22  NFC Fundamentals

In 60 Seconds

NFC provides intentional touch interaction at a 4 cm range with three modes: Peer-to-Peer (two phones), Read/Write (phone + tag), and Card Emulation (phone as contactless card). Use NDEF format for cross-device compatibility, choose tag types based on memory needs, and use NFC when you need zero-setup “tap to interact” experiences.

22.1 Learning Objectives

By the end of this chapter, you will be able to:

  • Differentiate NFC from Related Protocols: Compare NFC operating characteristics against RFID, Bluetooth, and QR codes across range, data rate, and interaction model
  • Classify NFC Operating Modes: Categorize Peer-to-Peer, Read/Write, and Card Emulation modes by their initiator-target relationships and use cases
  • Evaluate Tag Type Trade-offs: Assess NFC tag types 1 through 5 on memory capacity, data rate, security features, and unit cost for specific IoT deployments
  • Design NFC-Enabled IoT Solutions: Architect end-to-end NFC workflows for device provisioning, contactless payments, and access control including NDEF message planning and tag selection

NFC (Near Field Communication) lets two devices communicate when they are almost touching – within about 4 centimeters. You use NFC every time you tap your phone to pay at a store or tap a transit card to ride the subway. For IoT, NFC provides a simple, intuitive way to pair devices and transfer small amounts of data.

MVU: Minimum Viable Understanding

If you only have 5 minutes, here’s what you need to know about NFC for IoT:

  1. NFC = Intentional Touch Interaction - 4 cm range means users must deliberately tap, providing built-in security
  2. Three Modes: Peer-to-Peer (two phones), Read/Write (phone + tag), Card Emulation (phone as card)
  3. Tag Types 1-5: Choose Type 2 for simple URLs (~144 bytes), Type 4 for larger data (up to 32KB)
  4. Use NDEF Format: NFC Data Exchange Format ensures cross-device compatibility

Bottom line: Use NFC when you need a “tap to interact” user experience with zero setup time. For streaming data or longer range, use Bluetooth instead.

In Plain English

NFC is the technology that powers contactless payments (Apple Pay, Google Pay), transit cards, and “tap to connect” device pairing. It works at very short range (4 cm) by design - this means users must intentionally bring their device close to interact, making accidental or malicious connections nearly impossible.

Why it matters for IoT: NFC provides instant, secure interactions for provisioning devices, unlocking doors, sharing configuration data, and bootstrapping other connections like Bluetooth or Wi-Fi.

Hey future tech explorer! Let’s learn about NFC with the Sensor Squad!

Sammy the Sensor has a special power - he can share information with friends just by touching! Let’s see how it works.

Think of NFC like a secret handshake:

Imagine you and your best friend have a special handshake that only works when you’re right next to each other. You can’t do the handshake from across the room - you have to be close! That’s exactly how NFC works.

The Sensor Squad Adventure:

  • Sammy holds a tiny NFC tag with his name and favorite color
  • Lila the Light walks by from 10 feet away - nothing happens!
  • Max the Motor comes close (within 4 cm) and… TAP!
  • Instantly, Max knows Sammy’s name and favorite color!

Real-World Examples You Know:

  • Tap to Pay: When mom or dad taps their phone at the store - that’s NFC!
  • Transit Cards: Tap your card on the bus - NFC reads your ticket!
  • Toy Interaction: Some toys communicate when you tap them together!
  • Game Amiibos: Nintendo Amiibo figures use NFC to unlock game content!

Fun Experiment:

If you have an Android phone, ask an adult to help you download an NFC reader app. Then look for NFC symbols (it looks like a radio wave) on cards and objects around your house - you might be surprised how many things have NFC!

Why the Short Range is Cool:

The short range isn’t a problem - it’s a superpower! It means no one can secretly scan your information from across the room. You choose exactly when to share by tapping.


Prerequisites

Before diving into NFC, you should have basic familiarity with:

  • Wireless communication concepts - Understanding of radio frequency basics
  • RFID fundamentals - NFC is built on HF RFID technology (see RFID Fundamentals)
  • Basic IoT device interaction - How sensors and actuators communicate

If you’re new to wireless communication, consider starting with our Wireless Propagation Fundamentals chapter first.


22.2 Near Field Communication (NFC)

NFC (Near Field Communication) is a short-range wireless technology based on HF RFID that enables two devices to communicate when brought within a few centimeters of each other. Operating at 13.56 MHz, NFC provides secure, intuitive touch-to-connect interactions for payments, access control, data transfer, and device pairing.

