Electronic ear Tag Dealer

News

RFID's logical security mechanism.Animal Scanner Production

source:Industry News Popular:rfid fpc tag release time:2021-11-26 09:13:03 Article author:sznbone

  RFID's logical security mechanism

  The logical security mechanism of RFID mainly includes the method of changing the uniqueness, the method of hiding information and the method of synchronization.

  (1) Change the uniqueness method

  Changing the uniqueness of the output information of an RFID tag means that the tag returns a different RFID serial number every time it responds to a request from an RFID reader. Whether it is a tracking attack or a listing attack, it is largely caused by the same serial number returned by the RFID tag every time. Therefore, another way to solve the RFID privacy security problem is to change the uniqueness of the serial number. Changing RFID tag data requires technical support. Depending on the technology used, the main methods include tag renaming-based methods and cryptographic-based methods.

  1) The method based on tag renaming refers to changing the way the RFID tag responds to the reader's request, each time it returns a different serial number. For example, after purchasing a product, the serial number of the product label can be removed and other information (such as product category code, etc.) can be retained, or a serial number can be rewritten for the label. Because the serial number has changed, the attacker cannot destroy privacy through a simple attack. However, similar to privacy protection methods such as destruction, problems such as after-sales service caused by serial number changes need to be solved with other technical means.

  For example, the following scheme allows customers to temporarily change the tag ID: when the tag is in the public state, the ID stored in the chip's read-only memory can be read by the reader; when the customer wants to hide the ID information, it can be in the chip's random Enter a temporary ID in the access memory; when a temporary ID is stored in the random access memory, the tag will use this temporary ID to reply to the reader's inquiry; only when the random access memory is reset, the tag will display its real ID. This method brings additional burden to customers using RFID technology, and the change of temporary ID also has potential security problems.

  2) Cryptography-based methods refer to methods such as encryption and decryption. Such methods ensure that the serial number of the RFID tag is not illegally read. For example, using a symmetric encryption algorithm and an asymmetric encryption algorithm to encrypt RFID tag data and the communication between the RFID tag and the reader can make it difficult for ordinary attackers to obtain data because they do not know the key. Similarly, the authentication between the RFID tag and the reader can also prevent illegal readers from obtaining the data of the RFID tag.

  For example, the most typical cryptographic method is to use functions to lock RFID tags. This method uses metaID to replace the real ID of the tag. When the tag is in the locked state, it will refuse to display the electronic code information and only return the hash value generated by the Hash function. Only when the correct key or electronic code information is sent, the tag will be unlocked after confirmation with the Hash function.

  Because this method is relatively straightforward and economical, it has received widespread attention. However, the protocol uses a static ID mechanism, the metaID remains unchanged, and the ID is transmitted in an insecure channel in plain text, so it is very easy to be stolen by an attacker. The attacker can thus calculate or record the combination of (metaID, key, ID), and fake the reader or tag when interacting with a legitimate tag or reader to perform deception.


Read recommendations:

M04 ISO11784/5 Animal Microchip Implant

M03 ICAR Certifiicated Injected Under Skin Microchip

M02- Pet Microchip with Needle Pack

Introduction to the working principle of RFID.dog microchip maker

What are the advantages of UHF RFID electronic tags? Mainly in three aspects!Pet Tag Sale

Previous : electronic label.Animal Microchip manufacturer Next : How to choose RFID equipment correctly.Animal ID Microchips manufacture

Popular recommended products

Related Products

Related Information

Creative, organized, responsible, enthusiastic

contact us