Languages

Research on RFID System Security Problem

Radio Frequency Identification RFID (Radio Frequency Identification) is a non-contact communication technology that uses radio frequency (RF) communication. By using this technology, it can automatically recognize the target object and read related data. However, with the widespread application of RFID technology, the information security and privacy issues brought by it have become more and more apparent.

The communication channel of the RF signal sent by the RFID tag reader to the tag is called "forward channel", and the communication channel of the RF signal sent by the tag to the reader is called "reverse channel". Because most of the tags in the application are passive tags, the passive RFID reader has the task of providing energy for the tags, so the wireless power of the tags tends to greatly exceed the tags, which leads to the coverage of the system's forward channel being far greater than that of the reverse channel. At the same time, the communication between tags and readers can be affected by many factors such as noise, communication frequency, obstacles and more. For RFID reader systems, we usually do the following basic assumption: the communication channel between the tag and the reader is not safe; and the communication channel between the reader and the back-end database is safe.

A set of perfect secure RFID system solutions, there must be requirements of security and privacy. Should have the forward security, indefinability, access control, anti-traffic analysis, anti-replay attacks and other basic features.

Even if an attacker masquerades as a legitimate reader to carry out an unauthorized scanning of the label, the label can be successfully identified and rejected; at the same time, a valid RFID reader device can successfully pass the label authentication and read the information in the label. An attacker could not impersonate the reader through the authentication of the tag by replaying the interrogator's interrogation message sent to the tag; nor could he pretend to be tagged by replaying the reply message sent to the interrogator by the tag intercepted before Writer certification.

Tags : RFID tag reader Passive RFID reader RFID reader device

Previous Post Next Post

Copyright © 2019 Shenzhen Hopeland Technologies CO., Ltd. All Rights Reserved. Powered by dyyseo.com

Leave a message
Any inquires and suggestions are welcomed and we are pleased to answer no matter for our company, products or services.

Home

Products

about

contact

Leave a message

Any inquires and suggestions are welcomed and we are pleased to answer no matter for our company, products or services.