NFC

Near Field Communication (NFC) (in  italiano letteralmente “ Comunicazione in prossimità”) è una tecnologia che fornisce  connettività  wireless ( RF) bidirezionale a corto raggio (fino a un massimo di  10 cm ). È stata sviluppata congiuntamente da  Philips,  LG,  Sony e  Nokia.

La tecnologia NFC si è evoluta da una combinazione d'identificazione senza contatto o   RFID  (Radio Frequency Identification – Identificazione a Radio Frequenza) e altre tecnologie di connettività. Contrariamente ai più semplici dispositivi RFID, NFC permette una comunicazione bidirezionale: quando due apparecchi NFC (lo <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">  initiator<span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">  <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">e il <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">  target<span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">) vengono accostati entro un raggio di <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">  <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;white-space:nowrap;display:inline-block;">4 cm <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">, viene creata una rete <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">  peer-to-peer<span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">  <span style="color:rgb(0,0,0);font-family:sans-serif;font-size:13px;line-height:19.1875px;">tra i due ed entrambi possono inviare e ricevere informazioni.

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.1875px;color:rgb(0,0,0);font-family:sans-serif;font-size:13px;">La tecnologia NFC opera alla frequenza di  13,56 MHz  e può raggiungere una velocità di trasmissione massima di  424 kbit/s.

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.1875px;color:rgb(0,0,0);font-family:sans-serif;font-size:13px;">Lo NFC può essere realizzato direttamente tramite un chip integrato oppure tramite l'uso di una speciale scheda esterna che sfrutta le porte delle schede SD o micro SD<sup class="reference" id="cite_ref-1" style="line-height:1em;unicode-bidi:-webkit-isolate;">[1]

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.1875px;color:rgb(0,0,0);font-family:sans-serif;font-size:13px;">

<p style="margin-bottom:0.1em;"> ===Commerce<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">NFC devices can be used in contactless payment systems, similar to those currently used in credit cards and electronic ticket smartcards, and allow mobile payment to replace or supplement these systems.
 * Scaricamento e pagamento su dispositivi portatili NFC, attraverso computer o chioschi elettronici abilitati, di giochi, file audio digitali, video, software;
 * Scaricamento da un PC su di un dispositivo portatile, della prenotazione o acquisto di una permanenza in albergo, ingressi a cinema, teatri, stadi, viaggio in treno o aereo, e accesso al servizio comperato mediante il dispositivo stesso avvicinandolo o toccando il chiosco elettronico in albergo, al gate di ingresso o di partenza;
 * Scaricamento da un chiosco elettronico mediante scansione o contatto di informazioni addizionali, acquisto di una permanenza in albergo, ingressi a cinema, teatri, stadi, titolo di viaggio con mezzi urbani e accesso al servizio mediante il dispositivo stesso anche sui mezzi di trasporto urbano;
 * Trasferimento e visualizzazione di fotografie da una macchina fotografica o telefono cellulare NFC a un chiosco elettronico, televisione, computer per la visione o la stampa;
 * Trasferimento facilitato di file o messa in rete fra sistemi wireless;
 * Uso della tecnologia NFC per i sistemi di bigliettazione elettronica (nel 2011 a Milano è partita una sperimentazione che consente di utilizzare il cellulare per comprare e validare i biglietti dell'autobus o della metropolitana<sup class="reference" id="cite_ref-ATM_Milano_NFC_15-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[15] ).

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">For example, Google Wallet allows consumers to store credit card and store loyalty card information in a virtual wallet and then use an NFC-enabled device at terminals that also accept MasterCard PayPasstransactions.<sup class="reference" id="cite_ref-GoogleWalletNFC_7-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[7]  Germany,<sup class="reference" id="cite_ref-GermanyNFCTrial_8-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[8]  Austria,<sup class="reference" id="cite_ref-AustriaNFCTrial_9-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[9]  Finland,<sup class="reference" id="cite_ref-FinlandNFCTrial_10-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[10]  New Zealand,<sup class="reference" id="cite_ref-NewZealandNFCTrial_11-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[11]  Italy,<sup class="reference" id="cite_ref-ItalyNFCTrial_12-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[12]  Iran and Turkey,<sup class="reference" id="cite_ref-Turkcell_Wallet_13-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[13]  have trialed NFC ticketing systems for public transport. Vilnius fully replaced paper tickets for public transportation withISO/IEC 14443 Type A cards on July 1, 2013.<sup class="reference" id="cite_ref-14" style="line-height:1em;unicode-bidi:-webkit-isolate;">[14]

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">NFC stickers based payments in Australia’s Bankmecu and card issuer Cuscal have completed an NFC payment sticker trial, enabling consumers to make contactless payments at Visa payWave terminals using a smart sticker stuck to their phone. Bankmecu now plans to further test the service before launching it to its wider cardholder base in the next few months.

