882  NFC Introduction and Basics

882.1 Learning Objectives

By the end of this chapter, you will be able to:

  • Understand NFC Fundamentals: Explain what NFC is and how it differs from RFID and Bluetooth
  • Identify Operating Modes: Describe peer-to-peer, read/write, and card emulation modes at a high level
  • Recognize NFC Applications: Identify common NFC use cases including payments, access control, and device pairing
  • Understand Range as Security: Explain why NFC’s 4 cm range is a deliberate security feature

882.2 Prerequisites

Before diving into this chapter, you should be familiar with:

  • Networking Basics: Understanding wireless communication principles, data rates, and protocol basics helps contextualize how NFC fits within the broader IoT communication landscape
  • Basic wireless concepts: Familiarity with frequency bands, data encoding, and wireless range concepts will help you understand NFC’s 13.56 MHz operation and short-range characteristics
NoteHow NFC Relates to Bluetooth, Wi-Fi, and RFID

By this point you may have already studied:

You can think of NFC as the ultra-short-range, user-intent corner of this family: - very short range (a few centimetres) - usually one-to-one interactions initiated by a tap - often used as a trigger for other links (for example, NFC tap to start Bluetooth pairing)

As you read this chapter, keep comparing NFC to what you know from Bluetooth and RFID: what stays the same (radio waves, tags, readers) and what changes (range, power, and how people interact with the system).

NoteKey Takeaway

In one sentence: NFC enables instant, secure communication within 4 cm range without pairing, making it ideal for payments, access control, and triggering other wireless connections.

Remember this rule: Use NFC when you need intentional “tap to interact” user experience with zero setup time; use Bluetooth when you need continuous streaming or longer range.

NFC is like a secret handshake between your phone and special stickers!

882.2.1 The Sensor Squad Adventure: The Magic Tap

One day, the Sensor Squad discovered something mysterious at the bus stop. There was a colorful poster for a new movie, and when Sammy the Temperature Sensor’s owner tapped their phone against a small circle on the poster - WHOOSH! - the movie trailer started playing on their phone!

“How did that happen?!” Lila the Light Sensor gasped. “There’s no wire, no button, nothing!”

Bella the Button knew the answer. “That’s NFC - Near Field Communication! It’s like a super-secret whisper between devices. But here’s the cool part: they have to be REALLY close to talk - like almost touching, within about the width of your thumb!”

Max the Motion Detector zoomed in for a closer look at the poster. “See that tiny circle? That’s an NFC tag. It’s thinner than a sticker, has NO battery, and can store information like a tiny invisible treasure chest. When you bring your phone super close, the phone’s energy wakes up the tag, and they share secrets!”

“It’s like a magic handshake!” Sammy said excitedly. “You know how you and your best friend might have a special handshake that only you two know? NFC is like that - your phone and the tag have a special language, but they can only use it when they’re touching!”

The Sensor Squad learned that NFC is used everywhere - paying for things at stores (tap to pay!), getting on buses with a card, sharing photos between phones, and even unlocking doors. All with just a tap!

882.2.2 Key Words for Kids

Word What It Means
NFC (Near Field Communication) A way for devices to talk by almost touching - like whispering a secret into someone’s ear
Tap to Pay Using your phone like a magic wallet - tap it on the store’s machine and it pays for things
NFC Tag A tiny sticker with a hidden antenna that can store information and share it when you tap it

882.2.3 Try This at Home!

The Whispering Game: Play a game to understand why NFC’s short range is actually its superpower! Stand in a room with family members. First, SHOUT a message (this is like Wi-Fi - everyone can hear from far away). Then TALK normally across a table (this is like Bluetooth - medium distance). Finally, WHISPER directly into someone’s ear (this is like NFC - super private, only the person right next to you hears). Which way is most private? That’s why banks love NFC for payments - no one can “hear” your credit card number because devices must almost touch!

882.3 Getting Started (For Beginners)

TipNew to NFC? Start Here!

You’ve probably used NFC without knowing it-tapping your phone to pay, scanning a smart poster, or sharing contacts. Here’s what’s actually happening.

882.3.1 What is NFC? (Simple Explanation)

NFC = Near Field Communication

It’s the technology that lets two devices communicate when they’re almost touching (within ~4 cm).

