Wireless Personal Communications

, Volume 71, Issue 3, pp 2259–2294 | Cite as

A Survey on Near Field Communication (NFC) Technology

Article

Abstract

Near Field Communication (NFC) as a promising short range wireless communication technology facilitates mobile phone usage of billions of people throughout the world that offers diverse services ranging from payment and loyalty applications to access keys for offices and houses. Eventually NFC technology integrates all such services into one single mobile phone. NFC technology has emerged lately, and consequently not much academic source is available yet. On the contrary, due to its promising business case options, there will be an increasing amount of work to be studied in the very close future. This paper presents the concept of NFC technology in a holistic approach with different perspectives, including communication essentials with standards, ecosystem and business issues, applications, and security issues. Open research areas and further recommended studies in terms of academic and business point of view are also explored and discussed at the end of each major subject’s subsection. This comprehensive survey will be a valuable guide for researchers and academicians as well as for business world interested in NFC technology.

Keywords

Near field communication NFC Survey Communication essentials Ecosystem Business Security Applications Application development Secure element 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aigner, M., Dominikus S., & Feldhofer, M. (2007). A system of secure virtual coupons using NFC technology. In Proceedings of fifth annual IEEE international conference on pervasive computing and communications workshops, pp. 362–366.Google Scholar
  2. 2.
    Ali, W., El Kilani, W., & Hadhoud, M. (2010). Simulation of NFCIP-1 protocol over NS-2. In Proceedings of 7th international conference on informatics and systems, Cairo, Egypt, pp. 1–6.Google Scholar
  3. 3.
    Alimi, V., & Pasquet, M. (2009). Post-distribution provisioning and personalization of a payment application on a UICC based secure element. In Proceedings of international conference on availability, reliability and security, Fukuoka, pp. 701–705.Google Scholar
  4. 4.
    Aziza, H. (2010). NFC Technology in mobile phone next-generation services. In Proceedings of the 2nd international workshop on near field communication, Monaco, pp. 21–26.Google Scholar
  5. 5.
    Baldo, D., Benelli, G., & Pozzebon, A. (2010). The SIESTA project: Near Field Communication, based applications for tourism. In Proceedings of 7th international symposium on communication systems networks and digital signal processing, Newcastle upon Tyne, pp. 721–725.Google Scholar
  6. 6.
    Benelli, G., & Pozzebon, A. (2010). An automated payment system for car parks based on near field communication technology. In Proceedings of international conference for internet technology and secured transactions (ICITST), London, pp. 1–6.Google Scholar
  7. 7.
    Benyó, B., et al. (2009). The StoLPan view of the NFC ecosystem. In Proceedings of the conference on wireless telecommunications symposium, Prague, pp. 1–5.Google Scholar
  8. 8.
    Benyó, B. (2009). Business process analysis of NFC-based services. In Proceedings of IEEE 7th international conference on computational cybernetics, Palma de Mallorca, Spain, pp. 75–79.Google Scholar
  9. 9.
    Benyó, B., et al. (2007). NFC applications and business model of the ecosystem. In Proceedings of 16th IST mobile and wireless communications summit, Budapest, pp. 1–5.Google Scholar
  10. 10.
    Benyó, B., et al. (2007). The design of NFC based applications. In Proceedings of 11th international conference on intelligent engineering systems, Budapest, pp. 277–280.Google Scholar
  11. 11.
    Biader Ceipidor, U., et al. (2008) NFC: Integration between RFID and mobile, state of the art and future developments. In Proceedings of emerging technologies for radio frequency identification, pp. 78–81.Google Scholar
  12. 12.
    Blöckner, M., et al. (2009). Please touch the exhibits!: Using NFC-based interaction for exploring a museum. In Proceedings of the 11th international conference on human–computer interaction with mobile devices and services, Bonn, Germany.Google Scholar
  13. 13.
    Bravo, J., Hervas, R., Fuentes, C., Chavira, G., & Nava, S. W. (2008). Tagging for nursing care. In Proceedings of second international conference on pervasive computing technologies for healthcare, Tampere, pp. 305–307.Google Scholar
  14. 14.
    Bravo, J., et al. (2007). Touch-based interaction: An approach through NFC. In Proceedings 3rd IET international conference on intelligent environments, Ulm, pp. 440–446.Google Scholar
  15. 15.
    Bravo, J., et al. (2008). Enabling NFC technology for supporting chronic diseases: A proposal for Alzheimer caregivers. In Proceedings of the European conference on ambient intelligence, pp. 109–125.Google Scholar
  16. 16.
    Bravo, J., et al. (2008). Enabling NFC technology to support activities in an Alzheimer’s day center. In Proceedings of the 1st international conference on pervasive technologies related to assistive environments, Athens, Greece.Google Scholar
  17. 17.
