bobapp网站
中文版 한국어 日本の Français Deutsch عربي Pусский España Português
Home>>Activity & News>>RFID Knowledges

RFID Knowledges

Information security hidden dangers and countermeasures based on IoT perception layer RFID

News posted on:- by-RFIDtagworld XMINNOVRFID Tag Manufacturer / NewsID:80

Information security hidden dangers and countermeasures based on IoT perception layer RFID

Information security hidden dangers and countermeasures based on IoT perception layer RFID


The Internet of Things is a network established with the help of information sensing devices. This network connects all items to each other through the Internet according to network protocols, and can exchange and communicate item information. Compared with the Internet, the characteristics of the Internet of Things are: comprehensive perception, intelligent processing and reliable transmission.


Security Threats on Communication Links


由于综合射频识别系统是交流tually a computer network application system, its security issues are similar to those of computers and networks, but it still has two special characteristics: First, the communication between the RFID tag and the back-end system is non- Contact and wireless, making them vulnerable to eavesdropping; secondly, the computing power and programmability of the tags themselves are directly limited by cost requirements.


目前,射频识别所面临的安全威胁system mainly come from many aspects (such as: tracking, monitoring, attack, deception and virus), etc., and the main application fields also have strict requirements on the confidentiality of information. In addition to the common RFID security threats with computer networks and communication information, they also include the following three types:


Security Threats on Communication Links


When the RFID electronic tag transmits data to the UHF reader, or when the RFID reader interrogates the electronic tag, its data communication link is a wireless communication link, and the wireless signal itself is open. This brings convenience to the interception of illegal users. The commonly used methods that can usually be implemented include:

(1) Hackers illegally intercept communication data. Intercept data through unauthorized RFID readers or eavesdrop on tag information from a distance according to the asymmetry of RFID forward and backward channels.

(2) Service denial attack, that is, illegal users block the communication link by transmitting interference signals, which makes the RFID reader overload and cannot receive normal tag data.

(3) Destroying tags, etc. by emitting specific electromagnetic waves.

(4) Using impostors to replace RFID tags to send data to the RFID reader, so that the RFID reader processes all false data, while the real data is hidden.


Security Threats of RFID Reader Protocol


微信图片_20220309145651.jpg


The security threats of the RFID reader protocol mainly include three aspects. The security problems encountered by RFID are much more complicated than the usual computer network security problems. By analyzing the security threats of RFID systems, data subject to unauthorized attacks may be stored in RFID tags, UHF readers, or when data is transmitted between various components, we must take corresponding countermeasures to solve them.


1. Data security measures in the protection label

In order to prevent RFID tags from leaking personal privacy, and also to prevent users from bringing products with tags installed into the market, people have proposed a variety of technical solutions.


Of course, we can also use various authentication and encryption methods to ensure data security between electronic tags and readers. For example, the tag's data remains locked until the reader sends a password to unlock the data. Stricter ones may also include both authentication and encryption schemes. But the cost of an RFID tag directly affects its computing power and the strength of the algorithm used. When choosing an RFID system in real life, you should consider whether to choose a system with a password function according to the actual situation. Therefore, in general, in high-end RFID systems (smart cards) and high-value tagged items, this approach can be used.


2. Data security measures on the communication chain of each component

(1) Limit the communication distance between the RFID tag and the RFID reader. The use of different operating frequencies, antenna designs, RFID tag technology and reader technology can limit the communication distance between the two and reduce the risk of illegally approaching and reading electronic tags, but this still cannot solve the risk of data transmission. At the expense of deployability.


(2) Realize a proprietary communication protocol. Implementing a proprietary communication protocol is efficient in situations where it is highly security sensitive and interoperability is not high. It involves implementing a set of non-public communication protocols and encryption and decryption schemes. Based on a complete communication protocol and coding scheme, a higher level of security can be achieved. However, the ability to share RFID data with industry standard systems is lost. Of course, it can also be processed through a dedicated data gateway.


(3) Program the RFID tag so that it is only possible to communicate with authorized RFID readers. The solution is to ensure that all RFID readers on the network must pass authentication before transmitting information to the middleware (the middleware then transmits the information to the application system), and ensure that the data flow between the reader and the back-end system is Encrypted. Some very practical measures should be taken when deploying RFID readers to ensure that they can be connected to the network after authentication and that important information cannot be stolen by others through transmission.


3. Data security measures to protect RFID readers

In the RFID system, the UHF reader is just a simple reading and writing device without too many security functions, so the security problem of data collection in the reader must be solved by middleware. The security countermeasures of middleware are similar to computer network systems. If an attacker wants to attack the reader, in most cases, he must at least contact the RFID reader. Therefore, to protect data security, in addition to continuously advancing encryption technology to deal with it. In addition, we must rely on a safe management system, a complete data management model, and rely on the continuous work of data managers to maintain data security, so confidentiality is a process.


Of course, any single-level solution is incomplete (plus the cost is not allowed), and it is impossible to completely guarantee the security of RFID applications. In many cases, a comprehensive solution is required. In any case, before implementing and deploying an RFID application system, a full business security assessment and risk analysis should be carried out according to the actual situation, considering a comprehensive solution, and considering the relationship between costs and benefits.



Security Threats of Data in Labels


Due to the cost of the label itself, it is difficult for the label itself to have sufficient capacity to ensure safety. Thus, there is a big problem. Illegal users can use a legal RFID reader or build a reader to communicate directly with the tag. In this way, the data stored in the tag can be easily obtained. For read-write tags, there is also the risk of data tampering.


At present, the security problem of RFID technology has begun to take shape in terms of overall solutions. In the future, it is believed that RFID technology will undergo great changes and bring great convenience to our lives.



Baidu
map