Key Takeaway

In one sentence: NFC enables instant, secure communication within 4 cm range without pairing, making it ideal for payments, access control, and triggering other wireless connections.

Remember this rule: Use NFC when you need intentional “tap to interact” user experience with zero setup time; use Bluetooth when you need continuous streaming or longer range.

22.3 Chapter Overview

This NFC fundamentals series is organized into four focused chapters:

22.3.1 1. NFC Introduction and Basics

For beginners and those new to NFC technology

  • What NFC is and how it differs from RFID and Bluetooth
  • The three operating modes at a high level
  • Real-world examples: contactless payments, smart posters, device pairing
  • Why NFC’s 4 cm range is a security feature, not a limitation
  • Kid-friendly Sensor Squad explanation

22.3.2 2. NFC Modes and Protocols

Technical details of NFC operation

  • NFC vs RFID relationship and what makes NFC special
  • Detailed operating modes: Peer-to-Peer, Read/Write, Card Emulation
  • NFC tag types (Type 1-5) and their characteristics
  • NDEF (NFC Data Exchange Format) message structure
  • Bluetooth handover and NFC-assisted pairing

22.3.3 3. NFC Security and Best Practices

Implementation guidance and security considerations

  • 7 common NFC pitfalls and how to avoid them
  • Security validation: encryption, input validation, NTAG424 DNA
  • Decision framework: When to use NFC vs Bluetooth vs RFID vs QR codes
  • Worked examples with real calculations
  • Practitioner pitfalls from real-world deployments

22.3.4 4. NFC Hands-On Lab

Practical Wokwi simulation lab

  • ESP32-based NFC tag simulation
  • NDEF parsing and decoding
  • Security validation implementation
  • Challenge exercises for deeper learning
  • Transition guidance to real hardware (PN532, RC522)

22.4 Learning Path

The following diagram shows the recommended learning progression through the NFC chapter series. Each chapter builds on concepts from the previous one, though experienced readers may skip ahead.

Flowchart showing NFC learning progression from Start through four chapters: Introduction & Basics and Modes & Protocols in the Beginner Track, then Security & Best Practices and Hands-On Lab in the Advanced Track, ending at NFC Expert. Dotted lines show skip paths for experienced users.

NFC Learning Path - Recommended Progression

Recommended order: Start with Introduction, then Modes & Protocols, followed by Security & Best Practices. Complete the Hands-On Lab after reading the other chapters.

Quick reference: If you already understand NFC basics, jump directly to Security & Best Practices or the Hands-On Lab.

22.5 NFC Operating Modes

NFC devices can operate in three distinct modes, each optimized for different use cases. Understanding these modes is essential for choosing the right approach for your IoT application.

Diagram showing three NFC operating modes: Peer-to-Peer Mode with bidirectional data exchange between two phones, Read/Write Mode where a phone reads or writes data to an NFC tag, and Card Emulation Mode where a payment terminal reads from a phone acting as a contactless card. Each mode shows its primary use cases.

NFC Operating Modes Overview
Mode Description Example Use Cases
Peer-to-Peer Two NFC devices exchange data bidirectionally Android Beam (deprecated), contact sharing, Wi-Fi credential transfer
Read/Write NFC device reads from or writes to a passive tag Smart posters, product authentication, asset tracking, IoT provisioning
Card Emulation NFC device acts as a contactless smart card Apple Pay, Google Pay, transit cards, building access

22.6 Knowledge Check: NFC Basics

Test your understanding of NFC fundamentals with these questions.


22.7 NFC Tag Types

NFC Forum defines five tag types with different memory capacities, data rates, and security features. Selecting the right tag type is crucial for balancing cost, capacity, and functionality in your IoT application.

Flowchart comparing five NFC Forum tag types: Type 1 (48-2146 bytes, 106 kbps for simple URLs at 5-15 cents), Type 2 (48-2048 bytes, 106 kbps, most common for smart posters at 10-25 cents), Type 3 (up to 1 MB, 212 kbps, FeliCa for transit cards at 50 cents to 1 dollar), Type 4 (up to 32 KB, 424 kbps, ISO 14443 for secure access at 50 cents to 2 dollars), and Type 5 (up to 64 KB, 26 kbps, ISO 15693 for industrial use at 30-80 cents).

