Next Article in Journal
Intra-Reliability of a Wearable Near-Infrared Sensor for Monitoring the Intensity of Exercise
Previous Article in Journal
Application of Micro-Plane Projection Moving Least Squares and Joint Iterative Closest Point Algorithms in Spacecraft Pose Estimation
Previous Article in Special Issue
Pseudo-Coloring as an Effective Tool to Improve the Readability of Images Obtained in an Electromagnetic Infiltration Process
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Immunity in Near Field Radio Frequency Communication Systems—NFC as an Aspect of Electromagnetic Information Security

Military Communication Institute-National Research Institute, Department of Electromagnetic Compatibility, 05-130 Zegrze Poludniowe, Poland
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(13), 5854; https://doi.org/10.3390/app14135854
Submission received: 31 May 2024 / Revised: 20 June 2024 / Accepted: 25 June 2024 / Published: 4 July 2024

Abstract

:
The NFC and MIFARE systems (referred to as HF-band RFID) are a special case of Radio Frequency Identification (RFID) technology using a radio frequency of 13.56 MHz for communication. The declared range of such communication is usually several cm and is characterized by the need to bring the data carrier close to the system reader. Due to the possibility of transmitting sensitive data in this type of system, an important problem seems to be the electromagnetic security of the transmitted data between the cards (tags) and the reader and within the system. In most of the available research studies, the security of RFID systems comes down to the analysis of the effectiveness of encryption of transmitted data or testing the range of communication between the reader and the identifier. In this research, however, special attention is paid to the so-called electromagnetic information security without the analysis of cryptographic protection. In some cases (e.g., data retransmission), encryption may not be an effective method of securing data (because, e.g., encrypted data might be used to open and start a car with a keyless system). In addition, the research draws attention to the fact that the data from the identifier can be accessed not only from the identifier, but also from the control system (reader, wiring, controller, etc.) from which the data can be radiated (unintentionally) at a much greater distance than the communication range between the identifier and the reader. In order to determine the security of the transmitted data in the HF-band RFID systems, a number of tests were carried out with the use of specialized equipment. During the measurements, both the data carriers themselves (cards, key fobs, stickers, tags) and exemplary systems for reading data from the media (a writable card reader, a mobile phone with NFC function, and an extensive access control system) were tested. The experiments carried out made it possible to determine the safety of NFC and MIFARE systems during their use and only storage (e.g., the ability to read data from an identification card stored in a pocket).

1. Introduction

1.1. Use and Threats of NFC Technology

The presented work is a continuation of previous research, the results of which were published in the journal Electronics in 2023 as a Cover [1].
Short-range communication systems such as NFC and MIFARE are systems with very similar operations and, consequently, have similar applications. They operate on the basis of a radio frequency of 13.56 MHz and in some cases can be used interchangeably (Mifare Desire). These systems have been used, among others, in the following areas:
  • Mobile payments [2];
  • Access control [3];
  • Cashless payments for public transport tickets [4];
  • Health care [5];
  • Monitoring the strain condition of critical structures [6,7];
  • Tickets to events such as concerts;
  • Loyalty programs;
  • Campus cards;
  • Tolls (vignettes);
  • Parking management
  • Internet of Things (IoT).
The operation of these systems involves the transmission of data between the identifier and the individual elements of the control system. It is the data transmission process that can pose a great threat to the security of the transmitted data, which may include personal data, identification numbers, medical data, permits to enter controlled access areas, etc. Such data can then be used, for example, to forge the original identifier or directly transmit data to terminals without the cardholder’s knowledge.
Among the most important risks associated with the use of NFC or MIFARE (this applies to virtually every RFID standard) are the following [8,9]:
  • Interception of transmissions and copying of data to another medium or use of such data for a specific purpose;
  • Transmission of data from an identifier located at a large distance from the reader using an additional transmission channel (so-called theft by a suitcase);
  • Blocking the system by generating a high-power signal in the frequency band used by the system.
The results of the research presented in the following part of the article and the conclusions resulting from them do not take into account the software security measures used, such as encryption of transmitted information. They primarily concern the aspect of electromagnetic information penetration, i.e., the possibility of receiving an electromagnetic emission correlated with the transmitted information at any point of the system used (e.g., ID, reader, controller, wiring, etc.).

1.2. Design of the HF-Band RFID System

The basic elements of the NFC and MIFARE system, as in other RFID solutions, are an identifier, a reader, and a controller (in some cases it can be integrated with a reader). In addition, depending on the application, it can be supplemented with a computer, electromagnetic locks and others. A simple diagram of such a system in use as an access control system is shown in Figure 1.

1.2.1. Controller

The most important element of the HF-band RFID system is the controller (Figure 2). It is responsible for controlling the actuators of the system, such as barriers (bars), gates, and electromagnetic locks, based on the data on accepted identifiers programmed and stored in it. In addition, it controls the badge readers by supplying power to them and activating or blocking the badge reading function. In complex systems (e.g., time and attendance control), the controller cooperates with the computer, sending to it information about the read identifier data, along with information about the reading time and the access zone. The controllers can operate one door zone (entrance and exit) as well as several door zones (also entry and exit).

1.2.2. Computer

A computer cooperating with the controller, together with a dedicated application, is used to program the controller—entering identifier data along with access to individual zones and storing data on the input/exit request to/from the zone. By using the NFC card programmer, it can also save the necessary data on it for later use in the system.

1.2.3. Reader

The task of the card reader (identifiers, Figure 3) is to generate an electromagnetic field of the appropriate frequency (13.56 MHz and, in the case of readers supporting two RFID standards, additionally 125 kHz) and the current sufficient to power the identifier. In addition, in the case of readers in NFC (or MIFARE) systems, it is necessary to have an appropriate time course of the generated signal, which will initiate the exchange of data between the reader and the identifier. At the same time, the reader decodes and demodulates the identifier signal and sends the signal via the bus to the controller.

