Josef Noll, 26.4.2005 RFID - NFC tutorial 1
Near field communication and RFID – opening for new business
Josef Noll1, Juan Carlos Lopez Calvet, Telenor R&D, , N-1331 [email protected], [email protected]
1 from 1.6.2005 Prof. stip. University Graduate Studies (UniK)N-2027 Kjeller
Josef Noll, 26.4.2005 RFID - NFC tutorial 2
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
– The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.
– NFC technology– Scenarios (travel scenario, DRM,
Information retrieval)
– State of the art
– Authentication – your own phone– Infokiosk – imagine the world
– Payment and ticketing (Giesecke& Devrient)
– NFC and mobile Commerce (Nokia/Telenor)
Josef Noll, 26.4.2005 RFID - NFC tutorial 3
Telenor R&D
Important contributor to innovation and value creation in Telenor
Demonstrating: “Ideas that simplify
Tromsø (17)
Trondheim (23)
Fornebu (170)
Norway – what happened?
International: NO, SE, DK, Hungary, Austria, Montenegro, Malaysia, Ukraina, Bangladesh, Thailand, Russland
Josef Noll, 26.4.2005 RFID - NFC tutorial 4
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
–The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.
Josef Noll, 26.4.2005 RFID - NFC tutorial 5
Service development
1G:
1970 1980 1990 2000 2010
3G:
2G:
B3G:
Mobile telephony
Mobile telephony, SMS, FAX, Data
Multimedia communication
Personalised broadband wireless services
Josef Noll, 26.4.2005 RFID - NFC tutorial 62001 2005 2008/2010
Service Network
2G/GPRSServices
Packet and circuit switched
Packet switchedonly
Open Services Access
Cyberworld
Ubiquitous Services
Community PersonalNetwork
Core Network
UMTSUMTS R5
Programmable Networks
IP Backbone
Modular Protocols
QoS Mobility
Access Network
GERAN PAN
WLAN ++
Ad Hoc
New CellularUbiquitous
accessIP AccessWLAN
Terminal Technology Multi-
modeSW
RadioSingle-mode
reconfigurability
PAN…wearables, open architecture(s)
Radio Technology
CDMATDMA
OFDM
MIMO UWB SW Radio
WRC’03 WRC’06
MSS HAS
Source: Eurescom P1145
Josef Noll, 26.4.2005 RFID - NFC tutorial 7
Keep customers:Enable the Open Access Network
Millions of fixed lines function asfeeder lines for open pico-base stations
fixed
Subscribers’fixed lines
UMTS
GSM/GPRS
Open access network
+
Supported by seamless authentication based on the Mobile Phone
Personalised and broadband services
Josef Noll, 26.4.2005 RFID - NFC tutorial 8
Future Service composition(transparent for the end customer)
Next Generation Applications:– Customized services– Complex to manage
– High flexibility
– Short time to market
– Complex Telecom-IT integration
Telecom challenges– Support the customer:
security, personalisation
– Join forces with others
– Adaptive & composed services
My Company
App1
App2
App3 Support
Comp.WEB SAP
Telecom Operator
Security
Telecom access
Interface
Interface
Alternative
Home WorkFriend Train
CarHotel
RoamingPersonal
Profile
Location
Interfaceplatform
Josef Noll, 26.4.2005 RFID - NFC tutorial 9
Need for an identifier
Real world: see and/or talkVoice
Face
Virtual world: email, webUsername, passwd
SIM
PKI
Service world (between providers)Identity management
Service level agreement (SLA)
Trust relation
Josef Noll, 26.4.2005 RFID - NFC tutorial 10
Local interactions are a natural step toward multi-radio access of complementing radio technologies
BT
RFID
WLANWCDMA
Cellular Access Hot Spot Access
Broadcasting world:mass media
TV
Proximity world:local servicespersonal area
Cdma2000 1x
DVB-H
"personal, trustworthy, seamless global roaming"
"richest available content, browsing
just for the fun of it"
“CNN news, Sugar Bowl on the road"
“local interactions, service discovery & access,
ticketing "
EDGE
HSDPA
CDMA 1x EV_DV
GPRS
FM radio
Visual radio
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 11
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
–The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.
