Comparative Studies | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Wireless Communication through Near Field & its Security
Vikas Nivrutti Dhakane, Gaurav Mahavir Phade, Sachin Dadaso Pandhare
This paper gives a complete idea about near field communication & analysis of security with respect to NFC. Near Field Communications (NFC) is a short-range wireless technology that allows mobile devices to actively interact with passive physical objects and other active mobile devices, connecting the physical world to mobile services in ways that empower and benefit users. We will also be using the term Tap n Go because it clearly conveys a visual image in which this technology is intended to be used. Near field communication is a set of principles for smart phones and alike devices to establish radio communication with each other by connecting them together or bringing them into compatibility which are usually not more than a few centimeters apart. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. This paper highlights the capabilities of near field communication and its potential to enhance everyday lives. It further describes how the NFC Forum works to drive NFC standardization and encourage its adoption in the market.. NFC allows for contextual application invocation (CAI) the execution of code on the phone as a result of our environment.NFC builds upon Radio-Frequency Identification (RFID) and contactless smartcard technologies that enable stored data to be actively read at a distance. RFID is a powerful enabling technology that is being applied in an astonishing range of applications and uses, from supply chain management and product inventory control to identity authentication and access control.
Keywords: CAI Contextual Application Invocation, NFC Near Field Communication, protocol, network, Radio-Frequency Identification RFID, NDEF NFC Data Exchange Format
Edition: Volume 3 Issue 12, December 2014
Pages: 1184 - 1187
How to Cite this Article?
Vikas Nivrutti Dhakane, Gaurav Mahavir Phade, Sachin Dadaso Pandhare, "Wireless Communication through Near Field & its Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14518, Volume 3 Issue 12, December 2014, 1184 - 1187
126 PDF Views | 111 PDF Downloads
Similar Articles with Keyword 'protocol'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 530 - 533QoS Provisioning Using Latency for IPV6
T. Vengatesh, Dr. S. Thabasu Kannan
Similar Articles with Keyword 'network'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1673 - 1677Convolution Neural Network Based Image Recognition
Sofia Hamid, Mrigana Walia
Similar Articles with Keyword 'Radio-Frequency Identification RFID'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2180 - 2182Review of Improved Cross Redundant Data Cleaning Algorithm for RFID and WSN Integration
Jayashri M. Dupare, N. U. Sambhe
Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1184 - 1187Wireless Communication through Near Field & its Security
Vikas Nivrutti Dhakane, Gaurav Mahavir Phade, Sachin Dadaso Pandhare