You use NFC for: - Contactless payments (Apple Pay, Google Pay) - Transit cards (tap to enter subway) - Quick pairing (tap phone to speaker) - Smart tags (tap poster for info) - Access cards (tap to unlock door)

882.3.2 How NFC Works: A Simple Analogy

Analogy: Whispered Conversation

Think of wireless technologies like different ways of talking:

Technology Range Analogy Use Case
Wi-Fi 50m Shouting across a field Home internet
Bluetooth 10m Normal conversation Headphones
NFC 4cm Whisper in someone’s ear Payments

NFC is like whispering: - Private - Only the person right next to you can hear - Instant - No pairing needed, just get close - Effortless - Tags don’t even need batteries!

882.3.3 NFC vs. RFID vs. Bluetooth

Near Field Communication technology overview showing smartphone and NFC tag with wireless communication waves indicating short-range contactless data exchange at 13.56 MHz within 4cm proximity.

NFC Technology Overview
Figure 882.1: Source: CP IoT System Design Guide, Chapter 4 - Short-Range Protocols

%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#E8F4F8', 'primaryTextColor': '#2C3E50', 'primaryBorderColor': '#16A085', 'lineColor': '#16A085', 'secondaryColor': '#FFF5E6', 'tertiaryColor': '#F0F0F0', 'noteTextColor': '#2C3E50', 'noteBkgColor': '#FFF5E6', 'textColor': '#2C3E50', 'fontSize': '16px'}}}%%
graph TB
    subgraph NFC["NFC"]
        N1["Range: 4 cm"]
        N2["Frequency: 13.56 MHz"]
        N3["No pairing needed"]
        N4["Tags: No battery"]
        N5["Use: Payments,<br/>Quick pairing"]
    end

    subgraph RFID["RFID"]
        R1["Range: cm to 100m"]
        R2["Frequency: LF/HF/UHF"]
        R3["Reader-tag only"]
        R4["Tags: Passive/Active"]
        R5["Use: Inventory,<br/>Access control"]
    end

    subgraph BT["Bluetooth"]
        B1["Range: 10m"]
        B2["Frequency: 2.4 GHz"]
        B3["Requires pairing"]
        B4["Devices: Battery"]
        B5["Use: Audio,<br/>Data transfer"]
    end

    style NFC fill:#E8F4F8,stroke:#16A085,stroke-width:3px
    style RFID fill:#FFF5E6,stroke:#E67E22,stroke-width:3px
    style BT fill:#F8E8E8,stroke:#2C3E50,stroke-width:3px

882.3.4 The Three NFC Modes

NFC devices can operate in three different modes:

Three NFC operation modes illustrated: reader/writer mode for accessing tags, peer-to-peer mode for device-to-device communication, and card emulation mode for mobile payments where smartphone acts as contactless smart card.

NFC Operation Modes

Artistic visualization of NFC operating modes showing read/write mode with smartphone scanning tag, peer-to-peer mode with two phones exchanging data, and card emulation mode with phone being tapped against payment terminal, using distinct color schemes to differentiate each mode.

NFC Operating Modes

Comprehensive NFC modes diagram showing the three operating modes (reader/writer, peer-to-peer, card emulation) with visual icons representing typical use cases like smart posters, file sharing, and contactless payments.

NFC Modes Overview

Modern diagram showing NFC communication flow patterns for each mode, including the RF field generation, modulation schemes, and data exchange protocols used in reader/writer, P2P, and card emulation scenarios.

NFC Communication Modes
Figure 882.2: Source: CP IoT System Design Guide, Chapter 4 - Short-Range Protocols

Graph diagram

Graph diagram
Figure 882.3: Three NFC operating modes: read/write, peer-to-peer, card emulation

This variant helps you decide when to use NFC vs other technologies:

%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#2C3E50', 'primaryTextColor': '#fff', 'primaryBorderColor': '#16A085', 'lineColor': '#16A085', 'secondaryColor': '#E67E22', 'tertiaryColor': '#7F8C8D'}}}%%
flowchart TD
    START["IoT Use Case"] --> Q1{"User must<br/>intentionally<br/>interact?"}

    Q1 -->|"Yes"| Q2{"Distance<br/>< 10 cm OK?"}
    Q1 -->|"No"| OTHER["BLE/Wi-Fi<br/>Auto-connect"]