1.2.4. Electromagnetic Lock

The electromagnetic lock (deadbolt, gate) has an executive function. Controlled by the voltage supplied from the controller, it unlocks the door, the bolt, or allows the gate to rotate. The lock itself usually does not send a return signal to the controller. Information about opening or closing the door is usually provided to the controller by an additional element, such as a magnetic sensor.

1.2.5. Identifier

The most common form of ID is a plastic card or key ring (Figure 4).
It consists of a coil embedded in plastic and an electronic circuit (chip), the task of which is to encode the data stored in its memory and keying the coil based on it. Identifiers in the HF-band RFID system usually do not have their own power source. They are powered by an electromagnetic field generated by the reader [10,11,12]. The most common integrated circuits are the NTAG213, NTAG215 or NTAG 216 family with a total memory of 180 to 924 bytes [13,14,15]. The memory structure of this chip is shown in Figure 5.
The data from the system are output serially, but unlike LF-band RFID systems, the identifier is waiting for the reader to send a query. Before sending, the data are usually encoded in the Manchester system [16] shown in Figure 6.

2. Electromagnetic Safety of Identifier

2.1. Determination of the Threshold Magnetic Field Strength

In the case of electromagnetic information security of passive data carriers, a very important parameter is the threshold strength of the electromagnetic (magnetic) field, at which the identifier is able to accumulate the energy necessary for operation and at the same time start communication with the reader. In order to determine this parameter, the measurement system (Table 1) is presented in the Figure 7.
In the case of NFC and MIFARE identifiers, a harmonic magnetic field of a certain intensity is not sufficient to start data transmission through the identifier, as is the case with LF (125 kHz) RFID systems. In order to start the transmission, it is necessary for the reader to send an appropriate request. This feature of the system made it necessary to use a ready-made NFC reader in the measurements instead of a simple coil (magnetic antenna) connected to a signal generator. The NFC reader used, and the characteristics of its radiation are shown in Figure 8.
During the measurement, the ID card was held close to the reader until the communication was established (which was signaled by a diode and a sound by the reader). Then, a magnetic antenna connected to a spectrum analyzer was placed at the same distance and the level of magnetic field strength was read (after taking into account the values of the antenna’s correction factors).
The measured level of the magnetic field necessary for the ID to operate (threshold level) is similar to that of LF-band RFID and amounted to approx. 85 dBμA/m.

2.2. Modulation Depth Factor as a Function of Distance of Receiving Coil from ID Card

The modulation depth factor (Figure 9) is one of the most important parameters of a signal that determines its readability. It is defined by two signal parameters— U m a x and U m i n and its value is calculated according to the relationship (1). The modulation depth factor is often expressed as a percentage (2).
m = U m a x U m i n U m a x + U m i n
m % = 100 · U m a x U m i n U m a x + U m i n
Signals with a modulation depth factor of less than 2% are usually difficult to identify on the one hand and susceptible to electromagnetic disturbances occurring in the environment on the other. Examples of NFC signal waveforms corresponding to modulation depth for m = 27 % and m = 7 % were presented in Figure 10.
Measurements of the modulation depth factor as a function of the distance of the receiving coil from the identifier card were carried out in the measurement system shown in Figure 11. The ID card was placed at a distance of 3 cm from the reader. The reader was characterized by a constant level of emitted electromagnetic field with a frequency of 13.56 MHz. The receiving coil was set at distances of 1.5, 3, 5, 10 and 15 cm from the ID card and the parameters of the signal received by the coil were read. The measuring equipment listed in Table 2 was used to carry out the measurements.
The obtained values of U m a x and U m i n and the values of the modulation depth factor determined on their basis are presented in Table 3, while exemplary images recorded by the oscilloscope are shown in Figure 12.
Measurements carried out at distances greater than 15 cm were characterized by low signal levels and were practically unreadable due to the almost zero modulation depth factor m.

2.3. Use of a Resonant Circuit to Increase the Range of Reading Data from the Identifier

One of the simplest solutions to increase the level of the measured signal is to use a resonance system tuned to the frequency of the carrier wave used in the HF-band RFID system, i.e., 13.56 MHz. Due to the high frequencies used in the system, the additional capacitance in the system must take into account the impedances of the spectrum analyzer and oscilloscope used in the research. The actual circuit for determining the frequency response of the resonant circuit consisted of a spectrum analyzer with a high-impedance input and its tracking generator, an oscilloscope, a transmitting coil with an inductance of approx. 10 μH (12 coils, 6.5 × 3.5 cm), and a receiving coil with an inductance of 5 μH with a 22 pF capacitor [17,18,19,20]. The diagram of this circuit is shown in Figure 13 and the circuit for simulation in the LTspice program is shown in Figure 14. During the simulations carried out using the LTspice program, the parasitic parameters of individual elements were not taken into account. In the case of the analyzed frequencies, this did not significantly affect the obtained results (Figure 15).
Elements with determined capacitance and inductance values during the measurements and simulations were used in the next stage of measurements, the purpose of which was to determine whether the applied solution would allow to increase the range of emission from the NFC system identification card (MIFARE).
For this purpose, the measurement system shown in Figure 16 was implemented. Instead of a regular magnetic coil, it was necessary to use a computer NFC reader. This was due to the need to send appropriate queries to force the transmission of the identifier. The continuous carrier wave, which could be used in the LF-band RFID system, in the case of HF-band RFID systems, did not force the start of transmission between the badge and the reader.
The measuring equipment listed in Table 4 was used to carry out the measurements.
During the tests, the ID card was placed at a distance of 3 cm from the reader. The coil and capacitor were placed at different distances from the identifier and on the basis of the obtained oscillograms the modulation depth factor and the signal level were determined as a function of the distance of the coil from the identifier. The values of U m a x and U m i n read using the oscilloscope and the calculated values of the modulation depth factor m are shown in Table 5, while examples of images recorded by the oscilloscope are shown in Figure 17.
The results show that the use of the resonance system allows the information from the identifier to be read even from a distance of 25 cm. For this case, the calculated modulation depth m is 7% and the signal amplitude is two times greater than in a non-resonant system at a distance of 15 cm.

