5
Step-up analysis and generalization approach for Trusted NFC application Development for enhancing real time use Location Mr. Ashutosh K. Dubey Mr. Manish Giri Mr. Mahendra Sahare Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science T.I.T.R,Bhopal,India BU,Bhopal,India PCST,Bhopal,India [email protected] [email protected] [email protected] Mr. Animesh Kumar Dubey Dept. of Computer Science SSSIST, Bhopal, India [email protected] Abstract- An emerging technology called Near Field Communication (NFC) is used to enable touch between mobile devices. Near Field Communication (NFC) has become an interesting field in communication industry. It helps users to intuitively establish communication between local devices. Accessing devices such as public terminals raises several security concerns in terms of confidentiality and trust. To overcome several issue, NFC can be used to leverage the trusted-computing protocol of remote attestation.NFC is one of the latest wireless communication technologies, making possible variety of business opportunities. The current paper presents a generalized approach for NFC application development, analyzes several aspects towards development including the Mobile Network Operators (MNOs), as well as service providers can make their own application. In recent years instant messaging tools have been successfully introduced to support communication and collaboration processes in work environments. Research suggests that the use of instant messaging tools leads to an increased feeling of connectedness, social presence and awareness within a collaborative group. Keywords –NFC, MNO, Mobile Service, Wireless Environment I. INTRODUCTION The technology enabler is Near Field Communication – NFC , an emerging technology related to RFID, Radio Frequency Identification. NFC allows peer-to-peer connections (P2P) that can be used for various applications. One example is the exchange of business cards between mobile devices. In general, mainstream efforts to harness NFC have targeted payment and ticketing applications. Moreover, it is possible to write information to electronic tags, which can then be attached on a wall or poster to be read with an NFC capable device. Hence, tags in the context of NFC are essentially different from keyword tags describing an online or offline artifact [1, 2, 3, 4]. Creating an on-the-spot friend connection is a delicate event with social pressure to become friends. The technology used – both the hardware and software – should allow fast connection so as not to disrupt friendship creation. Many societies in Asia and Europe have adopted the cellular telephone as their primary means for communication, shopping, and payment processing. Japan, for example already had the contactless payment infrastructure in place so converting to the use of a mobile phone for contactless payment processing has shown a strong level of adoption. standard for NFC technologies, which makes it cross compatible across any device. NFC offers secure data transfer through touching or bringing devices within 20 centimetres of one another [5]. The next generation of cellular telephones includes NFC technology, which will enable consumers to digitally upload a wallet into their cell phones and use it to for credit-based payment for products and services. A digital wallet is an electronic package that allows secure payment transactions without requiring the user to enter sensitive information on unknown sites. Digital wallets were initially used for Internet-based transactions through companies such as MSN and Pay Pal, but have expanded to mobile and other wireless devices in the past decade [6,7]. Using a combination of Near Field Communication (NFC) and mobile phone technology, the Quand application becomes the proxy of an attentive medication manager, handling cueing, deferrals, missed doses, and all other complexities for single or multi-medication regimens. To respond to a cue, the patient must at some point bring the correct NFC-tagged medication package into close proximity to the reader, which acts as confirmation that the dose has been taken. With a mobile phone and medication package fitted with an NFC tag, which authenticates both the consumer and the medication, eliminating medication error risks. Without any user programming, it immediately links the consumer to tools that oversee safety concerns (conflicts, contra-indications), display progress feedback, provide drug and therapy related information, and open a window to additional support resources or advertising. Using a familiar device that is a daily companion - the mobile phone - allows focusing attention on compliance, and not on technology which is shown in fig1. 2011 International Conference on Communication Systems and Network Technologies 978-0-7695-4437-3/11 $26.00 © 2011 IEEE DOI 10.1109/CSNT.2011.73 318

[IEEE 2011 International Conference on Communication Systems and Network Technologies (CSNT) - Katra, Jammu, India (2011.06.3-2011.06.5)] 2011 International Conference on Communication

Embed Size (px)

Citation preview

Page 1: [IEEE 2011 International Conference on Communication Systems and Network Technologies (CSNT) - Katra, Jammu, India (2011.06.3-2011.06.5)] 2011 International Conference on Communication