    Bravo, J., et al. (2008). From implicit to touching interaction: RFID and NFC approaches. In Proceedings of conference on human system interactions, Krakow, pp. 743–748.Google Scholar
  18. 18.
    Bravo, J., et al. (2008). Identification technologies to support Alzheimer contexts. In Proceedings of the 1st international conference on pervasive technologies related to assistive environments, Athens, Greece.Google Scholar
  19. 19.
    Bravo, J., et al. (2008). Towards natural interaction by enabling technologies: A near field communication approach. In Proceedings of AmI 2007 workshops, pp. 338–351.Google Scholar
  20. 20.
    Broll, G., et al. (2010). Touch to play—mobile gaming with dynamic, NFC-based physical user interfaces. In Proceedings of the 12th international conference on human computer interaction with mobile devices and services, Lisboa.Google Scholar
  21. 21.
    Broll, G., et al. (2011). Touch to play—exploring touch-based mobile interaction with public displays. In Proceedings of 3rd international workshop on near field communication, Hagenberg, Austria, pp. 15–20.Google Scholar
  22. 22.
    Brown, T. W. C., & Diakos, T. (2011). On the design of NFC antennas for contactless payment applications. In Proceedings of the 5th European conference on antennas and propagation (EUCAP), pp. 44–47.Google Scholar
  23. 23.
    Büttgen, J., et al. (2009). Mobile interaction with an NFC-based billboard. In Adjunct Proceedings of the 11th international conference on human-computer interaction with mobile devices and services, Bonn, Germany.Google Scholar
  24. 24.
    Cappiello, I., Puglia, S., & Vitaletti A. (2009). Design and initial evaluation of a ubiquitous touch-based remote grocery shopping process. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 9–14.Google Scholar
  25. 25.
    Chang Y., Chang C., Hung Y., Tsai C. (2010) NCASH: NFC phone-enabled personalized context awareness smart-home environment. Journal of Cybernetics and Systems 41(2): 123–145MATHCrossRefGoogle Scholar
  26. 26.
    Chang, Y., et al. (2009). Toward a NFC phone-driven context awareness smart environment. In Proceedings of symposia and workshops on ubiquitous, autonomic and trusted computing, Brisbane, QLD, pp. 298–303.Google Scholar
  27. 27.
    Chavira, G., et al. (2007). Towards touching interaction: A simple explicit input. In Proceedings of fourth annual international conference on mobile and ubiquitous systems: Networking & services, Philadelphia, pp. 1–5.Google Scholar
  28. 28.
    Chen, W. D., et al. (2010). Using 3G network components to enable NFC mobile transactions and authentication. In Proceedings of international conference on progress in informatics and computing, pp. 441–448.Google Scholar
  29. 29.
    Chen, W. D., et al. (2011). NFC mobile payment with citizen digital certificate. In Proceedings of 2nd international conference on next generation information technology, Gyeongju, pp. 120–126.Google Scholar
  30. 30.
    Chen, W. (2010). NFC mobile transactions and authentication based on GSM network. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 83–89.Google Scholar
  31. 31.
    Chen, X., Lu, F., & Ye T. T. (2009). Mutual coupling of stacked UHF RFID antennas in NFC applications. In Proceedings of IEEE antennas and propagation society international symposium, Charleston, SC, pp. 1–4.Google Scholar
  32. 32.
    Chen Y. et al (2010) Analysis of antenna coupling in near-field communication systems. IEEE Transactions on Antennas and Propagation 58(10): 3327–3335CrossRefGoogle Scholar
  33. 33.
    Cheng, H. C., et al. (2011). A secure and practical key management mechanism for NFC read–write mode. In Proceedings on international conference on advanced communication technology, Seoul, pp. 1095–1011.Google Scholar
  34. 34.
    Cho, J. H., et al. (2007). An NFC transceiver with RF-powered RFID transponder mode. In Proceedings of international solid state circuits conference, Jeju, pp. 172–175.Google Scholar
  35. 35.
    Cho, J. H., Cole, P. H., & Kim, S. (2009). An NFC transceiver using an inductive powered receiver for passive, active, RW and RFID modes. In Proceedings of international SoC design conference (ISOCC), pp. 456–459.Google Scholar
  36. 36.
    Coskun, V., Ok, K., Ozdenizci, B. (2012) Near Field Communication (NFC): From Theory to Practice. London: Wiley. ISBN: 978-1-1199-7109-2, February, 2012.Google Scholar
  37. 37.
    Damme, G., et al. (2009). Offline NFC payments with electronic vouchers. In Proceedings of the 1st ACM workshop on networking, systems, and applications for mobile handhelds, pp. 25–30.Google Scholar
  38. 38.
    Dobrigkeit, P., et al. (2008). Exchange of contact data between mobile phones using NFCIP. In Proceedings of 4th European Workshop on RFID Systems and Technologies, Freiburg, Germany, pp. 1–9.Google Scholar
  39. 39.