2.4. Use of a RF Amplifier to Increase the Range of Reading Data from the Identifier

Another method of testing to increase the range of information penetration was the use of the ZFL-500LN+ signal amplifier from Mini-Circuit for the frequency range from 0.1 MHz to 500 MHz. The supply voltage of the amplifier during the tests was approx. 12 V DC. Its view and the characteristics of the gain as a function of frequency are shown in Figure 18.
The measuring equipment listed in Table 6 was used to carry out the measurements. The measuring system used in the measurements is shown in Figure 19.
During the tests, the ID card was placed at a distance of 3 cm from the reader. The coil was placed at different distances from the identifier and on the basis of the obtained oscillograms the depth factor and signal level were determined as a function of the distance of the coil from the identifier. The values of U m a x and U m i n read with the use of an oscilloscope and the calculated values of the modulation depth factor m are presented in Table 7, while examples of images recorded by the oscilloscope are shown in Figure 20.
The use of the amplifier in the receiver circuit allowed to increase the communication range to 30 cm. The shape of the time waveform of the signal allows for the identification of distinctive features important from the point of view of the possibility of non-invasive information acquisition. Receiving the signal from the identifier from such a distance, in order to copy or retransmit it, may already pose a significant threat to the data contained in the identifier.
Of the three methods of reading data from the NFC identifier presented, the method using an amplifier seems to be the most effective. However, a much simpler and cheaper solution, and comparable in terms of effectiveness, is the use of a resonance system. The benefits resulting from the use of the resonant system are observed especially for distances d not exceeding 20 cm, when the signal readability (modulation depth factor) is comparable or even greater than in the case of using an amplifier. At the same time, the amplitude of the read signal is sufficient to receive it without the need to use expensive specialized receivers. A comparison of the level of signals measured by each of the three methods presented above and the modulation depth factors is shown in Figure 21.

3. Electromagnetic Security of Selected HF-Band RFID Card Readers and Access Control Systems

3.1. Reader Systems

The experiments described so far, aimed at increasing the range of communication between the RFID card and the receiver, did not allow for a significant increase in the distance between the receiver and the card. Even with the use of an amplifier, the range of communication is still close to that declared by the manufacturers of RFID systems.
Therefore, in the next step, research was carried out for three cases of different ways of reading identifiers [22,23,24,25,26]:
(a)
A complete access control system consisting of the following:
  • VC-1200C controller;
  • Power supply;
  • Battery (backup system);
  • 1 RFID Card Readers R101EM;
  • 1 RFID card readers S1-RX;
  • Electric door strike.
(b)
Reader/programmer connected to the USB connector of the computer.
(c)
NFC-enabled phone as a reader.
The measuring equipment listed in Table 8 was used to carry out the measurements. Measurements for each of these cases were carried inside an anechoic shielding chamber. This was to avoid the influence (jamming) of external disturbances on the obtained results.

3.1.1. Access Control System

The diagram of the complete access control system and its practical implementation is presented in Figure 22.
The recorded signals from the tested system include both signals from the reader queries and signals from the identifier responses, which are shown in Figure 23.
If no identifier is in the immediate vicinity of the reader (within its range), then the reader continuously sends queries (in the case of the access control system reader it is approx. every 10 ms, and approx. every 1 ms in the case of the used reader–programmer). This is shown in Figure 24.
When the identifier is brought closer, a signal with a lower amplitude appears in response to the query, which is the response of the identifier. The lower amplitude of the response is related to the identifier’s method of functioning, which does not have its own power source and “takes” the necessary energy from the reader’s signal. However, it does not introduce additional electromagnetic energy into the environment, but only affects the signal sent by the reader, modulating it to a depth usually not exceeding 40%.
The time waveform of an example of a recorded signal containing a number of questions and answers, as shown in Figure 25.
The measuring system in which the measurements were carried out is presented in Figure 26. The measurements for this case were carried out in the frequency range from 1 MHz to 1 GHz. Potentially dangerous frequencies may be, for example, the basic frequency of the reader’s operation (13.56 MHz) and its harmonics.
A graph showing the signal level at individual frequencies is presented in Figure 27.
Figure 28 shows waveforms recorded with an oscilloscope connected to the “VIDEO” output of the measurement receiver after tuning to selected frequencies. The used FSWT26 receiver has two programmable outputs. Measured VIDEO signal can be redirected to any of these outputs. For our tests, the oscilloscope connected to one of these outputs was used. The oscilloscope allows recording of binary and text files. This function was used during the conducted tests.

3.1.2. NS106 Reader–Programmer

An identical scope of tests was carried out in relation to the NS106 reader–programmer connected to a computer with a reduced level of electromagnetic emissions (TEMPEST). The relevant measurements were carried out in the layout presented in Figure 29.
The measurements for this case were carried out in the frequency range from 1 MHz to 1 GHz. They were aimed (as in the previous example) to detect possible frequencies at which it would be possible to receive a signal from the identifier. Potentially dangerous frequencies may be, for example, the basic frequency of the reader’s operation (13.56 MHz) and its harmonics. For the duration of the measurement, the monitor, keyboard and mouse were switched off to reduce electromagnetic disturbances in the measurement environment.
A graph showing the signal level at individual frequencies is presented in Figure 30.
In this case, a number of harmonic emissions (relative to 13.56 MHz) were observed, on which it was possible to receive data related to the transmission between the reader and the identifier.
Figure 31 shows several selected waveforms recorded with an oscilloscope connected to the “VIDEO” output of the measurement receiver after tuning to selected frequencies.