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">India is implementing NFC based transactions in box offices for ticketing purposes.<sup class="reference" id="cite_ref-IndiaNFCTicketing_15-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[15]

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">A partnership of Google and Equity Bank in Kenya has introduced NFC payment systems for public transport in the Capital city Nairobi under the branding "Beba Pay"

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">With the release of Android 4.4, Google introduced a new platform support for secure NFC-based transactions through Host Card Emulation (HCE),<sup class="reference" id="cite_ref-16" style="line-height:1em;unicode-bidi:-webkit-isolate;">[16]  for payments, loyalty programs, card access, transit passes, and other custom services. With HCE, any app on an Android 4.4 device can emulate an NFC smart card, letting users tap to initiate transactions with an app of their choice. Apps can also use a new Reader Mode so as to act as readers for HCE cards and other NFC-based transactions. ===Bluetooth and Wi-Fi connections<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">NFC offers a low-speed connection with extremely simple setup, and can be used to bootstrap more capable wireless connections.<sup class="reference" id="cite_ref-TechEnabler_17-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[17]

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">For example, the Android Beam software uses NFC to complete the steps of enabling, pairing and establishing a Bluetooth connection when doing a file transfer.<sup class="reference" id="cite_ref-AndroidBeam_18-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[18]  Nokia, Samsung, BlackBerry and Sony<sup class="reference" id="cite_ref-SonyOneTouch_19-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[19]  have used NFC technology to pair Bluetooth headsets, media players, and speakers with one tap in its NFC-enabled devices.<sup class="Template-Fact" style="line-height:1em;white-space:nowrap;">[citation needed]  The same principle can be applied to the configuration of Wi-Fi networks. ===Social networking<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">NFC can be used in social networking situations, such as sharing contacts, photos, videos or files,<sup class="reference" id="cite_ref-GoogleIO2011_20-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[20]  and entering multiplayer mobile games.<sup class="reference" id="cite_ref-21" style="line-height:1em;unicode-bidi:-webkit-isolate;">[21]  In the field of social networking NFC is very useful to exchange contacts and other files. ===Identity and access tokens<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">The NFC Forum promotes the potential for NFC-enabled devices to act as electronic identity documents and keycards.<sup class="reference" id="cite_ref-TechEnabler_17-1" style="line-height:1em;unicode-bidi:-webkit-isolate;">[17]  As NFC has a short range and supports encryption, it may be more suitable than earlier, less private RFID systems. ===Smartphone automation and NFC tags<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">Smartphones equipped with NFC can be paired with NFC Tags or stickers which can be programmed by NFC apps to automate tasks. These programs can allow for a change of phone settings, a text to be created and sent, an app to be launched, or any number of commands to be executed, limited only by the NFC app and other apps on the smartphone.

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">These applications are perhaps the most practical current uses for NFC since it does not rely on a company or manufacturer but can be utilized immediately by anyone anywhere with an NFC-equipped smartphone and an NFC tag.<sup class="reference" id="cite_ref-AndyTagsNFC_22-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[22]

