NFC in Automotive

Digital Keys, Pairing, and Vehicle Access

| 5 min read

NFC in Automotive: Digital Keys, Pairing, Vehicle Access

NFC has moved from concept to production in automotive over the past five years, driven by the Car Connectivity Consortium's Digital Key specification, NFC pairing for in-vehicle infotainment, and emerging keyless entry systems. This guide covers the technical architecture of each use case.

CCC Digital Key Standard

The Car Connectivity Consortium (CCC) Digital Key Release 3.0 defines how smartphones access vehicles using NFC, BLE, and UWB. NFC is used for:

  • Initial pairing: Out-of-box device-to-vehicle provisioning over NFC tap
  • Low-power backup access: When the phone battery is low (iOS < 1%, Android ~5%), NFC passive power harvesting from the door reader enables an emergency key tap
  • Express mode: Configured NFC tap to unlock without screen interaction

Key hierarchy:

OEM Key Server → Owner Device Key → Shared Friend Keys
     (PKI)            (SE / Keystore)        (time-limited)

The vehicle's NFC reader connects to a Secure Hardware Extension (SHE) inside the car's body control module. Private key material never leaves the secure environment on either side.

NFC Zones in Vehicles

Modern CCC-enabled vehicles deploy NFC readers at:

Location Purpose Activation
Door handle (exterior) Unlock Passive, always-on
B-pillar Alternative unlock Passive
Dashboard or centre stack In-vehicle provisioning Active (ignition on)
Trunk exterior Trunk-only access Passive
Charging pad area Wireless key backup Active

Each zone uses a separate nfc-reader IC (typically PN7150 or ST25R3916) connected to the body control module over LIN or CAN. The read range for exterior door readers is engineered to 4–8 cm — long enough to be usable through a pocket, short enough to prevent relay-attack windows.

ISO 18013-5: Mobile Driving Licence

ISO 18013-5 defines the mobile Driver's Licence (mDL) using NFC-A (ISO 14443-4) as one of three engagement transports (NFC, QR, BLE). The mDL credential is stored in the phone's secure element or Android Keystore and read by traffic stops and age verification terminals.

The NFC transaction uses ISO 7816-4 APDU commands to SELECT the mDL application AID and retrieve a disclosure structure. Only requested data fields (e.g. age ≥ 18 without revealing full birthdate) are disclosed — a selective-disclosure privacy architecture.

Bluetooth Pairing via NFC

NFC OOB (Out-of-Band) pairing uses an NFC tap to exchange Bluetooth pairing data — eliminating the "enter PIN 0000" step:

Phone taps vehicle NFC reader
→ Reader presents NDEF record: type "application/vnd.bluetooth.ep.oob"
→ Phone receives BT address + device class + optional OOB pairing key
→ BLE/Classic pairing completes automatically

The NDEF OOB record format is defined in Bluetooth Core Specification 5.x. Android handles the handover transparently via the NfcAdapter.setNdefPushMessageCallback and Connection Handover profile.

Tyre Pressure and Sensor Pairing

TPMS (Tyre Pressure Monitoring System) sensors increasingly include passive NFC for initial provisioning. A technician taps a reader against the tyre to learn the sensor's Bluetooth LE or LF transmitter ID without manual ID entry. The NFC record is typically a proprietary MIME type containing the sensor serial number.

Vehicle Access Security

Automotive NFC access uses mutual-authentication with ECDH key agreement rather than symmetric shared secrets:

  1. Reader sends challenge encrypted to phone's public key
  2. Phone's SE responds with signed ECDH ephemeral public key
  3. Both sides derive a shared session key
  4. Encrypted authorisation record exchanged
  5. If valid, BCM grants access

This prevents replay and relay attacks that plagued earlier RF key fobs. For relay-attack residual risk see NFC Relay Attack Explained.

Low battery emergency access: Below 1% battery, iOS suspends all apps but the Secure Element remains powered from the residual charge. The SE responds to the vehicle reader's RF field with the Digital Key APDU sequence for up to 5 hours after the screen goes dark.

NXP MIFARE and SE050 in Automotive

NXP supplies both the SE050 secure element (used in iPhone, Samsung, and some Android phones) and automotive-grade reader ICs. The NTAG x DNA TagTamper variant is used in automotive supply chain applications — a tamper loop on the inlay opens if a bonnet is removed, providing evidence of tamper in the NFC NDEF record.

Infotainment and NFC Profile Switching

Some BMW and Mercedes models use NFC tags on the gear selector or in the door sill to switch infotainment profiles:

  1. Driver taps personal NFC card/fob on the reader
  2. Car loads the driver's seat position, mirror angles, music preferences, and navigation home address
  3. Second driver taps their card; car transitions to that driver's profile

The tag stores a 7-byte UID that the vehicle maps to a stored profile in the head unit. No sensitive data is on the tag.

Standards Reference

Standard Scope
CCC Digital Key 3.0 Smartphone vehicle access, NFC + BLE + UWB
ISO 18013-5 Mobile driving licence over NFC
Bluetooth Core Spec (NFC OOB) Pairing handover
ISO 14443-4 Transport protocol for Digital Key APDUs
ISO/SAE 21434 Automotive cybersecurity (covers NFC attack surface)

See also: NFC Payments How It Works | NFC Security Deep Dive | NFC Relay Attack Explained | ISO 14443 Protocol Deep Dive

Terms in This Guide