Step-up analysis and generalization approach for Trusted NFC application Development for enhancing real time use Location

Mr. Ashutosh K. Dubey Mr. Manish Giri Mr. Mahendra Sahare Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science

T.I.T.R,Bhopal,India BU,Bhopal,India PCST,Bhopal,India [email protected] [email protected] [email protected]

Mr. Animesh Kumar Dubey Dept. of Computer Science

SSSIST, Bhopal, India [email protected]

Abstract- An emerging technology called Near Field Communication (NFC) is used to enable touch between mobile devices. Near Field Communication (NFC) has become an interesting field in communication industry. It helps users to intuitively establish communication between local devices. Accessing devices such as public terminals raises several security concerns in terms of confidentiality and trust. To overcome several issue, NFC can be used to leverage the trusted-computing protocol of remote attestation.NFC is one of the latest wireless communication technologies, making possible variety of business opportunities. The current paper presents a generalized approach for NFC application development, analyzes several aspects towards development including the Mobile Network Operators (MNOs), as well as service providers can make their own application. In recent years instant messaging tools have been successfully introduced to support communication and collaboration processes in work environments. Research suggests that the use of instant messaging tools leads to an increased feeling of connectedness, social presence and awareness within a collaborative group. Keywords –NFC, MNO, Mobile Service, Wireless Environment

I. INTRODUCTION

The technology enabler is Near Field Communication – NFC , an emerging technology related to RFID, Radio Frequency Identification. NFC allows peer-to-peer connections (P2P) that can be used for various applications. One example is the exchange of business cards between mobile devices. In general, mainstream efforts to harness NFC have targeted payment and ticketing applications. Moreover, it is possible to write information to electronic tags, which can then be attached on a wall or poster to be read with an NFC capable device. Hence, tags in the context of NFC are essentially different from keyword tags describing an online or offline artifact [1, 2, 3, 4]. Creating an on-the-spot friend connection is a delicate event with social pressure to become friends. The technology used – both the hardware and software – should allow fast connection so as not to disrupt friendship creation.

Many societies in Asia and Europe have adopted the cellular telephone as their primary means for communication, shopping, and payment processing. Japan, for example already had the contactless payment infrastructure in place so converting to the use of a mobile phone for contactless payment processing has shown a strong level of adoption. standard for NFC technologies, which makes it cross compatible across any device. NFC offers secure data transfer through touching or bringing devices within 20 centimetres of one another [5]. The next generation of cellular telephones includes NFC technology, which will enable consumers to digitally upload a wallet into their cell phones and use it to for credit-based payment for products and services. A digital wallet is an electronic package that allows secure payment transactions without requiring the user to enter sensitive information on unknown sites. Digital wallets were initially used for Internet-based transactions through companies such as MSN and Pay Pal, but have expanded to mobile and other wireless devices in the past decade [6,7]. Using a combination of Near Field Communication (NFC) and mobile phone technology, the Quand application becomes the proxy of an attentive medication manager, handling cueing, deferrals, missed doses, and all other complexities for single or multi-medication regimens. To respond to a cue, the patient must at some point bring the correct NFC-tagged medication package into close proximity to the reader, which acts as confirmation that the dose has been taken. With a mobile phone and medication package fitted with an NFC tag, which authenticates both the consumer and the medication, eliminating medication error risks. Without any user programming, it immediately links the consumer to tools that oversee safety concerns (conflicts, contra-indications), display progress feedback, provide drug and therapy related information, and open a window to additional support resources or advertising. Using a familiar device that is a daily companion - the mobile phone - allows focusing attention on compliance, and not on technology which is shown in fig1.

2011 International Conference on Communication Systems and Network Technologies

978-0-7695-4437-3/11 $26.00 © 2011 IEEE

DOI 10.1109/CSNT.2011.73

318

Page 2: [IEEE 2011 International Conference on Communication Systems and Network Technologies (CSNT) - Katra, Jammu, India (2011.06.3-2011.06.5)] 2011 International Conference on Communication

Consumer characteristics for coupon redemption begin with the obvious socioeconomic demographics used to depict many consumer segments. Researchers however have attempted to define this group of consumers based on other more deeply rooted characteristics. The remaining of this paper is organized as follows. We discuss NFC contactless communication API in Section 2. In Section 3 we discuss about MNO. The Evolution and need of NFC in section 4.In section 5 we discuss about Recent Scenario. The conclusions and future directions are given in Section 6. Finally references are given.