    Dominikus, S., & Aigner, M. (2007). mCoupons: An application for near field communication (NFC). In Proceedings of 21st international conference on advanced information networking and applications workshops, Niagara Falls, pp. 421–428.Google Scholar
  40. 40.
    Dünnebeil, S., et al. (2011). Encrypted NFC emergency tags based on the German telematics infrastructure. In Proceedings of 3rd international workshop on near field communication, Hagenberg, Austria, pp. 50–55.Google Scholar
  41. 41.
    ECMA International. (2004). ECMA 340: Near field communication interface and protocol (NFCIP-1). Available at: http://www.ecma-international.org/memento/TC47-M.htm.
  42. 42.
    ECMA International. (2006). ECMA 373: Near field communication wired interface (NFC-WI). Available at: http://www.ecma-international.org/memento/TC47-M.htm.
  43. 43.
    ECMA International. (2008). NFC-SEC. White paper. Available at: http://www.ecma-international.org/activities/Communications/tc47-2008-089.pdf.
  44. 44.
    ECMA International. (2010). ECMA 352: Near field communication interface and protocol (NFCIP-2). Available at: http://www.ecma-international.org/memento/TC47-M.htm.
  45. 45.
    Ervasti, M., et al. (2009). Bringing technology into school—NFC-enabled school attendance supervision. In Proceedings of the 8th international conference on mobile and ubiquitous multimedia. Article (4).Google Scholar
  46. 46.
    Ervasti, M., et al. (2009). Experiences from NFC supported school attendance supervision for children, In Proceedings of third international conference on mobile ubiquitous computing, systems, services and technologies, Sliema, pp. 22–30.Google Scholar
  47. 47.
    ETSI TS. (2008). ETSI TS 102 613, smart cards; UICC—contactless front-end (CLF) interface; part 1: Physical and data link layer characteristics. Technical specification.Google Scholar
  48. 48.
    ETSI TS. (2008). ETSI TS 102 622, smart cards; UICC—contactless front-end (CLF) interface; host controller interface (HCI). Technical specification.Google Scholar
  49. 49.
    Finkenzeller, K. (2010). RFID handbook: Fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication. London: Wiley. ISBN: 978-0-470-69506-7.Google Scholar
  50. 50.
    Fontecha, J., et al. (2011). An NFC approach for nursing care training. In Proceedings of 3rd international workshop on near field communication, Hagenberg, Austria, pp. 38–43.Google Scholar
  51. 51.
    Francis, L. (2010). A security framework model with communication protocol translator interface for enhancing NFC transactions. In Proceedings of sixth advanced international conference on telecommunications, Barcelona, pp. 452–461.Google Scholar
  52. 52.
    Francis L. et al (2010) On the security issues of NFC enabled mobile phones. In International Journal of Internet Technology and Secured Transactions 2(3/4): 336–335Google Scholar
  53. 53.
    Francis, L., et al. (2010). Practical NFC peer-to-peer relay attack using mobile phones. In Proceedings of the 6th international conference on radio frequency identification: Security and privacy issues, pp. 35–49.Google Scholar
  54. 54.
    Francis, L., Hancke, G., Mayes, K., & Markantonakis, K. (2009). Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. In Proceedings of international conference for internet technology and secured transactions, London, pp. 1–8.Google Scholar
  55. 55.
    Franssila, H. (2010). User experiences and acceptance scenarios of NFC applications in security service field work. In Proceedings of the second international workshop on near field communication, Monaco, pp. 39–44.Google Scholar
  56. 56.
    Fressancourt, A., Herault, C., & Ptak, E. (2009). NFCSocial: Social networking in mobility through IMS and NFC. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 24–29.Google Scholar
  57. 57.
    Garrido, P. C., et al. (2011). Use of NFC-based pervasive games for encouraging learning and student motivation. In Proceedings of 3rd international workshop on near field communication, Hagenberg, Austria, pp. 33–37.Google Scholar
  58. 58.
    Gebhart, M., & Szoncso, R. (2010). Optimizing design of smaller antennas for proximity transponders. In Proceedings of the 2010 second international workshop on near field communication, Monaco, pp. 77–82.Google Scholar
  59. 59.
    Ghiron, S. L., Sposato, S., Medaglia, C. M. & Moroni, A. (2009). NFC ticketing: A prototype and usability test of an NFC-based virtual ticketing application. In Proceedings of the first international workshop on near field communication, Hagenberg, Austria, pp. 45–50.Google Scholar
  60. 60.
    GlobalPlatform. (2009). GlobalPlatform’s proposition for NFC mobile: Secure element management and messaging. White paper. Available at: http://www.globalplatform.org/documents/GlobalPlatform_NFC_Mobile_White_Paper.pdf.
  61. 61.
    GlobalPlatform. (2006). GlobalPlatform card specification, version 2.2, http://www.globalplatform.org/specificationscard.asp.