Josef Noll, 26.4.2005 RFID - NFC tutorial 12
What is RFID?Stands for Radio Frequency Identification
Mostly used for Access Control and Vehicle Immobilizer
The data carrier is generally called a “Tag” and attached to an item or location
Tags are passive (battery-less), in sticker or disc format
Radio frequency 13.56 Mhz globally the most widely used for RFID
The data gatherer is termed a “Reader”, e.g. integrated to Nokia 5140 phone
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 13
RFID Tag (Transponder)
Consist of microchip that stores data and antenna
Active transponders have on-tag battery
Passive transponders obtain all power from the interrogation signal of readerActive and passive only communicate when interrogate by transceiver
Available in all forms
Josef Noll, 26.4.2005 RFID - NFC tutorial 14
Some technologyRFID – available on tape
Price per. RFID tag: down to 0.04 €
Inductioncoile
The chip
3
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 15
RFID Reader (Transceiver)
Consist of a RF module, a control unit, and a coupling element to interrogate tags via RF communication
Also have secondary interface to communicate with backend systems
Reads tags located in hostile environment and are obscured from view
Josef Noll, 26.4.2005 RFID - NFC tutorial 16
Example RFID Readers
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 17
RFID Tag Average Selling Price
0,00
0,10
0,20
0,30
0,40
0,50
0,60
2000 2001 2002 2003 2004 2005 2006 2007
US
D p
er t
ag
Source: Andreas Lundin, Nokia
Josef Noll, 26.4.2005 RFID - NFC tutorial 18
RFID – communication modes
RFID tag:- microchip attached to an antenna - sends signals to a reader. - contains a unique serial number, but may have other information, such as a customers' account number.
Inductive Coupling
Propagation Coupling
Aktive (own power) Range: ad lib (no limit) Passive (inductive) Range: from mm to some metres
Source: Tor Hjalmar Johannessen, Telenor
Reader (passiv RFID):- Inductor to create electromagnetic field in tag- Receiver for radio response from tag
(ROM-value: up to 600 bytes, typical 64-128 bits
Josef Noll, 26.4.2005 RFID - NFC tutorial 19
Security:Magnetic Field Power drop off
Source: Auracomm.com
Josef Noll, 26.4.2005 RFID - NFC tutorial 20
Tag principles
RFID-tag
- own processor-w/ EEPROM / flash-ROM & RAM
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 21
Principle function – passive RFID
1. RFID comes close to a contact point
2. Contact point induces magnetic field (to the magnetic coil)
3. Coil generates power for the chip (which starts immediately)
4. Chip generates RF response (RFID)
Reader
To backend system
RFID-tag
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 22
Frequency area - applications
Frequency Band Characteristics Typical Applications
Low100-500 kHz
Short to medium read rangeInexpensivelow reading speed
Access controlAnimal identificationInventory controlCar immobiliser
High850-950 MHz2.4-5.8 GHz (*)
Long read rangeHigh reading speedLine of sight requiredExpensive
Railroad car monitoringToll collection systems
(*) 2 megabits per second data rates may be achieved, with added noise immunity provided by the spread spectrum modulation approach.