3.1.3. Galaxy A34 as an HF-Band RFID Reader

The last of the analyzed cases was the use of a mobile phone equipped with an NFC module to read identifiers. A SAMSUNG phone marked as GALAXY A32 was used for the research. The measuring system in which the tests were carried out is shown in Figure 32.
The measurements for this case were carried out in the frequency range from 1 MHz to 100 MHz (the measurement range is limited due to the lack of visible disturbances of the revealing emission nature). They were aimed (as in the previous example) to detect possible frequencies at which it would be possible to receive a signal from the identifier. Potentially dangerous frequencies may be the basic frequency of the reader’s operation (13.56 MHz) and its harmonics.
A graph showing the signal level at individual frequencies is shown in Figure 33.
Figure 34 shows waveforms recorded with an oscilloscope connected to the “VIDEO” output of the measurement receiver after tuning to selected frequencies.
As can be seen in the presented measurement results (Figure 30 and Figure 31 and Table 9) the least secure of the tested RFID HF systems is, in our opinion, the NFC card reader/programmer NS-106 because of the following reasons:
  • Very clear revealing emission signals were observed up to the frequency of 691.56 MHz (Figure 30);
  • These signals were characterized by a high level of field strength of up to 60 dBμV/m (Figure 30);
  • The level of waveforms observed on the oscilloscope corresponding to the data sent from the identifier is comparable to the level of the signal corresponding to the queries;
  • The range of the occurrence of revealing emissions was estimated at about 10–20 m (depending on the frequency);
  • The possibility of identifying the reader’s signal at about 50 m;
  • It is, in our opinion, a great threat in relation to both the possibility of intercepting the transmission and tracking the card reader.
As can be seen in the presented measurement results (Figure 23, Figure 24 and Figure 25, Figure 27 and Figure 28 and Table 10) the second tested RFID HF system that is not fully secure is, in our opinion, the ACS-Access Control system, because of the following reasons:
  • For this system, it was possible to recreate information for the frequencies of 13.56 and 40.68 MHz.
  • The estimated range of information penetration (i.e., the distance from which it is possible to read the data transmitted by the identifier) is about 2–3 m.
  • On the other frequencies, only queries sent by the system reader were received, and their estimated range should not exceed 10 m.
  • The most secure system tested was the NFC built into the Samsung Galaxy A32 see results (Figure 33 and Figure 34 and Table 11) because of the following:
  • For this system, the measurements were carried out in the frequency range from 1 MHz to 100 MHz (the measurement range was limited due to the lack of visible disturbances of the revealing emission nature).
  • Potentially dangerous frequencies may be the basic frequency of the reader’s operation (13.56 MHz) and its harmonic.

4. Conclusions

As a result of the analysis of the obtained measurement results and the experiments carried out, it can be concluded that the range of communication between the card and the reader declared by the manufacturers of LF-band RFID systems is correct and the other reception methods described in the article do not significantly affect it. The maximum distances from which it is possible to read the data do not exceed a dozen or so cm. Therefore, the communication between the card and the reader can be considered safe. Unauthorized persons cannot restore the data stored on the card and possibly copy such a card without direct access to it.
The weakest links in the entire access control system are the card readers. In this case, with the appropriate equipment, it is possible to restore the data stored on RFID cards. Identification of such data is possible from a distance not exceeding 2 m.
In the case of HF-band RFID (NFC) communication, it is possible to receive a signal from the identifier from a distance of approx. 30 cm using simple and inexpensive solutions. This can be a potential danger with regard to the possibility of copying or transferring data from the identifier. Information and Communication Technologies (ICT) security measures such as encryption of sent data were not taken into account.
As in the case of LF-band RFID solutions, for HF-band RFID the weakest link seems to be the systems used to read information. For example, in the case of an access control system, the estimated range of information penetration (i.e., the distance from which it is possible to read the data transmitted by the identifier) is about 2–3 m. For this system, it was possible to recreate information for the frequencies of 13.56 and 40.68 MHz. On the other frequencies, only queries sent by the system reader were received, and their estimated range should not exceed 10 m.
The worst variant turned out to be the use of an NFC card reader/programmer to read the identifier. In this case, very clear revealing emission signals were observed up to the frequency of 691.56 MHz. These signals were characterized by a high level of field strength of up to 60 dBμV/m. In addition, the level of waveforms observed on the oscilloscope corresponding to the data sent from the identifier is comparable to the level of the signal corresponding to the queries. On the basis of these data, the range of the occurrence of revealing emissions was estimated at about 10–20 m (depending on the frequency) and the possibility of identifying the reader’s signal at about 50 m, which is a great threat in relation to both the possibility of intercepting the transmission and tracking the card reader.
As already mentioned in the summary, this research is the continuation of previous research studies on the electromagnetic security of RFID systems using low frequencies for communication. The continuation of the current research will be focused, on one hand, on another type of radio communication in UHF RFID systems and, on the other hand, on the electromagnetic security of RFID systems in terms of the use of the method of data retransmission from the identifier or system over much longer distances. This phenomenon can be particularly dangerous in cases of contactless payments, keyless entry and starting vehicles, and are already being exploited by criminal groups.