NFC Tag Types Comparison - Memory and Features
Tag Type Memory Data Rate Best Use Case Cost Range
Type 1 48B - 2KB 106 kbps Simple URLs, basic ID $0.05-0.15
Type 2 48B - 2KB 106 kbps Smart posters, device pairing $0.10-0.25
Type 3 Up to 1MB 212 kbps Transit cards, high-speed apps $0.50-1.00
Type 4 Up to 32KB 424 kbps Secure access, payments $0.50-2.00
Type 5 Up to 64KB 26 kbps Industrial, longer range (1.5m) $0.30-0.80
Tag Selection Rule of Thumb
  • Type 2: Default choice for most IoT applications (best price-to-capacity ratio)
  • Type 4: When you need encryption or larger data storage
  • Type 5: When you need slightly longer read range in industrial environments




22.8 Key Concepts Summary

The table below summarizes the essential NFC technical specifications you need to know for IoT applications.

Concept Description
Range 4-10 cm (intentionally short for security)
Frequency 13.56 MHz (HF band)
Data Rate 106, 212, 424, or 848 Kbps
Power Passive tags powered by reader field
Modes Peer-to-Peer, Read/Write, Card Emulation
Tag Types Type 1-5 (48 bytes to 32 KB memory)
Data Format NDEF (NFC Data Exchange Format)

22.10 NFC and RFID: Understanding the Relationship

NFC is a specialized subset of RFID technology. Understanding this relationship helps clarify when to use each technology.

Hierarchical diagram showing RFID as the parent technology with three frequency bands: LF RFID at 125-134 kHz for animal tracking with 10cm range, HF RFID at 13.56 MHz for access cards and library tags with 1m range, and UHF RFID at 860-960 MHz for supply chain with 12m range. NFC is shown as a specialized subset of HF RFID, adding bidirectional communication, peer-to-peer mode, and smartphone integration, operating within 4cm range.

NFC as a Subset of RFID Technology
Key Insight: NFC = HF RFID + Enhancements

NFC uses the same 13.56 MHz frequency as HF RFID but adds:

  1. Bidirectional communication - Both devices can send and receive
  2. Peer-to-peer capability - Two active devices can communicate
  3. Card emulation - Phones can act as contactless cards
  4. NDEF standardization - Universal data format for cross-device compatibility
  5. Smartphone integration - Built into most modern phones


22.11 NFC vs Other Short-Range Technologies

Choosing the right short-range technology depends on your specific use case. The following comparison helps you understand when to use NFC versus alternatives like Bluetooth, RFID, or QR codes.

Decision flowchart for choosing short-range technologies. If you need continuous data streaming, choose Bluetooth/BLE with 10-100m range. If you need tap-to-interact UX, choose NFC with 4cm range. If you need to read from distance, choose RFID with up to 12m range. If you need lowest cost, choose QR codes with zero hardware cost. Otherwise, consider NFC for best overall user experience.

NFC Comparison with Other Short-Range Technologies
Technology Range Best For Limitations
NFC 4 cm Payments, access control, device pairing Very short range, requires close contact
Bluetooth/BLE 10-100 m Audio streaming, wearables, continuous data Requires pairing, higher power consumption
RFID 1-12 m Inventory tracking, logistics, access control No phone support (except NFC), specialized readers
QR Code Visual Marketing links, tickets, menus Requires camera, poor durability

22.12 NDEF Data Format

NDEF (NFC Data Exchange Format) is the standardized message format that ensures NFC data can be read by any NFC-enabled device. Understanding NDEF is essential for interoperability.

Diagram showing NDEF message structure with multiple records, each containing header, type, and payload. Common record types shown include URI for web addresses, Text for plain text data, Smart Poster combining URI with title and icon, MIME for vCard and JSON data, and Android Application Record for launching specific apps.

NDEF Message Structure

Common NDEF Record Types:

Type Use Case Example
URI Open web pages, dial phone numbers https://example.com/product/123
Text Display information "Manufactured: 2024-01-15"
Smart Poster Marketing with rich content URI + Title + Action + Icons
MIME Application-specific data vCard contacts, JSON config
Android Application Record Launch specific Android app com.example.myapp
NDEF Size Matters

NDEF message size directly impacts tag selection. A URL like https://example.com/page uses ~25 bytes, but a Smart Poster with title, icons, and action can easily exceed 200 bytes. Always calculate your NDEF payload size before selecting tags.