  62. 62.
    Globalplatform, GlobalPlatform Mobile Task Force. (2010). Requirements for NFC mobile: Management of multiple secure elements version 1.0. Available at: http://www.globalplatform.org/documents/whitepapers/GlobalPlatform_Requirements_Secure_Elements.pdf.
  63. 63.
    Golovashych, S. (2005). The technology of identification and authentication of financial transactions from smart cards to NFC-terminals. In Proceedings of IEEE intelligent data acquisition and advanced computing systems: Technology and applications, Sofia, pp. 407–412.Google Scholar
  64. 64.
    Gossar, M., et al. (2011). Investigations to achieve very high data rates for proximity coupling devices at 13.56 MHz and NFC applications. In Proceedings of the 3rd international workshop on near field communication, Hagenberg, Austria, pp.71–76.Google Scholar
  65. 65.
    Grunberger, S., & Langer, J. (2009). Analysis and test results of tunneling IP over NFCIP-1. In Proceedings of the first international workshop on near field communication, Hagenberg, Austria, pp. 93–97.Google Scholar
  66. 66.
    GSMA. (2007). Pay-buy mobile business opportunity analysis, version 1.0. White paper. Available at: http://www.gsmworld.com/documents/gsma_nfc_tech_guide_vs1.pdf.
  67. 67.
    Haikio, J., Tuikka, T., Siira, E., & Tormanen, V. (2010). Would you be my friend?—creating a mobile friend network with ‘Hot in the City’. In Proceedings of the 43rd Hawaii international conference on system sciences, Hawaii, USA, pp. 1–10.Google Scholar
  68. 68.
    Hardy, R., & Rukzio, E. (2008). Touch & interact: Touch-based interaction of mobile phones with displays. In Proceedings of the 10th international conference on human computer interaction with mobile devices and services, pp. 245–254.Google Scholar
  69. 69.
    Hardy, R., & Rukzio, E. (2008). Touch & interact: Touch-based interaction with a tourist application. In Proceedings of the 11th international conference on human–computer interaction with mobile devices and services, Bonn, Germany.Google Scholar
  70. 70.
    Hardy, R., et al. (2010). MyState: Using NFC to share social and contextual information in a quick and personalized way. In Proceedings of the 12th ACM international conference adjunct papers on ubiquitous computing, Copenhagen, Denmark, pp. 447–448.Google Scholar
  71. 71.
    Haselsteiner, E., & Breitfuß, K. (2006). Security in near field communication (NFC)”, Philips semiconductors. Available at: http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf.
  72. 72.
    Ho, T. & Chen, R. (2011). Leveraging NFC and LBS technologies to improve user experiences. In Proceedings of international joint conference on service sciences, Taiwan, pp. 17–21.Google Scholar
  73. 73.
    Hsiang H.C. et al (2009) A secure mCoupon scheme using near field communication. International Journal of Innovative Computing, Information and Control 5(11): 3901–3909Google Scholar
  74. 74.
    Iglesias, R., et al. (2009). Experiencing NFC-based touch for home healthcare. In Proceedings of the 2nd international conference on pervasive technologies related to assistive environments, Corfu, Greece.Google Scholar
  75. 75.
    Isomursu M. (2008) Tags and the city. PsychNology Journal 6(2): 131–156Google Scholar
  76. 76.
    Ivanov, R. (2010). Indoor Navigation system for visually impaired. In Proceedings of international conference on computer systems and technologies, Sofia, Bulgaria.Google Scholar
  77. 77.
    Jara, A. J., et al. (2010). A pharmaceutical intelligent information system to detect allergies and adverse drugs reactions based on internet of things. In Proceedings of 8th IEEE international conference on pervasive computing and communications workshops, Mannheim, pp. 809–812.Google Scholar
  78. 78.
    Jara, A. J., et al. (2010). Evaluation of the security capabilities on NFC-powered devices. In i, Ciudad, Spain, pp. 1–9.Google Scholar
  79. 79.
    Jara, A. J., Zamora, M. A., & Skarmeta, A. F. G. (2009). Secure use of NFC in medical environments. In Proceedings of 5th European workshop on RFID systems and technologies, Bremen, Germany, pp. 1–8.Google Scholar
  80. 80.
    Jara, J., et al. (2010). Drugs interaction checker based on IoT. In Proceedings of internet of things, Tokyo, pp. 1–8.Google Scholar
  81. 81.
    Jaring, P., Tormanen, V., Siira, E., & Matinmikko, T. (2007). Improving mobile solution workflows and usability using near field communication technology. In i, Darmstadt, Germany, pp. 358–373.Google Scholar
  82. 82.
