Analysis of security risks arising from RFID systems and related countermeasures

RFID (RadioFrequencyIdenTIficaTIon) is an automatic identification technology that matured from the 1980s. This paper analyzes the security risks generated by the RFID system in detail and proposes relevant countermeasures in a targeted manner.

As a new darling of wireless applications, RFID is being widely used in procurement and distribution, commercial trade, manufacturing, logistics, anti-theft and military applications. However, when it is "smooth", the related security risks are also followed. produce. More and more businesses and users are worried about the security and privacy protection of RFID systems, that is, how to ensure their security and privacy during the use of RFID systems, so that personal information, business information and property are not lost or stolen by others. .

Since the integrated RFID system is actually a computer network application system, the security problem is similar to the security problem of computers and networks, but it still has two special features: First, the communication between the RFID tag and the back-end system is non-contact. And wireless, making them very vulnerable to eavesdropping; secondly, the computing power and programmability of the tag itself is directly limited by cost requirements. In general, in addition to the same as computer networks, RFID security threats include the following three types:

First, the security threat of data in the label

Due to the cost of the label itself, it is difficult for the label itself to have sufficient capacity to ensure safety. In this way, it faces a big problem. Illegal users can use a legitimate reader or self-construct a reader to communicate directly with the tag. In this way, the data stored in the tag can be easily obtained. For literacy tags, there is also the risk of data being tampered with.

Second, the security threat on the communication link

When the tag transmits data to the reader, or the reader challenges the tag, its data communication link is a wireless communication link, and the wireless signal itself is open. This brings convenience to the interception of illegal users. Common methods of implementation include:

1. The hacker illegally intercepts the communication data. The data is intercepted by an unauthorized reader or the tag information is remotely eavesdropped according to the asymmetry of the RFID forward and backward channels.

2. The service rejects the attack, that is, the illegal user blocks the communication link by transmitting the interference signal, so that the reader is overloaded and cannot receive the normal tag data.

3. The impersonation tag is used to send data to the reader, so that the reader processes all the fake data, and the real data is hidden.

4. Destroy the tag by emitting a specific electromagnetic wave.

Third, the security threat of the reader protocol

There are three main aspects of the security threats of the reader protocol. The security problems encountered by RFID are much more complicated than the usual computer network security issues. By analyzing the security threats of RFID systems, data that is subject to unauthorized attacks may be stored in tags, readers, or when data is transmitted between components, we must take appropriate countermeasures.

Splice Sleeve Protector

MARSHINE Splice Sleeve Protector is applicable to the crimp tube, which complies with the DL/T758-2001 standard of splicing fittings adopting hydraulic lap joint. If the size of crimp tube is different from the standard, the dimension of splicing sleeve should be indicated in the contract.

Ningbo MARSHINE Power Technology Co., Ltd. is a professional engaged in the development, design and manufacture of power engineering construction equipment and tools.
MARSHINE company produces circuit construction tools, including foundation construction, tower group lap. Wiring structure. Cable construction, cable construction, mobile knife mill, insulated overhead cable and high voltage cable stripper, all kinds of aluminum alloy pull rod, guide rail, grounding device, high strength shackle, ratchet wrench and pointed wrench, double hook tight line device, lifting pulley, nylon wheel and aluminum wheel, punching machine ect.
MARSHINE continues to carry forward the enterprise spirit of "integrity, development, innovation" and strive for the prosperity and development of the electric power industry.
Welcome to contact MARSHINE and reach cooperation, thank you!

Splice Sleeve Protectors,Fiber Splice Protectors,Heat-Shrink Splice Protector Sleeve,Heat Shrink Fiber Fusion Splice Protection Sleeves,Heat Shrink Fiber Fusion Splice Protection Sleeves

MARSHINE , https://www.puller-tensioner.com