source:Industry News Popular:rfid fpc tag release time:2021-11-26 09:13:03 Article author:sznbone
RFID's logical security mechanism
The logical security mechanism of RFID mainly includes the method of changing the uniqueness, the method of hiding information and the method of synchronization.
(1) Change the uniqueness method
Changing the uniqueness of the output information of an RFID tag means that the tag returns a different RFID serial number every time it responds to a request from an RFID reader. Whether it is a tracking attack or a listing attack, it is largely caused by the same serial number returned by the RFID tag every time. Therefore, another way to solve the RFID privacy security problem is to change the uniqueness of the serial number. Changing RFID tag data requires technical support. Depending on the technology used, the main methods include tag renaming-based methods and cryptographic-based methods.
1) The method based on tag renaming refers to changing the way the RFID tag responds to the reader's request, each time it returns a different serial number. For example, after purchasing a product, the serial number of the product label can be removed and other information (such as product category code, etc.) can be retained, or a serial number can be rewritten for the label. Because the serial number has changed, the attacker cannot destroy privacy through a simple attack. However, similar to privacy protection methods such as destruction, problems such as after-sales service caused by serial number changes need to be solved with other technical means.
For example, the following scheme allows customers to temporarily change the tag ID: when the tag is in the public state, the ID stored in the chip's read-only memory can be read by the reader; when the customer wants to hide the ID information, it can be in the chip's random Enter a temporary ID in the access memory; when a temporary ID is stored in the random access memory, the tag will use this temporary ID to reply to the reader's inquiry; only when the random access memory is reset, the tag will display its real ID. This method brings additional burden to customers using RFID technology, and the change of temporary ID also has potential security problems.
2) Cryptography-based methods refer to methods such as encryption and decryption. Such methods ensure that the serial number of the RFID tag is not illegally read. For example, using a symmetric encryption algorithm and an asymmetric encryption algorithm to encrypt RFID tag data and the communication between the RFID tag and the reader can make it difficult for ordinary attackers to obtain data because they do not know the key. Similarly, the authentication between the RFID tag and the reader can also prevent illegal readers from obtaining the data of the RFID tag.
For example, the most typical cryptographic method is to use functions to lock RFID tags. This method uses metaID to replace the real ID of the tag. When the tag is in the locked state, it will refuse to display the electronic code information and only return the hash value generated by the Hash function. Only when the correct key or electronic code information is sent, the tag will be unlocked after confirmation with the Hash function.
Because this method is relatively straightforward and economical, it has received widespread attention. However, the protocol uses a static ID mechanism, the metaID remains unchanged, and the ID is transmitted in an insecure channel in plain text, so it is very easy to be stolen by an attacker. The attacker can thus calculate or record the combination of (metaID, key, ID), and fake the reader or tag when interacting with a legitimate tag or reader to perform deception.
Read recommendations:
M04 ISO11784/5 Animal Microchip Implant
M03 ICAR Certifiicated Injected Under Skin Microchip
M02- Pet Microchip with Needle Pack
Introduction to the working principle of RFID.dog microchip maker
What are the advantages of UHF RFID electronic tags? Mainly in three aspects!Pet Tag Sale
Popular recommended products
ACM1252U-Z2 Small NFC Reader Module
2020-08-02Vehicle Tracking Tamper Proof RFID windshield sticker
2020-07-27RFID Waste Bin Worm Tag
2020-07-27ISO18000-6C Rubber UHF RFID Tire Patch Tag
2020-07-27Long Reading Range Metal Wire RFID Seal Tag for Gas Cylinder
2020-07-27Disposable RFID Seal Tag for Container Tracking
2020-07-27UHF 860-960Mhz Seal RFID Tag for Assets tracking management
2020-07-27Metal RFID Screw Tag for Machine Tracking
2020-07-27RFID/ NFC PCB Tag for second packaging
2020-07-27RFID Chicken Foot Ring Tag
2020-07-26M05- Animal Pet Microchip with Syringe
2020-07-25M04 ISO11784/5 Animal Microchip Implant
2020-07-25M03 ICAR Certifiicated Injected Under Skin Microchip
2020-07-25M02- Pet Microchip with Needle Pack
2020-07-25Woven Event RFID Wristband for Access control/ Payment
2020-07-25HF/UHF Stretchy RFID Wristband
2020-07-25S12 Dual Chip RFID Wristband
2020-07-25S11 Silicone RFID Wristband for Swimming Pool
2020-07-25S10 Access Control RFID Slap Wristband
2020-07-25s09 Adjustable RFID Wristband with Metal Clasp
2020-07-25Related Products
Related Information
RF Technology
2022-12-06NFC function of Huawei mobile phone
2022-11-28Function and purpose of mobile phone nfc
2022-11-21What are the mobile phones of nfc
2022-11-14NFC principle and characteristics
2022-11-07Application of RFID technology in intelligent transportation
2022-10-24Current situation and opportunities of RFID utilization
2022-10-24The advantages and applications of RFID UHF electronic tag
2022-10-17Common functions of RFID handhelds
2022-10-17Features and uses of flexible RFID labels
2022-10-10RFID medical waste management
2022-10-10Industrial RFID empowers the site identification of AGV trolleys
2022-10-10The RFID system is introduced by the reader
2022-10-10RFID simple Workflow
2022-10-08What technology is rfid?
2022-09-30What technology is rfid?
2022-09-23The hardware composition of the RFID system will give you a clear understanding
2022-09-22The composition and main functions of RFID reader
2022-09-21Middle and long distance running RFID timing lap system
2022-09-20What is RFID electronic tag
2022-09-19