Author Contributions

Conceptualization, S.M. and A.F.; methodology, S.M. and A.F.; validation, S.M., A.F. and I.K.; formal analysis, S.M. and I.K.; investigation, S.M. and A.F.; resources, I.K. and S.M.; data curation, S.M. and A.F.; writing—original draft preparation, S.M.; writing—review and editing, A.F.; visualization, S.M.; supervision, I.K.; project administration, S.M.; funding acquisition, I.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Musial, S.; Firlej, A.; Kubiak, I.; Dalecki, T. Electromagnetic Safety of Short-Range Radio Frequency Identification Systems. Electronics 2023, 12, 4391. [Google Scholar] [CrossRef]
  2. Yu, W.W.; Fang, C.Y. The Role of Near-Field Communication Mobile Payments in Sustainable Restaurant Operations: A Restaurateur’s Perspective. Sustainability 2023, 15, 12471. [Google Scholar] [CrossRef]
  3. JosephNg, P.S.; BrandonChan, P.S.; Phan, K.Y. Implementation of Smart NFC Door Access System for Hotel Room. Appl. Syst. Innow. 2023, 6, 67. [Google Scholar] [CrossRef]
  4. Rodrigues, H.; Jose, R.; Coelho, A.; Melro, A.; Ferreira, M.C.; Cunha, J.F.; Monteiro, M.P.; Ribeiro, C. MobiPag: Integrated Mobile Payment, Ticketing and Couponing Solution Based on NFC. Sensors 2014, 14, 13389–13415. [Google Scholar] [CrossRef]
  5. Bedriova, N.; Smetana, M.; Gombarska, D. Design and Development of Technical Solution for NFC-Based Self-Management Therapy in Actual Oncology Treatment. Appl. Sci. 2023, 13, 2397. [Google Scholar] [CrossRef]
  6. Liu, G.; Wang, Q.A.; Jiao, G.; Dang, P.; Nie, G.; Liu, Z.; Sun, J. Review of Wireless RFID Strain Sensing Technology in Structural Health Monitoring. Sensors 2023, 23, 6925. [Google Scholar] [CrossRef] [PubMed]
  7. Wang, Q.A.; Zhang, C.; Ma, Z.G.; Jiao, G.Y.; Jiang, X.W.; Ni, Y.Q.; Wang, Y.C.; Du, Y.T.; Qu, G.B.; Huang, J. Towards Long-Transmission-Distance and Semi-Active Wireless Strain Sensing Enabled by Dual-Interrogation-Mode RFID Technology; Wiley Online Library: Hoboken, NJ, USA, 2022. [Google Scholar] [CrossRef]
  8. Yang, M.H.; Luo, J.N.; Vijayalakshmi, M.; Shalinie, S.M. Contactless Credit Cards Payment Fraud Protection by Ambient Authentication. Sensors 2022, 22, 1989. [Google Scholar] [CrossRef] [PubMed]
  9. Chabbi, S.; Araar, C. RFID and NFC Authentication Protocol for Securing a Payment Transaction. In Proceedings of the 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS) 2022, Oum El Bouaghi, Algeria, 12–13 October 2022. [Google Scholar] [CrossRef]
  10. Hong, K.; Cho, J.; Shin, G. Stretchable, Multi-Layered Stack Antenna for Smart/Wearable Electronic Applications. Materials 2022, 15, 3275. [Google Scholar] [CrossRef] [PubMed]
  11. Buchmeier, G.G.; Takacs, A.; Dragomirescu, D. Juvenal Alarcon Ramos and all, Optimized NFC Circuit and Coil Design for Wireless Power Transfer with 2D Free-Positioning and Low Load Sensibility. Sensors 2021, 21, 8074. [Google Scholar] [CrossRef] [PubMed]
  12. Rabén, H.; Borg, J.; Johansson, J. A discrete model of the DC charge-up phase in RFID rectifiers. In Proceedings of the 20th International Conference Mixed Design of Integrated Circuits and Systems—MIXDES 2013, Gdynia, Poland, 20–22 June 2013. [Google Scholar]
  13. Bhattacharyya, M.; Gruenwald, W.; Jansen, D.; Reindl, L.; Aghassi-Hagmann, J. An Ultra-Low-Power RFID/NFC Frontend IC Using 0.18 μm CMOS Technology for Passive Tag Applications. Sensors 2018, 18, 1452. [Google Scholar] [CrossRef] [PubMed]
  14. Cao, Z.; Chen, P.; Ma, Z.; Li, S.; Gao, X.; Wu, R.; Pan, L.; Shi, Y. Near-Field Communication Sensors. Sensors 2019, 19, 3947. [Google Scholar] [CrossRef] [PubMed]
  15. NTAG213/215/216—NFC Forum Type 2 Tag Compliant IC with 144/504/888 Bytes User Memory—Rev. 3.2—2 June 2015, NXP Semiconductors, N.V. 2015. Available online: https://www.nxp.com/docs/en/data-sheet/NTAG213_215_216.pdf (accessed on 23 February 2024).
  16. Chung, H.; Jeon, S.B.; Lee, D.W.; Park, H.J.; Kim, J.H.; Sohn, S.H. Clock and data recovery of an Extended Manchester Code for PAM-n. In Proceedings of the 2012 International Conference on ICT Convergence (ICTC) 2012, Jeju, Republic of Korea, 15–17 October 2012. [Google Scholar] [CrossRef]
  17. Xu, L.; Chen, X.; Tan, S.; Hu, Z.; Ying, B.; Ye, T.T.; Li, Y. Characterization and Modeling of Embroidered NFC Coil Antennas for Wearable Applications. IEEE Sens. J. 2020, 20, 1558–1748. [Google Scholar] [CrossRef]
  18. Wang, K.; Diet, A.; Chakra, S.A.; Conessa, C.; Grzeskowiak, M.; Bouaziz, T.; Protat, S.; Delcroix, D.; Rousseau, L.; Lissorgues, G.; et al. Detecting range and coupling coefficient tradeoff with a multiple loops reader antenna for small size RFID LF tags. In Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), Nice, France, 5–7 November 2012. [Google Scholar] [CrossRef]
  19. Chen, Z.N.; Qing, X. Antennas for RFID applications. In Proceedings of the 2010 International Workshop on Antenna Technology (iWAT), Lisbon, Portugal, 1–3 March 2010. [Google Scholar] [CrossRef]
  20. Vestenický, M.; Vestenický, P. Mathematical Analysis of Parasitic Elements Influence in Resonant Circuit of RFID Antenna. In Proceedings of the 2019 29th International Conference Radioelektronika, Pardubice, Czech Republic, 16–18 April 2019. [Google Scholar] [CrossRef]