    Q2 -->|"Yes"| Q3{"One-time<br/>trigger or<br/>continuous?"}
    Q2 -->|"No"| BLE["Bluetooth<br/>10m range"]

    Q3 -->|"One-time"| NFC["NFC<br/>Perfect fit!"]
    Q3 -->|"Continuous"| BLE2["Start with NFC<br/>then switch to BLE"]

    style START fill:#2C3E50,stroke:#16A085,color:#fff
    style Q1 fill:#E67E22,stroke:#2C3E50,color:#fff
    style Q2 fill:#E67E22,stroke:#2C3E50,color:#fff
    style Q3 fill:#E67E22,stroke:#2C3E50,color:#fff
    style NFC fill:#16A085,stroke:#2C3E50,color:#fff
    style BLE fill:#7F8C8D,stroke:#2C3E50,color:#fff
    style BLE2 fill:#7F8C8D,stroke:#2C3E50,color:#fff
    style OTHER fill:#7F8C8D,stroke:#2C3E50,color:#fff

NFC is ideal when users must deliberately tap, and it is often used to trigger Bluetooth pairing for ongoing connections.

882.3.5 Real-World NFC Examples

1. Contactless Payments (Apple Pay/Google Pay)

You tap phone -> Phone acts as credit card -> Terminal reads
                card number (encrypted) -> Payment approved

2. Smart Posters

Movie poster has NFC tag -> Tap phone -> Opens trailer in browser

3. Quick Device Pairing

New Bluetooth speaker -> Tap phone to speaker -> Automatically pairs!

4. Smart Home

NFC tag on nightstand -> Tap phone -> Turns off lights,
                                    sets alarm, enables Do Not Disturb

882.3.6 Why NFC for IoT?

Advantage How It Helps IoT
No batteries in tags Passive tags can be long-lived and maintenance-free (though they can still be damaged or removed)
Intent required User must physically tap (secure)
Instant connection No pairing, no passwords
Low cost Many tag types are inexpensive (varies by type and volume)
Broad support Many smartphones support NFC, but availability varies by device and region

This variant shows the three NFC operating modes and their typical use cases:

%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#2C3E50', 'primaryTextColor': '#fff', 'primaryBorderColor': '#16A085', 'lineColor': '#16A085', 'secondaryColor': '#E67E22', 'tertiaryColor': '#7F8C8D', 'fontSize': '11px'}}}%%
graph TB
    subgraph READER["Reader/Writer Mode"]
        R1["Phone reads NFC tag"]
        R2["Tag contains: URL, text, data"]
        R3["Use: Smart posters, product info"]
        R4["Tag is passive (no battery)"]
    end

    subgraph P2P["Peer-to-Peer Mode"]
        P1["Two active devices"]
        P2["Both can send/receive"]
        P3["Use: Android Beam (deprecated)"]
        P4["Both have power"]
    end

    subgraph CARD["Card Emulation Mode"]
        C1["Phone acts as smart card"]
        C2["Terminal reads phone"]
        C3["Use: Payments, access control"]
        C4["Secure Element stores keys"]
    end

    NFC["NFC 13.56 MHz"] --> READER
    NFC --> P2P
    NFC --> CARD

    style NFC fill:#2C3E50,stroke:#16A085,color:#fff
    style READER fill:#16A085,stroke:#2C3E50,color:#fff
    style P2P fill:#E67E22,stroke:#2C3E50,color:#fff
    style CARD fill:#7F8C8D,stroke:#2C3E50,color:#fff

NFC operates in three modes: Reader/Writer (phone reads passive tags), Peer-to-Peer (two phones exchange data), and Card Emulation (phone becomes a contactless card for payments). Card Emulation is most critical for secure applications.

This variant compares NFC with related short-range technologies:

%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#2C3E50', 'primaryTextColor': '#fff', 'primaryBorderColor': '#16A085', 'lineColor': '#16A085', 'secondaryColor': '#E67E22', 'tertiaryColor': '#7F8C8D', 'fontSize': '11px'}}}%%
graph LR
    subgraph NFC["NFC"]
        N1["Range: < 10 cm"]
        N2["Setup: Instant tap"]
        N3["Power: 0W (passive)"]
        N4["Best: Payments, pairing"]
    end

    subgraph BLE["Bluetooth LE"]
        B1["Range: 10-50 m"]
        B2["Setup: Pairing required"]
        B3["Power: Very low"]
        B4["Best: Wearables, sensors"]
    end

    subgraph RFID["HF RFID"]
        R1["Range: < 1 m"]
        R2["Setup: Reader-based"]
        R3["Power: 0W (passive)"]
        R4["Best: Access, inventory"]
    end