Source: Tor Hjalmar Johannessen, Telenor
Intermediate10-15 MHz
Short to medium read rangepotentially inexpensivemedium reading speed
Access controlSmart cards
Josef Noll, 26.4.2005 RFID - NFC tutorial 23
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
–The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.– Potential Risks
Josef Noll, 26.4.2005 RFID - NFC tutorial 24
Applications- steadily increasing…
Reality:- Identification of animals: cats, horses (value,
identity), …, salmon (origin), farms (feeding)- Logistic: Transport, parcels (DHL), bagage (airports),
stocks- Purchase: Wal-Mart, Gillette, Bennetton (automatic
cashier)- Loan: library- Traffic: rush hour charging, traffic light priority, bus
information in Edingburgh- Border control (USA-Canada)- Credit card: alternative to magnetic stripe, AMEX &
MasterCard WWW.PAYPASS.COM- Sports: Boston Marathon, Birkebeiner- Theft alarm: clothes, cars,.., car key/start control- Security: Admission control
Brand ProtectionLogisticsAnti counterfeitingPositioningLocatingTalking medicines for the blindAuto rejecting wrong partsTransactionsMerchandisingEntertainmentSecure AccesseCommerce fulfilmentControlling grey marketsReal time theft detectionReal time tampering detectionThe Internet of ThingsFast Track Behaviour monitoring Market researchVirtual queuingAutomated diagnosticsAutomated performance recordAnd more...
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 25
Sports & Money
The Boston MarathonReal-time Tracking of Runners-every 5 km-introduced in 1999
http://www.ti.com/tiris/docs/solutions/sports.shtml &http://www.championchip.com/chips/
RFID-tag
Euro bank notes to embed RFID chips by 2005http://www.eetimes.com/story/OEG20011219S0016
Money identification:
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 26
Credit card-developments towards RFID
Source: Mastercard
Josef Noll, 26.4.2005 RFID - NFC tutorial 27
Mastercard PayPasswww.paypass.com
Josef Noll, 26.4.2005 RFID - NFC tutorial 28
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
–The upcoming digital world – need for seamless authentication
– RFID basics, frequencies, …– Applications: Sports, etc.– Potential Risks
Josef Noll, 26.4.2005 RFID - NFC tutorial 29
Potential Security Problems
Security problem 1: RFID is easy to clone
- hide a reader in a lift door, a chair, or other places you come closeRead respons and programme a separate tag with same RFID id.The user can’t know where reading took place. Difficult to trace later on
WARNING
1. Authentication: Cloning – theft of RFID2. Confidentiallity – Uncontrolled surveillance
Security problem 2: Uncontrolled Surveillance
-With hidden tags in clothes, money, credit card the user has no longer controlwhen/where/how he can be detected.
Organisations are active to stop RFID. Ref: www.stop-rfid.orgPotential restrictions on the way in the USA.
WARNING
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 30
Vulnerability
Security in RFID is weak if not enhanced by an extra layer, e.g. PKI (encryption is not resistant against replay, if content is not shifted)
Remember:
����������� ��������������� ��������������� ��������������� ���� ��� ���������� ������� ���������� ������� ���������� ������� ���������� ����
Controlled case
ReaderUncontrolled reader
Reading up to several cm
This is also recognised by the public: www.stoprfid.org
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 31
Enhancement
RFID security can be enhanced:- ”on/off” switch if the circuit is activated- under user’s control
Suggestion: Combination with SIM/PKI (two factor authentication)a) RFID = triggerb) RFID signal routes to SIM for explicit verification
Source: Tor Hjalmar Johannessen, Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 32
Boycott Gillette Products! Click for details.
Others:- Wal-Mart-Benetton: http://boycottbenetton.or
Benetton was considering putting RFID tracking chipin their clothing that can be read from a distance andused to monitor the people wearing them.
Annet: http://www.epic.org/privacy/rfid/
Source: www.stop-rfid.org
Josef Noll, 26.4.2005 RFID - NFC tutorial 33
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
– Speed?– Understanding?
– …
- I want to hear more of…
Josef Noll, 26.4.2005 RFID - NFC tutorial 34
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
– NFC technology– Scenarios (travel scenario, DRM,
Information retrieval)
– State of the art
Josef Noll, 26.4.2005 RFID - NFC tutorial 35
Future scenario: „My services at home“
1.
2.
3.