    Juntunen, A., Luukkainen, S., & Tuunainen, V. K. (2010). Deploying NFC technology for mobile ticketing services-identification of critical business model issues. In Proceedings of ninth international conference on mobile business and 2010 ninth global mobility roundtable, pp. 82–90.Google Scholar
  83. 83.
    Kadambi, K. S., et al. (2009). Near-field communication-based secure mobile payment service. In Proceedings of the 11th international conference on electronic commerce, pp. 142–151.Google Scholar
  84. 84.
    Kalman, G., & Noll, J. (2007). SIM as secure key storage in communication networks. In Proceedings of 3rd international conference on wireless and mobile communications, Guadeloupe, pp. 55–55.Google Scholar
  85. 85.
    Karpischek, S., Michahelles, F., Bereuter, A., & Fleisch, E. (2009). A maintenance system based on near field communication. In Proceedings of the 3rd international conference on next generation mobile applications, services and technologies, Cardiff, Wales, UK, pp. 234–238.Google Scholar
  86. 86.
    Karpischek, S., Michahelles, F., Resatsch, F., & Fleisch, E. (2009). Mobile sales assistant—an NFC-based product information system for retailers. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 20–23.Google Scholar
  87. 87.
    Kefalakis, N., et al. (2008). Supply chain management and NFC picking demonstrations using the AspireRfid middleware platform. In Proceedings of the ACM/IFIP/USENIX Middleware ’08 conference companion, Leuven, Belgium, pp. 66–69.Google Scholar
  88. 88.
    Kennedy, T., & Hunt, R. (2008). A review of WPAN security: Attacks and prevention. In Proceedings of the international conference on mobile technology, applications, and systems, Article 56.Google Scholar
  89. 89.
    Kneissl, F., et al. (2009). All-i-touch as combination of NFC and lifestyle. In Proceedings of 1st international workshop on near field communication, Hagenberg, Austria, pp. 51–55.Google Scholar
  90. 90.
    Köbler, F., Koene, P., Krcmar, H., Altmann, M., & Leimeister, J. M. (2010). LocaTag—an NFC-based system enhancing instant messaging tools with real-time user location. In Proceedings of the 2nd international workshop on near field communication, Monaco, pp. 57–61.Google Scholar
  91. 91.
    Laukkanen, M. (2007). Towards operating identity-based NFC services. In Proceedings of IEEE international conference on pervasive services, Istanbul, pp. 92–95.Google Scholar
  92. 92.
    Liikka, J., et al. (2008). KAMO—Mobile guide for the city traveller. In Proceedings of 4th international conference on intelligent environments, Seattle, WA, pp. 1–7.Google Scholar
  93. 93.
    Lin., W., et al. (2009). Optimization of NFC compatible transponder with respect to the nonlinear IC impedance. In Proceedings of international microwave workshop on wireless sensing, local positioning, and RFID, Croatia, pp. 1–4.Google Scholar
  94. 94.
    Lin, Y. S., et al. (2009). Near-field communication using phase-locking and pulse signaling for millimeter-scale systems. In Proceedings of IEEE 2009 custom integrated circuits conference (CICC), San Jose, CA, pp. 563–566.Google Scholar
  95. 95.
    López-de-Ipiña, D. (2007). Touch computing: Simplifying human to environment interaction through NFC technology. In 1as Jornadas Científicas sobre RFID, 21 a 23 de noviembre de 2007.Google Scholar
  96. 96.
    Lou, Z. (2010). NFC enabled smart postal system. In Proceedings of the 2nd international workshop on near field communication, Monaco, pp. 33–38.Google Scholar
  97. 97.
    Madlmayr, G. (2008). A mobile trusted computing architecture for a near field communication ecosystem. In Proceedings of the 10th international conference on information integration and web-based applications & services, pp. 563–566.Google Scholar
  98. 98.
    Madlmayr, G., et al. (2007). The benefit of using SIM application toolkit in the context of near field communication applications. In Proceedings of international conference on the management of mobile business, Toronto, p. 5.Google Scholar
  99. 99.
    Madlmayr, G., et al. (2008). Management of multiple cards in NFC-devices. In Smart card research and advanced applications (Vol. 5189/2008, pp. 149–161).Google Scholar
  100. 100.
    Madlmayr, G., et al. (2008). Managing an NFC ecosystem. In Proceedings of 7th international conference on mobile business, Barcelona, pp. 95–101.Google Scholar
  101. 101.
    Madlmayr, G., et al. (2008). NFC devices: Security and privacy. In Proceedings of third international conference on availability, reliability and security, Barcelona, pp. 642–647.Google Scholar
  102. 102.
    Madlmayr, G., Langer, J., Kantner, C., Scharinger, J., & Schaumüller-Bichl, I. (2009). Risk analysis of over-the-air transactions in an NFC ecosystem. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 87–92.Google Scholar
  103. 103.
    Mair R.G. (2010) Protocol-independent detection of passive transponders for near-field communication systems. In IEEE Transactions on Instrumentation and Measurement 59(4): 814–819MathSciNetCrossRefGoogle Scholar
  104. 104.