Fig 1 NFC Environment

II. NFC CONTACTLESS COMMUNICATION API

Near-field Communication (NFC) is characterized as a very short-range radio communication technology with a lot of

potential, especially when applied to mobile handsets. Imagine yourself using your cell phone to interact with posters, magazines, and even with products while at the store, and with such interaction initiating a request or search for related information in real-time. Other usages of NFC include the electronic wallet to make payments using your handset, the same way you do with your credit card. With NFC all this is possible. But NFC is still a young technology. That said, NFC-enabled handsets are being introduced into the market, and deployments and pilots around the world are occurring. This article explores NFC and how you can leverage it in your Java application by using the Contactless Communications API. Ear-field Communication or NFC is a standard defined by the NFC Forum, a global consortium of hardware, software/application, credit card companies, banking, network-providers, and others who are interested in the advancement and standardization of this promising technology. NFC is a short-range radio technology that operates on the 13.56 MHz frequency, with data transfers of up to 424 kilobits per second. NFC communication is triggered when two NFC-compatible devices are brought within close proximity, around four centimetres. Because the transmission range is so short, NFC-based transactions are inherently secure; more on this shortly.

Fig 2 NFC Controller

319

Page 3: [IEEE 2011 International Conference on Communication Systems and Network Technologies (CSNT) - Katra, Jammu, India (2011.06.3-2011.06.5)] 2011 International Conference on Communication

The following table provides a quick comparison:

Fig 3: Comparison

III. MNO

A mobile network operator (MNO), also known as mobile phone operator (or simply mobile operator or mobo ), carrier service provider (CSP), wireless service provider, wireless carrier, or cellular company, is a telephone company that provides services for mobile phone subscribers. One essential characteristic that defines a mobile network operator is that they must have acquired a radio spectrum license from the government before they can clear mobile phone service within a country. The precise spectrum obtained does depend on the type of mobile phone technology the operator intends to deploy. For example, a Global System for Mobile Communications (GSM) network operator will require a GSM frequency range. The government allocates spectrum using whichever method it chooses, although the most common method is an auction. Recent allocation of 3G and WiMax licenses in Europe and India (only 3G in India) have been auctioned. Another category of mobile network operator is emerging in some markets called the Mobile Virtual Network Operator (MVNO). As far as the subscriber is concerned, they seem identical to regular mobile network operators. The critical difference is that they do not own the underlying network of base stations, but lease it instead from another incumbent operator in that country. A mobile operator may also act as an MVNO, for example if they do not have coverage in a particular geographical region. This is also called National Roaming. The operator may actually own a license to operate but they have chosen not to deploy assets there (for example Meteor uses

the Vodafone network in the west of Ireland). Alternatively the operator may not own a particular frequency. An MVNO's roles and relationship to the MNO vary by market, country and the individual situations of the MNO and MVNO. In general, an MVNO is an entity or company that works independently of the mobile network operator and can set its own pricing structures, subject to the rates agreed with the MNO. Usually, the MVNO does not own any GSM, CDMA or other core mobile network related infrastructure, such as mobile switching centers (MSCs), or a radio access network. Some may own their own home location register, or HLR, which allows more flexibility and ownership of the subscriber's mobile phone number (MSISDN)—in this case, the MVNO appears as a roaming partner to other networks abroad, and as a network within its own region. Some MVNOs run their own billing and customer care solutions known as business support systems (BSS). Many use an MVNE.