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;"> ==Security aspects<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] == <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">Although the communication range of NFC is limited to a few centimeters, NFC alone does not ensure secure communications. In 2006, Ernst Haselsteiner and Klemens Breitfuß described different possible types of attacks, and detail how to leverage NFC's resistance to man-in-the-middle attacks to establish a specific key.,<sup class="reference" id="cite_ref-Security_in_NFC_49-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[49]  Unfortunately, as this technique is not part of the ISO standard, NFC offers no protection against eavesdropping and can be vulnerable to data modifications. Applications may use higher-layer cryptographic protocols (e.g., SSL) to establish a secure channel. ===Eavesdropping<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">The RF signal for the wireless data transfer can be picked up with antennas. The distance from which an attacker is able to eavesdrop the RF signal depends on numerous parameters, but is typically a small number of metres.<sup class="reference" id="cite_ref-50" style="line-height:1em;unicode-bidi:-webkit-isolate;">[50]  Also, eavesdropping is highly affected by the communication mode. A passive device that doesn't generate its own RF field is much harder to eavesdrop on than an active device. An attacker can typically eavesdrop within 10m and 1m for active devices and passive devices, respectively.<sup class="reference" id="cite_ref-Security_in_NFC_49-1" style="line-height:1em;unicode-bidi:-webkit-isolate;">[49]  With the use of a patch loop antenna it is possible to place a receiver close to the target and disguise it. This is much like ATM skimming in that it needs to be near the location however in this case no contact with the device or reader is required. ===Data modification<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">It is easy to destroy data by using a jammer. There is no way currently to prevent such an attack. However, if NFC devices check the RF field while they are sending, it is possible to detect attacks.

<p style="margin-top:0.4em;margin-bottom:0.5em;line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">It is much more difficult to modify data in such a way that it appears to be valid to users. To modify transmitted data, an intruder has to deal with the single bits of the RF signal. The feasibility of this attack, (i.e., if it is possible to change the value of a bit from 0 to 1 or the other way around), is amongst others subject to the strength of the amplitude modulation. If data is transferred with the modified Miller coding and a modulation of 100%, only certain bits can be modified. A modulation ratio of 100% makes it possible to eliminate a pause of the RF signal, but not to generate a pause where no pause has been. Thus, only a 1 that is followed by another 1 might be changed. Transmitting Manchester-encoded data with a modulation ratio of 10% permits a modification attack on all bits. ===Relay attack<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">Because NFC devices usually include ISO/IEC 14443 protocols, the relay attacks described are also feasible on NFC.<sup class="reference" id="cite_ref-51" style="line-height:1em;unicode-bidi:-webkit-isolate;">[51] <sup class="reference" id="cite_ref-Timo_Kasper_et_al._52-0" style="line-height:1em;unicode-bidi:-webkit-isolate;">[52]  For this attack the adversary has to forward the request of the reader to the victim and relay back its answer to the reader in real time, in order to carry out a task pretending to be the owner of the victim's smart card. This is similar to a man-in-the-middle attack. For more information see a survey of practical relay attack concepts.<sup class="reference" id="cite_ref-53" style="line-height:1em;unicode-bidi:-webkit-isolate;">[53]  One of libnfc code examples demonstrates a relay attack using only two stock commercial NFC devices. It has also been shown that this attack can be practically implemented using only two NFC-enabled mobile phones.<sup class="reference" id="cite_ref-54" style="line-height:1em;unicode-bidi:-webkit-isolate;">[54] ===Lost property<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">Losing the NFC RFID card or the mobile phone will open access to any finder and act as a single-factor authenticating entity. Mobile phones protected by a PIN code acts as a single authenticating factor. A way to defeat the lost-property threat requires an extended security concept that includes more than one physically independent authentication factor. ===Walk-off<span class="mw-editsection" style="-webkit-user-select:none;font-size:small;margin-left:1em;line-height:1em;display:inline-block;white-space:nowrap;padding-right:0.25em;unicode-bidi:-webkit-isolate;">[edit] === <p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">Lawfully opened access to a secure NFC function or data is protected by time-out closing after a period of inactivity.<sup class="Template-Fact" style="line-height:1em;white-space:nowrap;">[citation needed] <sup class="noprint Inline-Template" style="line-height:1em;white-space:nowrap;">[original research?]  Attacks may happen despite provisions to shut down access to NFC after the bearer has become inactive. The known concepts described primarily do not address the geometric distance of a fraudulent attacker using a lost communication entity against lawful access from the actual location of the registered bearer. Additional features to cover such an attack scenario dynamically shall make use of a second wireless authentication factor that remains with the bearer in case of the lost NFC communicator. Relevant approaches are described as an electronic leash or its equivalent, a wireless key.

<p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">

<p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">

<p style="line-height:19.190340042114258px;color:rgb(0,0,0);font-family:sans-serif;font-size:12.727272033691406px;">http://www.nfcitaliaworld.it/