    COMBO["NFC + BLE Combo"] --> |"NFC triggers"| BLE2["BLE connects"]

    style NFC fill:#16A085,stroke:#2C3E50,color:#fff
    style BLE fill:#E67E22,stroke:#2C3E50,color:#fff
    style RFID fill:#7F8C8D,stroke:#2C3E50,color:#fff
    style COMBO fill:#2C3E50,stroke:#16A085,color:#fff

NFC excels at intentional, instant interactions. BLE provides continuous connections at longer range. HF RFID (NFC’s parent technology) suits high-volume access/inventory. Common pattern: NFC initiates, BLE sustains.

This variant shows the detailed message flow during contactless payment:

%%{init: {'theme': 'base', 'themeVariables': {'primaryColor': '#2C3E50', 'primaryTextColor': '#fff', 'primaryBorderColor': '#16A085', 'lineColor': '#16A085', 'secondaryColor': '#E67E22', 'tertiaryColor': '#7F8C8D', 'fontSize': '11px'}}}%%
sequenceDiagram
    participant U as User Phone
    participant SE as Secure Element
    participant T as Payment Terminal
    participant B as Bank Network

    Note over U,B: Contactless Payment (< 500ms)

    U->>T: Tap phone (< 4cm)
    T->>U: RF field activates NFC

    U->>SE: Request payment token
    SE->>SE: Generate cryptogram
    SE->>U: One-time token

    U->>T: Transmit encrypted token
    T->>B: Forward for authorization
    B->>B: Verify & debit account
    B->>T: Approved

    T->>U: Success signal
    Note over U: Vibrate + checkmark

Contactless payment uses Card Emulation mode. The Secure Element generates a one-time cryptographic token that cannot be reused, protecting against skimming. The entire process completes in under 500ms.

882.3.7 Self-Check: Understanding the Basics

Before continuing, make sure you can answer:

  1. What range does NFC operate at? - About 4 cm (you need to almost touch devices)
  2. What’s the main advantage over Bluetooth? - Instant connection without pairing; tags need no batteries
  3. What are the three NFC modes? - Reader/Writer, Peer-to-Peer, Card Emulation
  4. How does contactless payment work? - Phone emulates a credit card; terminal reads encrypted card data

882.4 In Plain English: NFC is Like a Secret Handshake

Time: ~8 min | Level: Foundational | ID: P08.C21.U01

NoteUnderstanding NFC Through a Simple Analogy

Think of NFC like a secret handshake between two people:

The Secret Handshake Analogy:

Handshake Aspect NFC Technology
Must be very close NFC only works at 4-10 cm (almost touching)
Both know the moves Both devices use 13.56 MHz standard
Instant recognition Connection happens in < 100 milliseconds
Private exchange Too close for others to intercept
No practice needed No pairing, no passwords, no setup

Why this works:

Just like a secret handshake only happens when two people deliberately get close and both know the moves, NFC requires:

  1. Physical proximity - You must bring devices together (can’t happen by accident)
  2. Mutual understanding - Both devices speak the same 13.56 MHz “language”
  3. Intentional action - Someone has to deliberately tap/touch
  4. Private communication - No one else can “hear” the exchange
  5. Instant connection - No fumbling with menus or settings

Real-world comparison:

  • Wi-Fi = Shouting announcement across a crowded room (everyone hears, 50m range)
  • Bluetooth = Normal conversation across a table (need to select who to talk to, 10m range)
  • NFC = Secret handshake or whisper in someone’s ear (only when touching, < 10 cm range)

The key insight: NFC’s extremely short range isn’t a limitation-it’s the entire point! Just like a secret handshake confirms “I’m choosing to interact with YOU specifically,” NFC’s range ensures security, intentionality, and certainty about what you’re connecting to.

882.5 Real-World Example: Contactless Payment in Action

TipConcrete NFC Payment Scenario with Actual Numbers

Scenario: You’re buying coffee at Starbucks using Apple Pay on your iPhone.