    Marcus, A., Davidzon, G., Law, D., Verma, N., Fletcher, R., Khan, A., et al. (2009). Using NFC-enabled mobile phones for public health in developing countries. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 30–35.Google Scholar
  105. 105.
    Michahelles F. et al. (2007) Pervasive RFID and near field communication technology. Journal of IEEE Computer Society, Pervasive Computing 6(3): 94–95CrossRefGoogle Scholar
  106. 106.
    Miranda, S., & Pastorelly, N. (2011). NFC mobiquitous information service prototyping at the University of Nice Sophia Antipolis and multi-mode NFC application proposal. In Proceedings of the 3rd international workshop on near field communication, Hagenberg, Austria, pp. 3–8.Google Scholar
  107. 107.
    Miraz, G. M., Ruiz, I. L., & Gomez-Nieto, M. A. (2009). How NFC can be used for the compliance of European higher education area guidelines in European universities. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 3–8.Google Scholar
  108. 108.
    Miraz G. M., Ruiz I. L., Gómez-Nieto M. Á. (2009) University of things: Applications of near field communication technology in university environments. Journal of E-working 3(1): 52–64Google Scholar
  109. 109.
    Mitrokotsa A. et al (2008) Classification of RFID attacks. Journal of Information Systems Frontiers 12(5): 491–505CrossRefGoogle Scholar
  110. 110.
    Mobey Forum. (2010). Alternatives for banks to offer secure mobile payments. Available at: http://www.mobeyforum.org/Press-Documents/Press-Releases/Alternatives-for-Banks-to-offer-Secure-Mobile-Payments.
  111. 111.
    Morak, J., Hayn, D., Kastner, P., Drobics, M., & Schreier, G. (2009). Near field communication technology as the key for data acquisition in clinical research. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 15–19.Google Scholar
  112. 112.
    Morak, J., Schwetz, V., Hayn, D., Fruhwald, F., & Schreier, G. (2008). Electronic data capture platform for clinical research based on mobile phones and near field communication technology. In Proceedings of the 30th annual international conference of the IEEE Engineering in Medicine and Biology Society, Vancouver, Canada, pp. 5334–5337.Google Scholar
  113. 113.
    Morris, S., & Lefley, A. (2009). A 90 nm CMOS 13.56MHz NFC transceiver. In Proceedings of IEEE Asian solid-state circuits conference, Taipei, pp. 25–28.Google Scholar
  114. 114.
    Mujal, J., Ramon, E., Dí az, E., Carrabina, J., Calleja, A., Martí nez, R., & Terés, L. (2010). Inkjet printed antennas for NFC systems. In Proceedings of 17th IEEE international conference on electronics, circuits, and systems, pp. 1220–1223.Google Scholar
  115. 115.
    Mulliner, C. (2009). Vulnerability analysis and attacks on NFC-enabled mobile phones. In Proceedings of international conference on availability, reliability and security, Fukuoka, pp. 695–700.Google Scholar
  116. 116.
    Nandwani, A., et al. (2011). NFC mobile parlor games enabling direct player to player interaction. In Proceedings of 3rd international workshop on near field communication, Hagenberg, Austria, pp. 21–25.Google Scholar
  117. 117.
    Neefs, J., Schrooyen, F., & Doggen, J. (2010). Paper ticketing vs. electronic ticketing based on off-line system ‘Tapango’. In Proceedings of the second international workshop on near field communication, Monaco, pp. 3–8.Google Scholar
  118. 118.
    Nepper, P., Konrad, N., & Sandner, U. (2007). Talking media. In Proceedings of 9th international conference on human computer interaction with mobile devices and services, Singapore.Google Scholar
  119. 119.
    NFC Forum. (2006). NFC data exchange format (NDEF). Technical specification, version 1.0.Google Scholar
  120. 120.
    NFC Forum. (2006). Record type definition (RTD). Technical specification, version 1.0.Google Scholar
  121. 121.
    NFC Forum. (2006). Smart poster record type definition. Technical specification, version 1.1.Google Scholar
  122. 122.
    NFC Forum. (2006). Text record type definition. Technical specification, version 1.0.Google Scholar
  123. 123.
    NFC Forum. (2006). URI record type definition. Technical specification, version 1.0.Google Scholar
  124. 124.
    NFC Forum. (2009). Logical link control protocol (LLCP). Technical specification, version 1.0.Google Scholar
  125. 125.
  126. 126.
    NFC Forum. (2010). Signature record type definition. Technical specification, version 1.0.Google Scholar
  127. 127.
    NFC Forum. Available at: http://www.nfc-forum.org.
  128. 128.
    Ok, K. (2010). Current benefits and future directions of NFC services. In Proceedings of IEEE international conference on education and management technology, Cairo, Egypt, pp. 334–338.Google Scholar
  129. 129.