IV. EVOLUTION AND NEED OF NFC

There has been growing interest in providing location-based information and supporting collaboration between people. There are several studies, some dating to the 1990s, that have dealt with tags and collaboration awareness [8, 9,10]. Previous research has also focused on social media services in the workplace and specifically on the motivations for social networking at work. Digital coupons are also being piloted. However, reported studies have only used discounting promotions that are not submitted for redemption, for example Kondo et al (2007) compared the use of direct mail postcards versus mobile phone digital coupons sent via picture message that, when presented, provided the customer with a percent-off discount[11] Another study tested e-coupon usage determinants that have been proven to predict traditional coupon usage but did not compare between the coupon types and therefore simply confirmed that e-coupon use is determined by the same factors as traditional coupon use[12]. There is NFC enabled mobile phone to the market. This phone has capability of information sharing, service initiation and payment & ticketing. It means it can be used the same way as existing contactless smart cards and key tags to allow access and make small payments [13]. The main philosophy of the networked RFID is that it tries to remove data from the tag and manipulates the data on the network [14]. Therefore, it makes the code which tag holds as small as possible. The size of the code which is defined by EPCglobal is 96 bits or 128 bits. Another application domain of NFC and RFID is e-ticketing [15]. There are already some large systems successfully in place and established, like the Octopus Card in Hong Kong,

320

Page 4: [IEEE 2011 International Conference on Communication Systems and Network Technologies (CSNT) - Katra, Jammu, India (2011.06.3-2011.06.5)] 2011 International Conference on Communication

Suica Card in Tokio, Oyster Card in London or Touch & Travel in Germany. Near Field Communication (NFC) is a new, short-range wireless connectivity technology that evolved from a combination of existing contact less identification and interconnection technologies [16]. Products with built-in NFC will dramatically simplify the way consumer devices interact with one another, helping people speed connections, receive and share information and even make fast and secure payments. The major advantage of NFC over other wireless communication technology is simplicity

V. RECENT SCENARIO

In 2010, Rainer Steffen et.al [17] proposed different NFC based use cases in an automotive context. Nearly all described use cases have been implemented in a BMW vehicle to get experiences of NFC in a real in-car environment. They describe the underlying soft- and hardware architecture and our experiences in setting up the prototype. In 2010, H. AZIZA [18] proposed about a mobile phone application which brings two new features into social networks: an advertising service and a location based service. With this application, mobile operators will play a central role in an advertising chain comprising businesses, mobile operators and online communities. Thus, the mobile phone becomes a powerful tool to share consumer and travellers experiences. This application relies on leveraging new technologies as NFC (Near Field Communication) and SCWS (Smart Card Web Server). In 2010, Heljä Franssila [19] proposed about how security service personnel experienced the usability, reliability and work performance effects of the current NFC service in use,what were the key development needs related to the information management and communication in their work, and which of the future NFC scenarios were found to be potentially most attractive. The results of the study show that user experiences of the NFC service were moderately positive, though there were mixed results considering the performance effects of use of NFC services. Potential usefulness of proposed future NFC service functionalities was considered quite high. In 2010, A. Vilmos et al. [20] proposed about the prototype of an application framework based on the generalized approach that provides not only the opportunity to create a new skin for the already existing application, but also makes possible rapid implementation of any kind of the business logic and the user interface. Further benefit of the application framework is that the technological details are hidden from the service application developers thus they can focus only on the proper implementation of the business logic and the user interface. The use of the environment has been demonstrated on a concrete application.

In 2010, Erkki Siira [21] proposed about NFC-based multimodal social media application Hot in the City. This application allows users to make friends by touching other users’ NFC devices through the peer-to-peer mode. Users can also inform friends of their current location by touching hotspot tags. This study describes the three NFC modes in detail and delineates what kind of impact NFC has had in the creation of the Hot in the City social media application. In addition, we analyse how the use of different NFC modes – reader/writer and peer-to-peer – has unique consequences on user interface and system design. Even though NFC offers intuitive, natural interactions, the changing between modes seemed to confuse less experienced users. In 2010, Lishoy Francis [22] proposed about low cost security framework including a PKI based security protocol, which can be used to integrate transactions involving external contact based smart cards, for the purposes of e-identification, epayment, e-ticketing, and communication services. They designed and implemented a secure Communications Protocol Translator Interface (CPTI), which allows an NFC, enabled mobile phone to access and use, over a contactless interface, any additional smart cards (or secure elements (SE)) which are externally available on a contact based interface and vice-versa.