4.Status of my family
5. eGovernment, el. signature
Josef Noll, 26.4.2005 RFID - NFC tutorial 36
Security in the virtual world
Sec
urity
Req
uire
men
t
Nice to know
Needto know
Haveto know
Examples:
mHandel,VPN
Intranet, email,Admittance
Network access
Josef Noll, 26.4.2005 RFID - NFC tutorial 37
Security infrastructure
Security depends on application– Nice to know: WLAN network access
– Need to know: email, Intranett– Have to know: VPN, (eCommerce)
Higher level require more than just username & passwordhttp://www.openauthentication.org/ suggests 3 methods
– SIM authentication (GSM, EAP-SIM,…)– Public Key Infrastructure (PKI)
– One-Time-Password (OTP)
In-line with requirements from Norwegian government for eSignature Depending on application: username & password or PKIThe Mobile phone has all three: SIM, PKI, and OTPChallenge: Usability and exchange of credentials to “my working devices”
Josef Noll, 26.4.2005 RFID - NFC tutorial 38
The only thing you need:Your Mobile Phone
SIM with RFID & PKI
Josef Noll, 26.4.2005 RFID - NFC tutorial 39
Four-in-one: Your mobile integrates them all
Sec
urity
Req
uire
men
t
Nice to know
Needto know
Haveto know
Examples:
mHandel,VPN
Intranet, email,Admittance
Network access
*Patent pending
&* RFID (& SIM)
&
* RFID & SIM passwd
*
&
RFID, SIM & PKI
Josef Noll, 26.4.2005 RFID - NFC tutorial 40
Service access
Seamless authentication
Physical access
VPNHome access,
.mp3, .jpg
Josef Noll, 26.4.2005 RFID - NFC tutorial 41
Timeline: Phone with RFID & PKI
Near Field Communication (NFC)
Standardisation of Philips, Nokia, Sony, …
Phones with RFID chipPhone status: Nokia: on stock, Siemens: prototypes
SIM card with integrated RFID
Prototypes available from:– Giesecke & Devrient:
demonstrated on Siemens phones
– Gemplus: both on one chip, (terminated) NFC
Josef Noll, 26.4.2005 RFID - NFC tutorial 42
Near Field Communication (NFC) is a touch-based RFID technology
• NFC works in the globally available 13.56 MHz band• The effective working distance is up to a few centimeters• Based on ISO 18092 including ISO14443A MiFare and FeliCa
standards, ie compatible with the most broadly established smart card infrastructure covering >80% of the market
Technology
Tags
Devices
• Tags in smart objects are powered by the radio signal of the reader, and do not require any battery or other source of power
• The tags contain some memory that can store URLs, SMS and similar information
• Costs currently a few ten EUR cents and decreasing rapidly
• Devices do not contain tags, but can communicate using the same interface
• Devices can not only read tags, but also write to enabled tags
Sources: Nokia, Froster & Sullivan; Forrester
Josef Noll, 26.4.2005 RFID - NFC tutorial 43
NFC changes the role of the mobile operator
The mobile operator is the communication provider– Everybody has a mobile phone
– People know that they can reach me – and not my parents– Companies have identified the value of personal phones and change their
infrastructure– The phone carries all my contacts
– Connected 24/7 (all the time, not just 4 h a day)
From access to communication– Provide communication: voice, SMS, MMS, IM,
email,….– Seamless login (wap.telenormobil.no) – my
email, last 10 visited
Provide presence and community servicesProvide authentication and security
Josef Noll, 26.4.2005 RFID - NFC tutorial 44
Near field communication (NFC) Based on RFID technology at 13.56 MHz
Typical operating distance 10 cm
Compatible with RFIDData rate today up to 424 kbit/s
Philips and Sony
ECMA-340, ISO/IEC 18092 & ECMA-352, …standards
Powered and non-self powered devices
Josef Noll, 26.4.2005 RFID - NFC tutorial 45
NFC applications
Source: ecma, tc32-tg19-205-013.pdf
Josef Noll, 26.4.2005 RFID - NFC tutorial 46
Near field communication (NFC) - Applications and Compatibility
ApplicationsTransmit pictures from Camera to PC or TVDownload applications or gamesConfigure communication parameters in e.g. home network
Smart card compatibility (Philip’s MIFARE and Sony’s Felica)Secure NFC (NFC + smart card)Active or passive operation
Josef Noll, 26.4.2005 RFID - NFC tutorial 47
“How does it work?”Nokia Field Force Solutions
http://www.nokia.com/nokia/0,,70857,00.html
Better service idea?