    Ok, K. (2010). Exploring underlying values of NFC applications. In Proceedings of international conference on management technology and applications, Singapore, pp. 283–287.Google Scholar
  130. 130.
    Ok, K., Coskun, V., & Aydin, M. N. (2010). Usability of mobile voting with NFC technology. In Proceedings of IASTED international conference on software engineering, Innsbruck, Austria, pp. 151–158.Google Scholar
  131. 131.
    Ondrus, J., & Pigneur, Y. (2007). An assessment of NFC for future mobile payment systems. In Proceedings of the international conference on the management of mobile business, p. 43.Google Scholar
  132. 132.
    Opperman, C. A., et al. (2011). A generic NFC-enabled measurement system for remote monitoring and control of client-side equipment. In Proceedings of 3rd international workshop on near field communication, Hagenberg, Austria, pp. 44–49.Google Scholar
  133. 133.
    Ozdenizci, B., Coskun, V., Aydin, M. & Ok, K. (2010). NFC loyal: A beneficial model to promote loyalty on smart cards of mobile devices. In Proceedings of IEEE international conference for internet technology and secured transactions, London, pp. 134–139.Google Scholar
  134. 134.
    Ozdenizci, B., et al. (2010). Design science in NFC research. In Proceedings of IEEE international conference for internet technology and secured transactions, London, pp. 158–163.Google Scholar
  135. 135.
    Ozdenizci, B., et al. (2010). NFC research framework: A literature review and future research directions. In Proceedings of 14th international business information management association conference on global business transformation through innovation and knowledge management, Istanbul, Turkey, pp. 2672–2685.Google Scholar
  136. 136.
    Ozdenizci, B., Ok, K., Coskun, V., & Aydin, M. (2011). Development of an indoor navigation system using NFC technology. In Proceedings of fourth international conference on information and computing, Phuket Island, pp. 11–14.Google Scholar
  137. 137.
    Pasquet, M., et al. (2008). Secure payment with NFC mobile phones in the smart touch project. In Proceedings of international symposium on collaborative technologies and systems, Irvine, CA, pp. 121–126.Google Scholar
  138. 138.
  139. 139.
    Pering, T., et al. (2007). Gesture connect: Facilitating tangible interaction with a flick of the wrist. In Proceedings of the 1st international conference on tangible and embedded interaction, pp. 259–262.Google Scholar
  140. 140.
    Prinz, A., et al. (2011). inSERT—an NFC-based self reporting questionnaire for patients with impaired fine motor skills. In Proceedings of 3rd international workshop on near field communication, Hagenberg, Austria, pp. 26–31.Google Scholar
  141. 141.
    Resatsch, F. (2010). Ubiquitous computing. Wiesbaden: Gabler. ISBN: 978-3834921673.Google Scholar
  142. 142.
    Resatsch, F., et al. (2007). Mobile sales assistant—NFC for retailers. In Proceedings of the 9th international conference on human computer interaction with mobile devices and services, pp. 313–316.Google Scholar
  143. 143.
    Reveilhac, M., & Pasquet, M. (2009). Promising secure element alternatives for NFC technology. In Proceedings of the first international workshop on near field communication, Hagenberg, Austria, pp. 75–80.Google Scholar
  144. 144.
    Roland, M., & Langer, J. (2010). Digital signature records for the NFC data exchange format. In Proceedings of 2nd international workshop on near field communication, Monaco, pp. 71–76.Google Scholar
  145. 145.
    Roland, M., et al. (2011). Security vulnerabilities of the NDEF signature record type. In Proceedings of the 3rd international workshop on near field communication, Hagenberg, Austria, pp. 65–70.Google Scholar
  146. 146.
    Roland, M., Witschnig, H., Merlin, E., & Saminger, C. (2008). Automatic impedance matching for 13.56 MHz NFC antennas. In Proceedings of 6th international symposium on communication systems, networks and digital signal processing, Graz, pp. 288–291.Google Scholar
  147. 147.
    Rudametkin, W., et al. (2008). NFCMuseum: An open-source middleware for augmenting museum exhibits. In Advanced sensors and lightweight programmable middleware for innovative RFID enterprise applications.Google Scholar
  148. 148.
    Ruiz, I., et al. (2009). University smart poster: Study of NFC technology applications for university ambient. In Advances in soft computing, (Vol. 51, pp. 112–116).Google Scholar
  149. 149.
    Sanchez, I., Riekki, J., & Pyykkonen, M. (2009). Touch & compose: Physical user interface for application composition in smart environments. In Proceedings of the first international workshop on near field communication, Hagenberg, Austria, pp. 61–66.Google Scholar
  150. 150.