VI. CONCLUSIONS AND FUTURE DIRECTIONS

With the evolution of mobile phones supporting multiple reader interfaces, it is now possible to include the transactions originating from such smart cards. We have improved the interaction of NFC devices with external smart cards especially those with contact based interface by providing a secure communication protocol translator interface, CPTI. In future we present a security framework model and a public key based security protocol which would allow any NFC enabled mobile phone to access and use, over contactless interface, any additional smart cards which are externally available on contact based interface. The results provide a secure interface, for communication between internal and external SEs, using the mobile phone as a portal, over contactless and contact interfaces; and which also securely binds the disjoint passive tokens available over contactless and contact interfaces.

REFERENCES

[1] Chang, Y., Liu, H., Chou, L., Chen, Y., and Shin, H. A General Architecture of Mobile Social Network Services. Proc. ICCIT 2007. IEEE Computer Society (2007), 151-156. [2] DiMicco, J., Millen, D. R., Geyer, W., Dugan, C.,Brownholtz, B., and Muller, M. 2008. Motivations for social networking at work. Proc. CSCW 2008, ACM Press (2008), 711-720. [3] Ellison, N.B., Steinfield, C., and Lampe, C. The Benefits of Facebook "Friends:" Social Capital and College Students' Use of Online Social Network Sites. JCMC 12, 4 (2007), 1143-1168.

321

Page 5: [IEEE 2011 International Conference on Communication Systems and Network Technologies (CSNT) - Katra, Jammu, India (2011.06.3-2011.06.5)] 2011 International Conference on Communication

[4] Golder, S.A., and Huberman, B.A. Usage Patterns of Collaborative Tagging Systems. Journal of Information Science 32, 2 (2006), 198-208. [5] Hall, E. T. The Hidden Dimension. Anchor Books, 1966. [6] Anonymous. Near field communication in the real world – part 1: Turning the NFC promise into profitable, everyday applications. 2006. [7] Digital wallet technology - using digital wallets,the punctuated evolution of digital wallets, challenges for the future.AvailableFrom:http://ecommerce.hostip.info/pages/330/Digital-Wallet-Technology.html. [8] Want, R., Hopper, A., Falcão, V., and Gibbons, J. 1992.The active badge location system. ACM Trans. Inf. Syst. 10, 1 (1992), 91-102. [9] Borovoy, R., Martin, F., Vemuri, S., Resnick, M.,Silverman, B., and Hancock, C. Meme tags and community mirrors: moving from conferences to collaboration. Proc. CSCW 2008, ACM Press (2008),159-168. [10] Holmquist, L.E., Falk J., and Wigström, J. Supporting Group Collaboration with Inter-Personal Awareness Devices. Personal Technologies, Vol. 3, Nos. 1&2 (1999), 13–21. [11] Hsu T, Wang Y, Wen S. "Using the decomposed theory of planned behaviour to analyse consumer behavioural intention towards mobile text message coupons". Journal of Targeting, Measurement and Analysis for Marketing. 2006 Jul;14(4):309. [12] Chiou-Wei S, Inman JJ. "Do shoppers like electronic coupons?". J Retail. 2008 Sep;84(3):297. [13] Nokia6131, "Nokia 6131 NFC Phone," 2007. [14] B. Rosenberg, RFID : applications, security, and privacy. Upper Saddle River, NJ: Addison-Wesley, 2006. [15] G. Roussos. “Networked RFID: Systems, Software and Services”,Springer Publishing Company Inc., 2008, pp. 15-22. [16] NFC Record Type Definition, NFC Forum Technical Specification,RTD 1.0, July 2006. [17] Rainer Steffen, Jörg Preißinger, Tobias Schöllermann ,Second International Workshop on Near Field Communication,2010,IEEE. [18] H. AZIZA, Second International Workshop on Near Field Communication,2010 IEEE. [19] Heljä Franssila, Second International Workshop on Near Field Communication,2010 IEEE. [20] B. Benyó, B. Sódor, G. Fördős, L. Kovács, A. Vilmos, Second International Workshop on Near Field Communication,2010 IEEE. [21] Erkki Siira, Vili Törmänen, Second International Workshop on Near Field Communication,2010,IEEE. [22] L.Francis, Gerhard.Hancke, Keith.Mayes, K.Markantonakis , 2010 Sixth Advanced International Conference on Telecommunications,IEEE.

322