Click to start flash
Josef Noll, 26.4.2005 RFID - NFC tutorial 48
NFC standardisation
ECMA-340Specifies the RF signal interfaceInitialisation, anti-collision and protocols
Communication mode selection mechanism ECMA 352 (v1, Dec 2003)
Selects communication modes: NFC, PCD, and VCDEnables communication in that mode
Josef Noll, 26.4.2005 RFID - NFC tutorial 49
Near Field Communication Interface Protocol (NFCIP) - finalised
Josef Noll, 26.4.2005 RFID - NFC tutorial 50
NFCIP-2 Interface and protocol(ISO/IEC 21481)
ECMA-340ISO/IEC 14443
PCD mode
(MIFARE, FeliCa)
ISO/IEC 15693VCD mode
(facility access)
InterfaceStandards
Josef Noll, 26.4.2005 RFID - NFC tutorial 51
NFC Interface and ProtocolSummary
Josef Noll, 26.4.2005 RFID - NFC tutorial 52
ECMA: NFC work items & future plans
Work itemsECMA-356: RF interface tests for ECMA-340 devicesECMA-362: Protocol Test Methods
Future working itemsA mapping of NFC to other communication protocols including the Internet Protocol (IP), GSM and Bluetooth
– Advanced Logical Link Control with addressing and segmentation support
Support for Data Link and end-to-end security and key managementAir-to-wired interface specificationApplication extensions in NFCIP-1
– Power control as an example application extension
Josef Noll, 26.4.2005 RFID - NFC tutorial 53
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
– NFC technology– Scenarios (travel scenario, DRM,
Information retrieval)
– State of the art
Josef Noll, 26.4.2005 RFID - NFC tutorial 54
Josef Noll, 26.4.2005 RFID - NFC tutorial 55Source: GemPlus
Josef Noll, 26.4.2005 RFID - NFC tutorial 56
RFID payment usage coffee machines in Telenor R&D
Payment on coffee machine
Entrance to door B6e
RFID card in 2005
Tests in OSL and Arlanda
RFID cards
Think
Planned Q4.2005, Univ. Tromsø (N)
Payment
EntranceElectronic access (VPN) - Telenor
Josef Noll, 26.4.2005 RFID - NFC tutorial 57
NFC – near field communication in praxis[copyright: www.nfc-forum.org]
- Example: travelling
Josef Noll, 26.4.2005 RFID - NFC tutorial 58
NFC – near field communication in praxis[copyright: www.nfc-forum.org]
- Example: streaming DRM
Josef Noll, 26.4.2005 RFID - NFC tutorial 59
NFC – near field communication in praxis[copyright: www.nfc-forum.org]
- Example: Poster Information
Josef Noll, 26.4.2005 RFID - NFC tutorial 60
SIM City Platform
Ticketing Payment ID
Service Providers
Banks
Telenor CPA
Buy Ticket
SendTicket
Ticketing
Josef Noll, 26.4.2005 RFID - NFC tutorial 61
Conclusions“The last time we were connected by a wire was at birth!” [Motorola]No cable, that’s the challenge
– Various radio systems: GSM, UMTS; WLAN, Bluetooth, DVB, …
– Limitations: battery, integration
All services from your mobileYour mobile is the authentication centreTelecom as authentication provider
Josef Noll, 26.4.2005 RFID - NFC tutorial 62
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
– NFC technology?– State of the art?
– …
Josef Noll, 26.4.2005 RFID - NFC tutorial 63
Agenda0900 Welcome – interests0920 RFID – the means for
authentication0950 Q & A1010 RFID & NFC:
technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial
– Authentication – your own phone– Infokiosk – imagine the world
– Payment and ticketing (Giesecke& Devrient)
– NFC and mobile Commerce (Nokia/Telenor)
Top Related