  21. Coaxial Low Noise Amplifier ZFL-500LN+. Available online: https://www.minicircuits.com/pdfs/ZFL-500LN+.pdf (accessed on 23 February 2024).
  22. Mareli, M.; Rimer, S.; Paul, B.; Ouahada, K.; Pitsillides, A. Experimental evaluation of NFC reliability between an RFID tag and a smartphone. In Proceedings of the 2013 Africon, Pointe aux Piments, Mauritius, 9–12 September 2013. [Google Scholar] [CrossRef]
  23. Zradziński, P. Modelling and Evaluating Electromagnetic Field Exposure in the Multiple-Source Scenario of Using IoT HF RFID Readers. Int. J. Environ. Res. Public Health 2022, 19, 3274. [Google Scholar] [CrossRef]
  24. Mattei, E.; Lucano, E.; Censi, F.; Triventi, M.; Calcagnini, G. Provocative Testing for the Assessment of the Electromagnetic Interference of RFID and NFC Readers on Implantable Pacemaker. IEEE Trans. Electromagn. Compat. 2016, 58, 314–322. [Google Scholar] [CrossRef]
  25. Auinger, B.; Deutschmann, B.; Winkler, G. Elimination of electromagnetic interference in communication channels by using spread spectrum techniques. In Proceedings of the 2017 International Symposium on Electromagnetic Compatibility—EMC Europe 2017, Angers, France, 4–7 September 2017. [Google Scholar] [CrossRef]
  26. Tabet, N.E.; Ayu, M.A. Analysing the Security of NFC Based Payment Systems. In Proceedings of the International Conference on Informatics and Computing (ICIC), Mataram, Indonesia, 28–29 October 2016. [Google Scholar] [CrossRef]
Figure 1. Sample diagram of an access control system.
Figure 1. Sample diagram of an access control system.
Applsci 14 05854 g001
Figure 2. Single-zone controller—one door, entrance and exit.
Figure 2. Single-zone controller—one door, entrance and exit.
Applsci 14 05854 g002
Figure 3. Universal reader—LF-band RFID and HF-band RFID.
Figure 3. Universal reader—LF-band RFID and HF-band RFID.
Applsci 14 05854 g003
Figure 4. Example TAGS identifiers: (a) RFID card, (b) key ring, (c) sticker.
Figure 4. Example TAGS identifiers: (a) RFID card, (b) key ring, (c) sticker.
Applsci 14 05854 g004
Figure 5. Structure of data stored in the identifier layout (NTAG213).
Figure 5. Structure of data stored in the identifier layout (NTAG213).
Applsci 14 05854 g005
Figure 6. Manchester coding.
Figure 6. Manchester coding.
Applsci 14 05854 g006
Figure 7. Measuring system for determining the minimum value of the magnetic field strength necessary for the ID to operate.
Figure 7. Measuring system for determining the minimum value of the magnetic field strength necessary for the ID to operate.
Applsci 14 05854 g007
Figure 8. Universal LF-band RFID and HF-band RFID ID reader–programmer and frequency characteristics of its radiation.
Figure 8. Universal LF-band RFID and HF-band RFID ID reader–programmer and frequency characteristics of its radiation.
Applsci 14 05854 g008
Figure 9. Parameters defining the modulation depth factor.
Figure 9. Parameters defining the modulation depth factor.
Applsci 14 05854 g009
Figure 10. Examples of NFC signal waveforms corresponding to modulation depth: (a) m = 27 % , (b) m = 7 % .
Figure 10. Examples of NFC signal waveforms corresponding to modulation depth: (a) m = 27 % , (b) m = 7 % .
Applsci 14 05854 g010
Figure 11. Measuring system for determining the modulation depth factor.
Figure 11. Measuring system for determining the modulation depth factor.
Applsci 14 05854 g011
Figure 12. Recorded signal waveforms corresponding to distance measurements: (a) 1.5   c m   ( m = 38 % ) , (b) 10   c m   ( m = 14 % ) .
Figure 12. Recorded signal waveforms corresponding to distance measurements: (a) 1.5   c m   ( m = 38 % ) , (b) 10   c m   ( m = 14 % ) .
Applsci 14 05854 g012
Figure 13. The real circuit for measuring the frequency characteristic of a resonant system.
Figure 13. The real circuit for measuring the frequency characteristic of a resonant system.
Applsci 14 05854 g013
Figure 14. The electrical diagram of a circuit for testing the frequency characteristic of a resonant system using the LTspice application.
Figure 14. The electrical diagram of a circuit for testing the frequency characteristic of a resonant system using the LTspice application.
Applsci 14 05854 g014
Figure 15. Results of tests of the frequency characteristics of the resonant system: (a) in the frequency range of 10 MHz to 20 MHz—simulation in LTSpice application, (b) result of the measurement of the characteristics with a spectrum analyzer in the frequency range from 1 MHz to 40 MHz—actual measurement.
Figure 15. Results of tests of the frequency characteristics of the resonant system: (a) in the frequency range of 10 MHz to 20 MHz—simulation in LTSpice application, (b) result of the measurement of the characteristics with a spectrum analyzer in the frequency range from 1 MHz to 40 MHz—actual measurement.
Applsci 14 05854 g015
Figure 16. Measuring system for determining the modulation depth factor using a resonant system.
Figure 16. Measuring system for determining the modulation depth factor using a resonant system.
Applsci 14 05854 g016
Figure 17. Recorded signal waveforms corresponding to distance measurements: (a) 3.0   c m   ( m = 27 % ) , (b) 15   c m   m = 14 % and (c) 25   c m   ( m = 7 % ) .
Figure 17. Recorded signal waveforms corresponding to distance measurements: (a) 3.0   c m   ( m = 27 % ) , (b) 15   c m   m = 14 % and (c) 25   c m   ( m = 7 % ) .