882.5.1 The Numbers Behind the Tap

Metric Value Why It Matters
Distance 0-4 cm Phone must almost touch terminal
Transaction time 250-500 ms Faster than inserting chip card (2-5 sec)
Data transferred ~500 bytes Encrypted payment token
Frequency 13.56 MHz Same as contactless credit cards
Power consumption 0 W (from phone) NFC chip powered by terminal’s field
Security range 10 cm max Impossible to skim from pocket (need < 4 cm)

882.5.2 Step-by-Step: What Happens in 0.5 Seconds

Millisecond-by-millisecond breakdown:

0 ms:     You hold iPhone within 4 cm of payment terminal
          Terminal generates 13.56 MHz electromagnetic field

10 ms:    iPhone's NFC chip detects field
          Chip powers on using energy from terminal (no battery!)

50 ms:    Terminal requests payment card data
          iPhone Secure Element generates one-time token
          Token = Encrypted card number + expiry + CVV

150 ms:   iPhone transmits 500-byte encrypted token
          Data rate: 424 Kbps (53 KB/sec)
          Actual time: 500 bytes / 53 KB/sec ~ 9 ms + overhead

200 ms:   Terminal receives token
          Decrypts and validates with bank

250 ms:   Transaction approved
          Payment complete!
          Phone vibrates and shows checkmark

882.5.3 Why These Numbers Matter

4 cm maximum range: - Security: Thief cannot skim card from your pocket (must physically touch phone) - Intentionality: You consciously choose to pay (not accidental from across counter) - No confusion: Terminal reads YOUR phone, not someone else’s 2 meters away

500 ms total time: - Faster than: - Chip card: 2-5 seconds (insert, wait, remove) - Magnetic stripe: 1-3 seconds (swipe, may need retry) - Cash: 5-30 seconds (count bills, receive change) - Enables high-throughput scenarios (subway turnstiles, fast food)

500 bytes data size: - Small enough to transfer instantly (< 10 ms at 424 Kbps) - Contains: Card token (16 bytes), expiry (2 bytes), cryptogram (8 bytes), metadata (474 bytes) - Much smaller than Bluetooth pairing (5+ KB)

0 watts power from phone: - NFC chip harvests power from terminal’s electromagnetic field - Works even if iPhone battery is dead (reserve power mode) - Energy efficiency: Can process 100,000 payments on single phone charge

882.5.4 The Attack That Doesn’t Work

“Can someone steal my card by bumping into me?”

NO, and here’s the math:

  • NFC read range: 4 cm maximum (1.6 inches)
  • Your phone in pocket: Separated by fabric, phone case, and air gap
  • Effective range through materials: < 2 cm (0.8 inches)
  • Attacker would need to:
    1. Press payment terminal against your body (you’d notice!)
    2. Hold for 300+ ms (you’d definitely notice!)
    3. Bypass phone authentication (Face ID/Touch ID required)
    4. Get lucky that phone is oriented correctly (antenna alignment critical)

Practical reality: Phone “skimming” has never been successfully demonstrated in real-world conditions. The physics make it effectively impossible.

882.5.5 Real Data from Starbucks

Customer throughput improvement:

  • Before mobile payments: 35 customers/hour (average)
  • After mobile payments: 55 customers/hour (average)
  • Time savings: 57% increase in throughput
  • Customer experience: 4.8/5 satisfaction (vs 3.9/5 for chip cards)

Transaction volumes (Starbucks, 2023): - 25% of all transactions via mobile payment (NFC + QR codes) - 8 million NFC payments per week globally - Average transaction: 0.3 seconds (tap to approval)

882.6 What Would Happen If: Distance Attack Scenario

WarningHypothetical: Trying to Intercept NFC from 5 Meters Away

Question: What if someone tries to intercept your NFC mobile payment from 5 meters away using a powerful antenna?