22.13 Practical Implementation Considerations

When designing NFC-enabled IoT solutions, consider these key factors that affect real-world deployments.

Implementation checklist flowchart with three phases: Environment Factors (metal surfaces require anti-metal tags, high temperature needs industrial-rated tags, outdoor exposure needs weatherproof housing), Security Requirements (authentication needs NTAG 424 DNA, tamper detection needs tamper-evident tags, encryption requires Type 4 with crypto), and User Experience (clear tap zone with visual NFC indicator, feedback on success with audio or haptic response, error recovery with retry instructions).

NFC Implementation Decision Checklist
Common NFC Pitfalls
  1. Metal interference: NFC doesn’t work through metal. Use ferrite-shielded tags or spacers for metal surfaces.
  2. Tag placement: Phone NFC antennas vary in position. Test tap zones with multiple phone models.
  3. iOS limitations: iPhones only support NFC reading in certain apps (Background Tag Reading requires iOS 12+).
  4. Write protection: Decide early whether tags should be read-only or rewritable.
  5. Overestimating capacity: Account for NDEF overhead (TLV headers consume 4-8 bytes).


22.14 Worked Example: Calculating NFC Tag Requirements

Practical Exercise

Let’s walk through a real-world NFC tag selection problem step by step.

Scenario: You’re designing an NFC-based product authentication system for a consumer electronics company. Each product needs:

  • Product URL: https://company.com/verify?id=XXXXXXXXXX (~45 bytes)
  • Serial number: 12-character alphanumeric (~12 bytes)
  • Manufacturing date: ISO 8601 format YYYY-MM-DD (~10 bytes)
  • Warranty expiration: Same format (~10 bytes)

Context: Calculating NFC tag memory requirements including NDEF overhead.

Raw payload: \[P_{\text{raw}} = 45 + 12 + 10 + 10 = 77\,\text{bytes}\]

NDEF overhead breakdown:

  • TLV (Type-Length-Value) wrapper: 4 bytes
  • NDEF message header: 3 bytes
  • URI record header: 5 bytes
  • Text record headers (3 records): \(3 \times 3 = 9\) bytes \[O_{\text{NDEF}} = 4 + 3 + 5 + 9 = 21\,\text{bytes}\]

Total NDEF message size: \[M_{\text{total}} = P_{\text{raw}} + O_{\text{NDEF}} = 77 + 21 = 98\,\text{bytes}\]

Worked example: NTAG213 selection with 144 bytes user memory: - Required: 98 bytes - Available: 144 bytes - Spare capacity: \(144 - 98 = 46\,\text{bytes}\) (47% headroom)

Cost analysis at 50,000 units: - NTAG213 (144B): $0.12 × 50,000 = $6,000 - NTAG424 DNA (256B with crypto): $0.82 × 50,000 = $41,000 - Extra security cost: $41,000 - $6,000 = $35,000 (0.7% of $5M product revenue at $100/unit)

For products >$100, cryptographic authentication typically provides positive ROI through counterfeit prevention.

Step 1: Calculate Total Data Requirements

Raw data: 45 + 12 + 10 + 10 = 77 bytes

NDEF overhead:
- TLV header: 4 bytes
- NDEF message header: 3 bytes per record
- URI record (including type prefix): ~5 bytes overhead
- Text records: ~3 bytes overhead each

Total NDEF overhead: ~20 bytes

Total requirement: 77 + 20 = ~97 bytes

Step 2: Select Tag Type

Tag Type Min Memory Cost Verdict
Type 1 48 bytes $0.05 Too small
Type 2 (NTAG213) 144 bytes $0.12 Sufficient
Type 2 (NTAG215) 504 bytes $0.18 Overkill
Type 4 2KB+ $0.50+ Overkill for this use case

Decision: NTAG213 (Type 2) with 144 bytes provides adequate headroom (47 bytes spare) at the lowest cost that meets requirements.

Step 3: Consider Environment

  • Products have metal housings → Need ferrite-backed tags (+$0.08-0.15)
  • Final tag cost: ~$0.20-0.27 per unit

Step 4: Security Considerations

For basic authentication, NTAG213 is sufficient. For anti-counterfeiting, consider:

  • NTAG 424 DNA (~$0.40-0.80): Adds cryptographic authentication
  • Generates unique, one-time URLs that can’t be cloned
Cost-Security Trade-off

For products under $50, basic Type 2 tags often suffice. For products over $100 or pharmaceuticals, invest in NTAG 424 DNA to prevent counterfeiting losses that exceed the tag cost difference.


