe Cards 59 2.5.2 Evolution of Smart Cards 60 2.5.3 Types of Smart Cards: Capability Based Classification 60 2.5.4 Smart Card Operating System (SCOS) 61 2.5.5 Types of Smart Cards: Mechanism Based Classification 63 2.5.6 Smart Card Applications 67 2.6 Comparison between RFID Tags and Contactless Smart Cards 67 2.7 More on NFC 68 2.7.1 Inherent Security and Pairing Capability of NFC 70 2.8 Chapter Summary 70 Chapter Questions 71 References 71 3 NFC Essentials 73 3.1 Introduction to NFC 73 3.2 Standardization and Development Efforts of NFC Enabled Mobile Phones 76 3.2.1 NFC Forum 76 3.2.2 GlobalPlatform 79 3.2.3 GSM Association (GSMA) 80 3.2.4 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 80 3.2.5 ECMA International 81 3.2.6 ETSI and ETSI Smart Card Platform (ETSI SCP) 81 3.2.7 Java Community Process (JCP) 81 3.2.8 Open Mobile Alliance (OMA) 81 3.2.9 3rd Generation Partnership Project (3GPP) 82 3.2.10 EMVCo 82 3.3 General Architecture of NFC Enabled Mobile Phones 82 3.3.1 Secure Element 83 3.3.2 NFC Interface 86 3.3.3 Interface between SE and NFC Controller 86 3.3.4 Host Controller and HCI 89 3.4 Physical Layer of NFC 92 3.4.1 ISO/IEC 14443 - Proximity Contactless Smart Card Standard 92 3.4.2 Near Field Communication Interface and Protocol (NFCIP) 94 3.4.3 Data Transmission on RF Layer 96 3.5 Reader/Writer Operating Mode Essentials 99 3.5.1 Protocol Stack Architecture of Reader/Writer Mode 100 3.5.2 NFC Forum Mandated Tag Types 101 3.5.3 NDEF 102 3.6 Peer-to-Peer Operating Mode Essentials 108 3.6.1 Protocol Stack Architecture of Peer-to-Peer Mode 108 3.6.2 LLCP 109 3.7 Card Emulation Operating Mode Essentials 111 3.7.1 Protocol Stack Architecture of Card Emulation Mode 111 3.8 Chapter Summary 112 Chapter Questions 113 References 113 4 NFC Operating Modes 115 4.1 Mobile Interaction Techniques 115 4.1.1 NFC Technology Interaction Technique 117 4.2 Classification of NFC Devices 118 4.2.1 Active vs. Passive Devices 118 4.2.2 Initiator vs. Target Devices 119 4.3 Reader/Writer Mode 119 4.3.1 Smart Poster 120 4.3.2 Generic Usage Model 121 4.3.3 Leading Applications 123 4.3.4 Use Cases on Reader/Writer Mode 125 4.3.5 Underlying Application Benefits 127 4.4 Peer-to-Peer Mode 128 4.4.1 Generic Usage Model 129 4.4.2 Leading Applications 129 4.4.3 Use Cases on Peer-to-Peer Mode 130 4.4.4 Underlying Application Benefits 131 4.5 Card Emulation Mode 131 4.5.1 Generic Usage Model 132 4.5.2 Leading Applications 133 4.5.3 Use Cases on Card Emulation Mode 134 4.5.4 Underlying Application Benefits 135 4.6 Overview on Benefits of Operating Modes 135 4.7 Case Studies 136 4.7.1 Reader/Writer Mode Case Study: NFC Shopping 137 4.7.2 Peer-to-Peer Mode Case Study: NFC Gossiping 141 4.7.3 Card Emulation Mode Case Study: NFC Ticketing 142 4.8 Chapter Summary 148 Chapter Questions 148 References 148 5 Developing NFC Applications 151 5.1 Initial Steps in NFC Application Development 151 5.2 Why Java? 152 5.2.1 Why did we Choose Java? 152 5.2.2 Why is Java the Favorite? 153 5.3 Setting up the Environment for Java ME and NFC Programming 155 5.4 Introduction to Mobile Programing 158 5.4.1 Java ME Building Blocks 160 5.4.2 MIDlets 161 5.4.3 Package javax.microedition.lcdui 164 5.4.4 Creating a New MIDlet Project 165 5.4.5 Inside a MIDlet Suite (MIDlet Packaging) 168 5.4.6 A More Detailed User Interface MIDlet 171 5.4.7 Push Registry 177 5.5 NFC Application Development 179 5.6 Reader/Writer Mode Programing 179 5.6.1 Package javax.microedition.contactless 181 5.6.2 Package javax.microedition.contactless.ndef 183 5.6.3 Package javax.microedition.contactless.rf 185 5.6.4 Package javax.microedition.contactless.sc 185 5.6.5 A Reader/Writer Mode Application 185 5.6.6 NFC Push Registry 199 5.7 Peer-to-Peer Mode Programing 200 5.7.1 Package com.nokia.nfc.p2p 200 5.7.2 Package com.nokia.nfc.llcp 201 5.7.3 A Peer-to-Peer Mode Application 204 5.8 Card Emulation Mode Programing 211 5.8.1 Accessing Secure Element Using JSR 257 212 5.8.2 Accessing Secure Element Using JSR 177 212 5.9 Reader/Writer Mode Case Study: NFC Shopping 215 5.10 Peer-to-Peer Mode Case Study: NFC Gossiping 223 5.11 Chapter Summary 236 Chapter Questions 238 References 239 6 NFC Security and Privacy 241 6.1 Security in General 241 6.1.1 Why is Security Important? 242 6.1.2 Primary Goals of Security Measures 243 6.1.3 Vulnerability, Threat, Attack, and Risk 248 6.1.4 Principles of Security 253 6.2 Security Tools and Mechanisms 257 6.2.1 Cryptography 257 6.2.2 Symmetric Cryptography 258 6.2.3 Asymmetric Cryptography 259 6.2.4 Hashing 261 6.2.5 Message Authentication Code (MAC) and HMAC 261 6.2.6 Digital Signature and Mobile Signature 261 6.2.7 Comparing Security Mechanisms 262 6.2.8 Digital Certificates and Certificate Authority 263 6.2.9 Do Not Keep Cryptographic Algorithms Secret 263 6.2.10 Key Types: Symmetric Key, Private Key, Public Key, Master Key, and Session Key 264 6.2.11 Key Management and its Importance 264 6.2.12 WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) 264 6.2.13 Other Security Components 264 6.3 NFC Security Framework 265 6.3.1 Security Issues on NFC Tag 266 6.3.2 Security Issues on NFC Reader 268 6.3.3 Security Issues on Smart Card 269 6.3.4 Security Issues on Communication 270 6.3.5 Middleware and Backend System Security 272 6.3.6 Standardized NFC Security Protocols 272 6.4 Privacy, Legal, and Ethical Aspects 277 6.4.1 It is a Different World 278 6.4.2 Some Examples on Privacy Issues 279 6.4.3 Summary on Privacy and Countermeasures 280 6.4.4 Some Proposals for Providing Privacy on Tags 280 6.4.5 What to do for Protecting Privacy 281 6.5 Chapter Summary 281 Chapter Questions 282 References 282 7 NFC Business Ecosystem 283 7.1 Business Ecosystem 283 7.1.1 Generic Features of a Business Ecosystem 285 7.1.2 Business Ecosystem of NFC 286 7.2 Stakeholders in NFC Ecosystem 286 7.2.1 Standardization Bodies and Other Contributors 287 7.2.2 NFC Chip Set Manufacturers and Suppliers 288 7.2.3 Secure Element Manufacturers and Suppliers 288 7.2.4 Mobile Handset Manufacturers and Suppliers 290 7.2.5 Reader Manufacturers and Suppliers 290 7.2.6 Mobile Network Operators 290 7.2.7 Trusted Service Managers 290 7.2.8 Service Providers 292 7.2.9 Merchants/Retailers 293 7.2.10 Customers 293 7.3 Business Models 293 7.3.1 Key Indicators in NFC Business Models 295 7.3.2 Business Model Alternatives 297 7.3.3 General Revenue/Expenditure Flow Model 300 7.4 Case Study: NFC Ticketing 301 7.5 Additional Reading: Pay-Buy-Mobile Project by GSMA 304 7.6 Chapter Summary 308 Chapter Questions 309 References 309 8 Secure Element Management 311 8.1 Introduction to OTA Technology 311 8.1.1 OTA Technology and Mobile Device Management 312 8.1.2 OTA Technology and UICC Based SEs 313 8.2 GlobalPlatform Specifications 314 8.2.1 GlobalPlatform Card Specification 314 8.2.2 GlobalPlatform Messaging Specification 316 8.3 Life Cycle Management of SEs 316 8.3.1 TSM in NFC Environment 317 8.3.2 Actors and Their Functional Roles in GlobalPlatform 318 8.3.3 UICC Based SE: Security Domains and Hierarchy 320 8.3.4 UICC Management Models 320 8.4 Multiple SE Environments 325 8.4.1 Architecture without Aggregation 325 8.4.2 Architecture with Aggregation 326 8.5 Alternative TSM Based OTA Management Model 326 8.6 Chapter Summary 328 Chapter Questions 329 References 329 9 NFC Cities and Trials 331 9.1 NFC Cities 331 9.1.1 City of Oulu 331 9.1.2 City of Nice 337 9.1.3 Smart Urban Spaces 339 9.2 NFC Trials and Projects 341 9.2.1 Contactless Payment Trials 341 9.2.2 Transport and Other Ticketing Trials 345 9.2.3 Other Trials 347 9.3 Chapter Summary 349 References 349 Index 351

