6 ICT Applications – Near Field Communication (NFC)
Objective
Know and understand the characteristics, uses, advantages and disadvantages of Near Field Communication (NFC) including payment using a smartphone.
What is NFC?
Near Field Communication (NFC) is a short‑range wireless technology that enables data exchange between devices when they are brought within a few centimetres of each other.
Key Characteristics
Operating frequency: 13.56 MHz
Maximum range: 0–10 cm (typically 4 cm)
Data transfer rate: 106 kbps, 212 kbps or 424 kbps
Bidirectional communication (peer‑to‑peer), card emulation, and reader/writer modes
Low power consumption – can operate without a battery in passive tags
Common Uses of NFC
Contactless payment (e.g., Apple Pay, Google Pay)
Transport ticketing (e.g., Oyster, Octopus cards)
Access control (e.g., building entry cards)
Information sharing (e.g., business cards, Bluetooth pairing)
Smart posters and marketing (tap to receive URLs, coupons)
Advantages of NFC
Speed – transactions complete in seconds.
Convenience – no need to insert cards or remember PINs for low‑value payments.
Security – short range reduces risk of eavesdropping; data can be encrypted.
Compatibility – works with many smartphones and dedicated NFC cards.
Low energy – passive tags require no power source.
Disadvantages / Limitations
Very short range – must be very close to the reader.
Limited data throughput – unsuitable for large file transfers.
Potential for “relay attacks” if an attacker extends the range with hardware.
Not universally supported on older devices.
Dependence on secure backend infrastructure for payment processing.
How NFC Payment Works with a Smartphone
Setup – User adds a payment card to a mobile wallet (e.g., Google Pay).
Tokenisation – The card number is replaced by a unique token stored securely on the device.
Transaction Initiation – At the point of sale, the user taps the phone on the NFC terminal.
Data Exchange – The phone transmits the token, a one‑time cryptographic code and transaction details over the NFC link.
Authentication – The terminal forwards the data to the acquiring bank, which validates the token with the card issuer.
Authorization – If approved, the bank sends an approval message back through the same path; the terminal displays “Approved”.
Receipt – The user may receive a digital receipt on the phone.
Security Features in NFC Payments
Feature
Description
Tokenisation
Real card details are never stored on the device or transmitted.
Dynamic C \cdot V
A unique code is generated for each transaction, preventing reuse.
Secure Element (SE) / Trusted Execution Environment (TEE)
Hardware‑based storage isolates sensitive data from the operating system.
Biometric / PIN verification
Device may require fingerprint, face ID, or PIN before authorising a payment.
Practical Classroom Activities
Demonstrate a tap‑to‑pay transaction using a dummy NFC terminal and a smartphone.
Compare NFC with other contactless technologies (Bluetooth Low Energy, RFID) in a \cdot enn diagram.
Discuss a case study of a city that introduced NFC transport tickets and evaluate its impact.
Role‑play a security breach scenario and identify how tokenisation and short range mitigate risk.
Suggested diagram: Flowchart of an NFC payment transaction from smartphone to bank approval.
Summary Checklist
Identify the three operating modes of NFC.
List at least three everyday uses of NFC.
Explain why the short range of NFC is both an advantage and a limitation.
Describe the steps involved in a smartphone‑based NFC payment.
State two security mechanisms that protect NFC payments.