Applsci 14 05854 g017aApplsci 14 05854 g017b
Figure 18. (a) The ZFL-500LN+ amplifier and (b) its frequency gain characteristic—according to the amplifier manufacturer’s data [21].
Figure 18. (a) The ZFL-500LN+ amplifier and (b) its frequency gain characteristic—according to the amplifier manufacturer’s data [21].
Applsci 14 05854 g018
Figure 19. Measuring system for determining the modulation depth factor using a signal amplifier.
Figure 19. Measuring system for determining the modulation depth factor using a signal amplifier.
Applsci 14 05854 g019
Figure 20. Recorded signal waveforms corresponding to distance measurements: (a) 3.0   c m   ( m = 16 % ) , (b) 20 c m   m = 13 %   (c) 25   c m   ( m = 14 % ) and (d) 30 c m   ( m = 7 % ) .
Figure 20. Recorded signal waveforms corresponding to distance measurements: (a) 3.0   c m   ( m = 16 % ) , (b) 20 c m   m = 13 %   (c) 25   c m   ( m = 14 % ) and (d) 30 c m   ( m = 7 % ) .
Applsci 14 05854 g020aApplsci 14 05854 g020b
Figure 21. Comparison of the measured maximum signal levels (a) and the determined modulation depths (b) using the three methods discussed.
Figure 21. Comparison of the measured maximum signal levels (a) and the determined modulation depths (b) using the three methods discussed.
Applsci 14 05854 g021
Figure 22. (a) Diagram of the access control system and (b) its practical implementation.
Figure 22. (a) Diagram of the access control system and (b) its practical implementation.
Applsci 14 05854 g022
Figure 23. An example of a signal waveform recorded from the reader–identification system.
Figure 23. An example of a signal waveform recorded from the reader–identification system.
Applsci 14 05854 g023
Figure 24. The time waveform of the signal corresponding to the queries sent by the reader when there is no identifier in range.
Figure 24. The time waveform of the signal corresponding to the queries sent by the reader when there is no identifier in range.
Applsci 14 05854 g024
Figure 25. Time waveform of the signal corresponding to the reader’s queries and ID responses.
Figure 25. Time waveform of the signal corresponding to the reader’s queries and ID responses.
Applsci 14 05854 g025
Figure 26. Measuring system for testing revealing emissions from the access control system under test.
Figure 26. Measuring system for testing revealing emissions from the access control system under test.
Applsci 14 05854 g026
Figure 27. Level of electromagnetic disturbances from the tested set of access control.
Figure 27. Level of electromagnetic disturbances from the tested set of access control.
Applsci 14 05854 g027
Figure 28. Sample images of the obtained waveforms for frequencies equal to (a,b) 13.56 MHz; (c) 27.12 MHz; and (d,e) 40.68 MHz.
Figure 28. Sample images of the obtained waveforms for frequencies equal to (a,b) 13.56 MHz; (c) 27.12 MHz; and (d,e) 40.68 MHz.
Applsci 14 05854 g028
Figure 29. Measuring system for testing revealing emissions from the tested NFC reader–programmer: (a) diagram of the measuring system, (b) photo of the measuring system.
Figure 29. Measuring system for testing revealing emissions from the tested NFC reader–programmer: (a) diagram of the measuring system, (b) photo of the measuring system.
Applsci 14 05854 g029
Figure 30. Level of electromagnetic disturbances from the tested reader/programmer (harmonics observed up to 700 MHz).
Figure 30. Level of electromagnetic disturbances from the tested reader/programmer (harmonics observed up to 700 MHz).
Applsci 14 05854 g030
Figure 31. Sample images of the obtained waveforms for frequencies (a,b) 13.56 MHz, (c,d) 27.12 MHz, (e,f) 189.94 MHz, and (g,h) 691.56 MHz.
Figure 31. Sample images of the obtained waveforms for frequencies (a,b) 13.56 MHz, (c,d) 27.12 MHz, (e,f) 189.94 MHz, and (g,h) 691.56 MHz.
Applsci 14 05854 g031aApplsci 14 05854 g031b
Figure 32. Measuring system for testing the revealing emissions from the tested mobile phone.
Figure 32. Measuring system for testing the revealing emissions from the tested mobile phone.
Applsci 14 05854 g032
Figure 33. Level of electromagnetic disturbances from the tested mobile phone.
Figure 33. Level of electromagnetic disturbances from the tested mobile phone.
Applsci 14 05854 g033
Figure 34. Examples of obtained waveforms for a frequency of 13.56 MHz: (ac).
Figure 34. Examples of obtained waveforms for a frequency of 13.56 MHz: (ac).
Applsci 14 05854 g034
Table 1. List of apparatus used to carry out the measurements.
Table 1. List of apparatus used to carry out the measurements.
DeviceTypeProducer
Spectrum Analyzer (10 kHz–150 MHz)3588AHewlett Packard
Everett, WA, USA
Reader LF-band RFID and HF-band RFIDNS106 RFID Reader WriterYiToo
Guangzhou, China
ID cardNTAG213
Magnetic Antenna (1 kHz–30 MHz)6509EMCO Elektronik GmbH
Gilching, Germany
Table 2. List of apparatus used to carry out the measurements.
Table 2. List of apparatus used to carry out the measurements.
DeviceTypeProducer
OscilloscopeDSOX1102AKeysight
Colorado Springs, CO, USA
Reader LF-band RFID and HF-band RFIDNS106 RFID Reader WriterYiToo
Guangzhou, China
ID cardNTAG213
Receiving coil (65 × 35 mm, 6 coils) MCI-NRI 1
1 Made for the purpose of research in Military Communication Institute-National Research Institute (MCI-NRI).