About the Author :
Dr. Vedat Coskun, Isik University, Turkey Vedat Coskun received his MS degree from Naval Postgraduate School, U.S.A., and PhD degree from Yildiz Technical University both in Computer Science in 1990 and 1998, respectively. Kerem Ok, Isik University, Turkey Kerem Ok received his MS degree from Isik University, Turkey and currently studying his PhD degree in Information Technology in Istanbul University. Busra Ozdenizci, Isik University, Turkey Busra Ozdenizci received her BS double degree in Information Technology and Business Administration from Isik University, Turkey and currently studying her MS degree in Information Technology in the same University.

Review :
"While NFC is a very specific and limited protocol, the fact that this book covers all aspects of NFC and how it relates to many other communication methods makes the book very useful to a wide audience and an interesting read." ( IEEE Microwave Magazine , 1 September 2013)


Best Sellers


Product Details
  • ISBN-13: 9781119965794
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 244 mm
  • No of Pages: 256
  • Weight: 666 gr
  • ISBN-10: 1119965799
  • Publisher Date: 24 Dec 2011
  • Binding: Other digital
  • Language: English
  • Spine Width: 15 mm
  • Width: 168 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Near Field Communication (NFC) – From Theory to Practice
John Wiley & Sons Inc -
Near Field Communication (NFC) – From Theory to Practice
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Near Field Communication (NFC) – From Theory to Practice

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!