Scenario: You’re launching a line of premium headphones ($299 retail) with NFC-enabled packaging for product authentication and quick-start guides.

Requirements:

  • Product verification URL: https://verify.acme.co/product?id=HP-PRO-2024-XXXXXX (50 bytes)
  • Quick-start guide URL: https://guide.acme.co/hp-pro-setup (35 bytes)
  • Warranty registration link: https://warranty.acme.co/register/XXXXXX (45 bytes)
  • Must prevent counterfeiting (authentication requirement)
  • Production volume: 50,000 units annually

Step 1: Calculate NDEF Message Size

Raw payload: - Verification URL: 50 bytes - Quick-start URL: 35 bytes - Warranty URL: 45 bytes - Total raw data: 130 bytes

NDEF overhead per record: - Record header: 3 bytes - Type field: 1 byte (URI type) - URI prefix compression: -7 bytes (https:// → 0x04) - Per-record overhead: ~3 bytes

Total NDEF message: - 3 URL records × (content + 3 bytes overhead) - Verification: 50 + 3 = 53 bytes - Quick-start: 35 + 3 = 38 bytes - Warranty: 45 + 3 = 48 bytes - NDEF message wrapper: 4 bytes - Total: 143 bytes

Step 2: Tag Type Selection with Security Considerations

Tag Type User Memory Security Unit Cost 50K Units Cost
NTAG213 144 bytes None $0.12 $6,000
NTAG215 504 bytes 32-bit password $0.18 $9,000
NTAG424 DNA 256 bytes AES-128 + SUN $0.82 $41,000

Size Analysis:

  • NTAG213: 143 bytes fits (with only 1 byte spare - risky)
  • NTAG215: 143 bytes fits easily (361 bytes spare)
  • NTAG424: 143 bytes fits (113 bytes spare)

Security Analysis for $299 Headphones:

Without authentication (NTAG213/215): - Counterfeiters clone legitimate tags to fake packaging - Customer receives fake headphones, thinks they’re genuine - Brand reputation damage + support costs

With NTAG424 DNA: - Each tap generates unique signed URL with counter - Example: https://verify.acme.co/p?uid=041234&ctr=00007&cmac=A1B2C3D4 - Server validates cryptographic signature - Cloned tags: Signature fails validation (server detects) - Replayed taps: Counter mismatch detected

Step 3: Cost-Benefit Analysis

Without authentication (NTAG215): - Tag cost: $9,000 for 50,000 units - Estimated counterfeiting impact: - 2% of market (1,000 fake units) - Customer support: $50 per case = $50,000 - Brand damage: estimated $100,000 lost sales - Total first-year cost: $159,000

With authentication (NTAG424 DNA): - Tag cost: $41,000 for 50,000 units - Counterfeiting near-impossible (cryptographic proof) - Customer support: <$5,000 (only legitimate issues) - Brand protection: Priceless - Total first-year cost: $46,000

ROI Calculation:

  • NTAG424 saves: $159,000 - $46,000 = $113,000 first year
  • Payback period: Immediate (cheaper overall despite higher tag cost)
  • Per-unit impact: $41,000 ÷ 50,000 = $0.82 per unit (0.27% of retail price)

Step 4: URL Optimization (Reduce NDEF Size)

Before optimization: 143 bytes

https://verify.acme.co/product?id=HP-PRO-2024-XXXXXX  (50 bytes)
https://guide.acme.co/hp-pro-setup                  (35 bytes)
https://warranty.acme.co/register/XXXXXX            (45 bytes)

After optimization: 71 bytes

https://a.co/v/XXXXXX     (22 bytes, redirect to verification)
https://a.co/g/hp-pro     (21 bytes, redirect to guide)
https://a.co/w/XXXXXX     (22 bytes, redirect to warranty)
URI compression: -21 bytes (https:// prefix)

New total: 71 bytes (saves 72 bytes) - Now fits comfortably on NTAG213 (73 bytes spare) - But security still requires NTAG424!

Step 5: Final Recommendation

Best choice: NTAG424 DNA ($0.82/unit)

Reasoning: 1. Security: Unforgeable authentication critical for $299 product 2. ROI: Saves $113,000 vs unprotected tags in first year 3. Memory: 256 bytes sufficient even without URL shortening 4. Future-proof: Can add features later (product recall tracking, usage analytics)

Implementation:

# Server-side validation
def verify_product(uid, counter, cmac):
    # 1. Look up product by UID
    product = db.query("SELECT * FROM products WHERE nfc_uid = ?", uid)
    if not product:
        return {"valid": False, "reason": "Unknown product"}

    # 2. Check counter (must increment)
    if counter <= product.last_counter:
        return {"valid": False, "reason": "Replay attack detected"}

    # 3. Validate CMAC signature
    expected_cmac = aes_cmac(uid + counter, product.aes_key)
    if cmac != expected_cmac:
        return {"valid": False, "reason": "Invalid signature - counterfeit"}

    # 4. Update counter and return success
    db.execute("UPDATE products SET last_counter = ? WHERE nfc_uid = ?", counter, uid)
    return {"valid": True, "product": product.model, "warranty_until": product.warranty_end}

Key Insights:

  • Memory calculations must include NDEF overhead (~3 bytes per record)
  • Security requirements often override size/cost considerations
  • URL shorteners can halve payload size but don’t fix security
  • For products >$100, cryptographic tags pay for themselves immediately
  • Always calculate expected total cost (tag + breach costs), not just tag cost

22.15 Concept Relationships

How NFC Concepts Interconnect

NFC extends HF RFID (13.56 MHz) with bidirectional communication and three operating modes. Peer-to-Peer enables phone-to-phone data exchange (Android Beam, contact sharing). Read/Write lets phones access passive tags (smart posters, inventory). Card Emulation turns phones into contactless cards (Apple Pay, transit).

Tag types (1-5) differ in memory (48 bytes to 32 KB), speed (106-424 Kbps), and security (password protection vs AES-128). NDEF provides universal data format ensuring Type 2 tags written on Android work on iPhone.

The 4 cm range is intentional security—preventing accidental connections and remote eavesdropping. This “feature, not bug” design enables secure payments where longer range would be catastrophic (imagine charging everyone in a 10m radius).

22.16 See Also

Deep Dives:

Related Technologies:

Standards:

22.17 Summary

This chapter introduced NFC fundamentals and provided a roadmap for the detailed chapters that follow.

Key Takeaways:

  1. NFC enables “tap to interact” experiences with zero setup time, making it ideal for payments, access control, and device provisioning
  2. The 4 cm range is a security feature, requiring intentional user action and preventing remote eavesdropping
  3. Three operating modes serve different purposes: Peer-to-Peer for device-to-device, Read/Write for tags, and Card Emulation for payments
  4. Tag Types 1-5 offer different capacity and security trade-offs - Type 2 for simple applications, Type 4 for advanced security
  5. NDEF format ensures cross-device compatibility for data exchange
  6. Metal surfaces require special tags - ferrite-backed or anti-metal designs prevent interference

22.17.1 Quick Reference Card

Decision Choose NFC If… Choose Alternative If…
Range Need intentional tap (4cm) Need > 10cm → RFID or BLE
Data Size < 32KB per interaction Streaming data → BLE
Setup Zero pairing desired Can accept pairing → BLE
Cost $0.10-2.00/tag acceptable Need $0.01/unit → QR code
Environment Clean, controlled Harsh/outdoor → Industrial RFID
Security Physical proximity sufficient Need strong crypto → NFC Type 4 + secure element

Decision Framework:

  • Use NFC when: You need instant “tap” interaction, secure proximity-based communication, or IoT device provisioning
  • Use Bluetooth when: You need continuous data streaming, longer range, or audio transmission
  • Use RFID when: You need longer range reading or don’t require smartphone interaction
  • Use QR codes when: You need the lowest cost solution and camera-based scanning is acceptable

22.18 What’s Next

Chapter Focus Link
NFC Introduction and Basics What NFC is, how it works, and why short range is a security feature Read chapter
NFC Modes and Protocols Detailed P2P, Read/Write, and Card Emulation mode specifications Read chapter
NFC Security and Best Practices Common pitfalls, encryption, and decision frameworks Read chapter
NFC Hands-On Lab ESP32 Wokwi simulation with NDEF parsing and security validation Read chapter
NFC Comprehensive Review End-to-end NFC system implementation across access control, smart home, and payments Read chapter