    Sánchez, I., Cortés, M., & Riekki, J. (2007). Controlling multimedia players using NFC enabled mobile phones. In Proceedings of the 6th international conference on mobile and ubiquitous multimedia, Oulu, Finland, pp. 118–124.Google Scholar
  151. 151.
    Sánchez, I., et al. (2008). Touch & control: Interacting with services by touching RFID tags. In Proceedings of the 2nd international workshop on RFID technology—concepts, applications, challenges (IWRT 08).Google Scholar
  152. 152.
    Sánchez, I., et al. (2011). NFC-based interactive learning environments for children. In Proceedings of the 10th international conference on interaction design and children, pp. 205–208.Google Scholar
  153. 153.
    Sandner, U., et al. (2007). News-on-the-Go. In Proceedings of mobile HCI’07, Singapore, pp. 361–363.Google Scholar
  154. 154.
    Schoo, P., & Paolucci, M. (2009). Do you talk to each poster? Security and privacy for interactions with web service by means of contact free tag readings. In Proceedings of 1st international workshop on near field communication, Hagenberg, Austria, pp. 81–86.Google Scholar
  155. 155.
    Siira, E., & Haikio, J. (2007). Experiences from near-field communication (NFC) in a meal service system. In Proceedings of 1st annual RFID Eurasia, Istanbul, Turkey, pp. 1–6.Google Scholar
  156. 156.
    Siira, E., & Törmänen, V. (2010). The impact of NFC on multimodal social media application. In Proceedings of the 2nd international workshop on near field communication, Monaco, pp. 51–56.Google Scholar
  157. 157.
    Siira, E., Tuikka, T., & Tormanen, V. (2009). Location-based mobile Wiki using NFC tag infrastructure. In Proceedings of the 1st international workshop on near field communication, Hagenberg, Austria, pp. 56–60.Google Scholar
  158. 158.
    Smart Trust. (2009). The role of SIM OTA and the mobile operator in the NFC environment. Available at: http://www.paymentscardsandmobile.com/research/reports/SIM-OTA-Mobile-Operator-role-NFC.pdf.
  159. 159.
    Sodor, B., Fordos, G., Doktor, T., & Benyo, B. (2011). Building a contactless university examination system using NFC. In Proceedings of 15th IEEE international conference on intelligent engineering systems (INES), pp. 57–61.Google Scholar
  160. 160.
    Steffen, R., Preißinger, J., Schöllermann, T., Müller, A., & Schnabel, I. (2010). Near field communication (NFC) in an automotive environment. In Proceedings of the 2nd international workshop on near field communication, Monaco, pp. 15–20.Google Scholar
  161. 161.
    Strömmer, E., et al. (2006). Application of near field communication for health monitoring in daily life. In Proceedings of 28th annual international conference of the IEEE Engineering in Medicine and Biology Society, New York City, USA, pp. 3246–3249.Google Scholar
  162. 162.
    Tuikka, T., & Isomursu, M. (2009). Touch the future with a smart touch. VTT Tiedotteita–research notes 2492, Espoo, Finland. Available at: http://www.vtt.fi/inf/pdf/tiedotteet/2009/T2492.pdf.
  163. 163.
    Verdult, R., & Kooman, F. (2011). Practical attacks on NFC enabled cell phones. In Proceedings of the 3rd international workshop on near field communication, Hagenberg, Austria, pp. 77–82.Google Scholar
  164. 164.
    Vergara, M., Díaz-Hellín, P., Fontecha, J., Hervás, R., Sánchez-Barba, C., Fuentes, C., et al. (2010). Mobile prescription: An NFC-based proposal for AAL. In Proceedings of the 2nd international workshop on near field communication, Monaco, pp. 27–32.Google Scholar
  165. 165.
    Wiechert, T., et al. (2009). NFC based service innovation in retail: An explorative study. In Proceedings of ECIS’2009.Google Scholar
  166. 166.
    Wiethoff, A., & Broll, G. (2011). SoloFind: Chains of interactions with a mobile retail experience system. In Proceedings of the 2011 annual conference extended abstracts on human factors in computing systems, Vancouver, BC, pp. 1303–1308.Google Scholar
  167. 167.
    Woo, J. (2008). Verification of receipts from M-commerce transactions on NFC cellular phones. In Proceedings of 10th IEEE conference on E-commerce technology and the fifth IEEE conference on enterprise computing, E-commerce and E-services, Washington, DC, pp. 36–43.Google Scholar
  168. 168.
    Yiqun, X., et al. (2008). Sales data management system of chain enterprises based on NFC technology. In Proceedings of 2nd international conference on anti-counterfeiting, security and identification, Guiyang, pp. 455–458.Google Scholar
  169. 169.
    Zhao, M., et al. (2010). A chip solution for UWB-NFC receiver in CMOS 0.18um technology. In Proceedings of the 6th international wireless communications and mobile computing conference, pp. 839–842.Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Isik UniversityIstanbulTurkey

Personalised recommendations