882.6.1 The Physics of Why This Fails

NFC uses near-field electromagnetic coupling, NOT radio waves:

Near-field vs Far-field:

Region Distance Behavior Can intercept?
Near-field < wavelength/2pi (< 8m for 13.56 MHz) Magnetic coupling, field strength proportional to 1/r cubed Only at < 10 cm
Far-field > wavelength/2pi Radio propagation, proportional to 1/r squared Interceptable

The math:

  • Wavelength at 13.56 MHz: wavelength = c/f = 300,000,000 / 13,560,000 = 22.1 meters
  • Near-field boundary: wavelength/2pi = 22.1 / 6.28 = 3.5 meters
  • NFC operates in reactive near-field, not radiating far-field

What this means: - Below 3.5m: Magnetic field dominates (inductive coupling) - Field strength drops as 1/r cubed (cube of distance) - NOT electromagnetic radiation that propagates

Field strength at different distances:

Distance from phone:
- 4 cm  (normal NFC):     100% signal (relative)
- 10 cm (max NFC range):  6.4% signal (proportional to 1/2.5 cubed)
- 50 cm (arm's length):   0.008% signal (proportional to 1/12.5 cubed)
- 5 m   (across room):    0.000000064% signal (proportional to 1/125 cubed)

At 5 meters, the signal is 1.5 BILLION times weaker than at 4 cm!

882.6.2 What Actually Happens at 5 Meters

The attacker tries:

  1. High-gain antenna - Doesn’t help! Near-field coupling requires loop antenna almost touching the phone. A directional antenna only works for far-field radio waves.

  2. Powerful amplifier - Makes noise 1.5 billion times louder than signal. Can’t amplify what isn’t there.

  3. Sensitive receiver - Thermal noise floor at room temperature (-174 dBm/Hz) drowns out any possible NFC signal at 5m.

The signal-to-noise ratio at 5m:

NFC signal at 4 cm:   -20 dBm (10 microwatts)
NFC signal at 5 m:    -182 dBm (below noise floor)
Thermal noise:        -174 dBm

SNR at 5m = -182 - (-174) = -8 dB

Result: Signal is below the noise floor of the universe. Physically impossible to receive.

882.6.3 But What About Relay Attacks?

A more realistic threat: Attacker doesn’t try to intercept from distance, but relays the signal:

How relay attack works:

[Your Phone] <--NFC--> [Attacker Device 1] <--Internet--> [Attacker Device 2] <--NFC--> [Payment Terminal]
               4 cm                           Relay                          4 cm

Steps: 1. Attacker holds Device 1 near your phone (4 cm, you might not notice) 2. Device 1 forwards data over Internet/Wi-Fi to Device 2 3. Device 2 presents at actual payment terminal (could be km away) 4. Your phone thinks it’s paying at legitimate terminal 5. Transaction completes, goods shipped to attacker

Is this actually possible?

Yes, but extremely difficult in practice:

Timing constraints: - NFC timeout: 500 ms maximum - Internet latency: 50-200 ms (variable) - Processing overhead: 50-100 ms - Total: 100-300 ms relay budget

This only works if: - Internet connection is VERY fast and stable - No packet loss or jitter - Attacker is within 4 cm of victim’s phone for 300+ ms - Victim’s phone doesn’t require biometric auth (Face ID adds delay)

Countermeasures that reduce relay risk:

  1. Apple Pay requires active authentication:
    • Double-click side button + Face ID
    • Raises the bar by requiring clear user intent (and often device authentication)
  2. EMV cryptogram includes unpredictable number (UN):
    • Terminal sends random challenge
    • Tight timeouts can make long/unstable relays harder (but low-latency relays have been demonstrated in research)
  3. Distance bounding protocols:
    • Measure round-trip time
    • Can detect abnormal latency (not universally deployed)

882.6.4 Bottom Line

From 5 meters away: Physically impossible due to near-field physics (signal 1.5 billion times weaker)

From 4 cm away: Possible but requires physical proximity, defeating the entire point of “remote” attack

Relay attack: Demonstrated in research; mitigated by user authentication, protocol timeouts, and (where deployed) distance-bounding

NFC security relies on physics, not just cryptography!

882.7 Summary

This chapter introduced NFC fundamentals:

  • What NFC Is: Short-range wireless technology operating at 13.56 MHz with intentionally limited 4 cm range
  • Three Operating Modes: Reader/Writer, Peer-to-Peer, and Card Emulation
  • Common Applications: Contactless payments, transit cards, smart posters, device pairing
  • Security Through Physics: Range limitation is a deliberate security feature, not a technical constraint
  • Comparison to Other Technologies: NFC for instant tap-to-interact, Bluetooth for continuous connections, RFID for bulk scanning

882.8 What’s Next

The next chapter, NFC Modes and Protocols, explores the technical details of NFC operating modes, tag types, and the NDEF data format that enables cross-platform compatibility.