Table 3. Recorded signal parameters and calculated value of modulation depth factor for selected receiver coil distances from the identifier.
Table 3. Recorded signal parameters and calculated value of modulation depth factor for selected receiver coil distances from the identifier.
Distance d
[cm]
Signal Parameters
U m a x V U m i n V Modulation
Depth Factor m [%]
1.54.752.1538
3.02.481.3629
5.01.500.9323
10.01.370.2814
15.00.140.1016
Table 4. List of apparatus used to carry out the measurements.
Table 4. List of apparatus used to carry out the measurements.
DeviceTypeProducer
OscilloscopeDSOX1102AKeysight
Colorado Springs, CO, USA
Spectrum analyzer3588AHewlett Packard
Everett, WA, USA
Reader LF-band RFID and HF-band RFIDNS106 RFID Reader WriterYiToo
Guangzhou, China
ID cardNTAG213
Receiving coil (65 × 35 mm, 6 coils) with 22 pF capacitor MCI-NRI 1
1 Made for the purpose of research in Military Communication Institute-National Research Institute (MCI-NRI).
Table 5. Recorded signal parameters and calculated value of modulation depth factor for selected receiver coil distances from the identifier for the resonant circuit use case.
Table 5. Recorded signal parameters and calculated value of modulation depth factor for selected receiver coil distances from the identifier for the resonant circuit use case.
Distance d
[cm]
Signal Parameters
U m a x V U m i n V Modulation
Depth Factor m [%]
3.012.47.1027.0
5.04.752.8026.0
10.01.391.0016.0
15.00.750.7514.0
20.00.430.3510.0
25.00.290.257.0
Table 6. List of apparatus used to carry out the measurements.
Table 6. List of apparatus used to carry out the measurements.
DeviceTypeProducer
OscilloscopeDSOX1102AKeysight
Colorado Springs, CO, USA
Spectrum analyzer (10 kHz–150 MHz)3588AHewlett Packard
Everett, WA, USA
Reader LF-band RFID and HF-band RFIDNS106 RFID Reader WriterYiToo
Guangzhou, China
ID cardNTAG213
Signal amplifierZFL-500LN+Mini-Circuit
New York, NY, USA
Receiving coil (65 × 35 mm, 6 coils) Military Communication Institute-National Research Institute, Zegrze Poludniowe, Poland
Table 7. Recorded signal parameters and calculated modulation depth factor value for selected receiver coil-to-ID distances for ZFL-500LN+ use case.
Table 7. Recorded signal parameters and calculated modulation depth factor value for selected receiver coil-to-ID distances for ZFL-500LN+ use case.
Distance d
[cm]
Signal Parameters
U m a x V U m i n V Modulation
Depth Factor m [%]
3.013.39.716.0
5.011.08.413.0
10.08.26.313.1
20.06.34.913.0
25.04.23.214.0
30.03.12.77.0
Table 8. List of equipment used to carry out measurements of selected HF-band RFID readers.
Table 8. List of equipment used to carry out measurements of selected HF-band RFID readers.
DeviceTypeProducer
Oscilloscope DSO90404AAgilent
Santa Clara, CA, USA
Measuring receiverR1550Dynamic Sciences
Chatsworth, CA, USA
A set of measurement antennasHE525
HE526
HE527
Rhode&Schwarz
Munich, Germany
Reader HF-band RFID:
  • Reader LF-band RFID and HF-band
NS106 RFID Reader WriterYiToo
Guangzhou, China
  • Access Control System Reader (Complete System)
S1-RXSecuKey
Shenzhen, China
  • Smartphone (as a reader)
Galaxy A32Samsung
Suwon, South Korea
ID cardNTAG213
Computer with reduced electromagnetic emission (for cooperation with NS106 reader) Military Communication Institute-National Research Institute, Zegrze Poludniowe, Poland
Table 9. List of basic parameters visible at the oscillograms Figure 31.
Table 9. List of basic parameters visible at the oscillograms Figure 31.
Figure/FrequencyLevel of Signal UDuration of Single Signal Pulse Δ
(a)
13.56 MHz
1.309 V1.22 µs
(b)
13.56 MHz
1.309 V84.512 µs
(c)
27.12 MHz
1.309 V84.512 µs
(d)
27.12 MHz
1.309 V1.33 µs
(e)
189.94 MHz
1.309 V84.512 µs
(f)
189.94 MHz
1.309 V1.334 µs
(g)
691.56 MHz
100.00 mV1.292 µs
(h)
691.56 MHz
1.309 V1.22 µs
Table 10. List of basic parameters visible at the oscillograms Figure 28.
Table 10. List of basic parameters visible at the oscillograms Figure 28.
Figure/FrequencyLevel of Signal UDuration of Single Signal Pulse Δ
(a)
13.56 MHz
58.1 mV222.222 µs
(b)
13.56 MHz
81.4 mV9.19 µs
(c)
27.12 MHz
135.3 mV9.33 µs
(d)
40.68 MHz
82.3 mV188.88 µs
(e)
40.68 MHz
135.3 mV9.33 µs
Table 11. List of basic parameters visible at the oscillograms Figure 34.
Table 11. List of basic parameters visible at the oscillograms Figure 34.
Figure/FrequencyLevel of Signal UDuration of Single Signal Pulse Δ
(a)
13.56 MHz
72.50 mV88.88 µs
(b)
13.56 MHz
424.20 mV9.444 µs
(c)
13.56 MHz
83.90 mV1.222 µs
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Firlej, A.; Musial, S.; Kubiak, I. Data Immunity in Near Field Radio Frequency Communication Systems—NFC as an Aspect of Electromagnetic Information Security. Appl. Sci. 2024, 14, 5854. https://doi.org/10.3390/app14135854

AMA Style

Firlej A, Musial S, Kubiak I. Data Immunity in Near Field Radio Frequency Communication Systems—NFC as an Aspect of Electromagnetic Information Security. Applied Sciences. 2024; 14(13):5854. https://doi.org/10.3390/app14135854

Chicago/Turabian Style

Firlej, Andrzej, Slawomir Musial, and Ireneusz Kubiak. 2024. "Data Immunity in Near Field Radio Frequency Communication Systems—NFC as an Aspect of Electromagnetic Information Security" Applied Sciences 14, no. 13: 5854. https://doi.org/10.3390/app14135854

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop