International Journal of Computer Science and Artificial Intelligence
An Open Access Journal
ISSN:2226-4450(Print)       ISSN:2226-4469(Online)
CODEN: IJCSPS                
Editor-in-Chief: Prof.Bing-Fei Wu(Taiwan)
Emulation of Multi-application Contactless Smartcard in Near Field Communication Enabled Smart Phones
Full Paper(PDF, 369KB)
Near Field Communication (NFC) is a short-range wireless technology used to transmit data between two devices. In order to transmit data, NFC has three working modes. The card emulation mode has the greatest potential because it allows a smart phone to emulate passive NFC tags and contactless smart cards. Hence, it enables a smart phone to instantly share data with an NFC-enabled by a single tap on the NFC reader. Major applications of the card emulation mode include financial transactions such as purchasing a ticket at bus stop or a cinema hall, etc., so a secure storage space is required to locally store the data. The card emulation mode utilizes a Secure Element (SE) for the secure storage of data, and has no provisions for third party developers to write on this storage. This paper discusses the challenges of implementing card emulation in the Android Operating System for smart phones. Furthermore, emulation of a smart card defined by ISO 7816-4 for multiple application scenarios is discussed. The paper will go into detail regarding the implementation of card emulation mode and how it can help third party applications to read and write to and from SE while maintaining reasonable security.
Keywords:Near Field Communication; Secure Element; Smart Card; Software Card Emulation; Two-way Communication; Short Range Wireless Communication
Author: Awais Ahmad1, Razi Iqbal1, Dawer Saeed1
1.Al-Khawarizmi Institute of Computer Science, University of Engineering and Technology, G.T. Road, Lahore, Pakistan
  1. F. Resatsch, S. Karpischek, U. Sandner, and S. Hamacher, “Mobile sales assistant: NFC for retailers,” in Proceedings of the 9th international conference on Human computer interaction with mobile devices and services, ACM, pp. 313-316, 2007.
  2. M. L. McKelvin Jr., M. L. Williams, and N. M. Berry, “Integrated Radio Frequency Identification and Wireless Sensor Network Architecture for Automated Inventory Management and Tracking Applications,” in Proceedings of the 2005 Conference on Diversity in Computing, ACM, pp. 44-47, 2005.
  3. E. Strömmer, J. Kaartinen, J. Pärkkä, A. Ylisaukko-oja, and I. Korhonen, “Application of Near Field Communication for Health Monitoring in Daily Life,” in 28th IEEE EMBS Annual International Conference, pp. 3246-3249, 2006.
  4. K. Curran, A. Millar, and C. Mc Garvey, “Near Field Communication,” International Journal of Electrical and Computer Engineering, vol. 2(3), pp. 371-382, 2012.
  6. M. Roland, “Software card emulation in NFC-enabled mobile phones: Great advantage or security nightmare,” in 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, pp. 6-12, 2012.
  7. (2015) NFC. [Online]. Available:
  8. R. Iqbal, A. Ahmad, and A. Gilani, “NFC based inventory control system for secure and efficient communication,” Computer Engineering and Applications Journal, vol. 3(1), pp. 23-33, 2014.
  9. J. Fischer, “NFC in cell phones: The new paradigm for an interactive world [Near-Field Communications],” Communications Magazine, IEEE, vol. 47(6), pp. 22-28, 2009.
  10. V. Coskun and K. Ok, Professional NFC application development for Android, Wiley, 2013.
  12. (2012) Nelenkov, “Android Explorations: Emulating a PKI smart card with CyanogenMod 9.1.” [Online]. Available:
  14. L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, “Practical NFC peer-to-peer relay attack using mobile phones,” in 6th International Conference on Radio Frequency Identification: Security and Privacy Issues, pp. 35-49, 2010.
  17. (2014) D. Yeager, “Added NFC Reader support for two new tag types: ISO PCD type A and ISO PCD type B.” [Online]. Available:
  19. K. Markantonakis, M. Tunstall, G. Hancke, I. Askoxylakis, and K. Mayes, “Attacking smart card systems: Theory and practice,” Information Security Technical Report, vol. 14(2), pp. 46-56, 2009.
  20. D. Deville, A. Galland, G. Grimaud, and S. Jean, “Smart Card Operating Systems: Past, Present and Future,” in 5th NORDU/USENIX Conference, pp. 12-22, 2003.
  21. D. Sauveron, “Multiapplication smart card: Towards an open smart card,” Information Security Technical Report, vol. 14(2), pp. 70-78, 2009.