RFID Technology, Security Vulnerabilities, and Countermeasures
نویسندگان
چکیده
Radio frequency identification (RFID) is a means of automatic identification that uses radio waves to detect, track, identify, and thus manage a variety of objects. The purpose of an RFID system is transmitting data from a portable device, called a tag, to an RFID reader to execute a particular application based on the tag provided identification or location information (Graafstra, 2006; O' Brien, 2006). RFID technology has been around for about 60 years and was originally developed for improving warfare technologies. The first application was developed by Britain as the Identify Friend or Foe (IFF) system, which was used to distinguish friendly aircraft from enemy aircraft during World War II (Landt, 2001). The second era of RFID technology began with the commercial activities in the 1960s. An early application was the development of electronic article surveillance (EAS) equipment to counter theft in retail stores. EAS as an early forerunner to RFID uses a ‘1-bit’ signal to represent the presence or absence of a tag (Landt, 2005). The third era of RFID technology started in 1999, when the Auto-ID Centre was established at MIT to investigate new ways for improving bar code technology and implementing RFID technology in various commercial applications. The 1990's were a significant decade for RFID because of increased commercialization of RFID systems and the standardization activities on RFID technologies. Electronic toll collection systems were widely deployed in the United States; RFID tags were affixed to over 3 million rail cars in North America; and the International Organization for Standardization (ISO) developed several standards in the RFID field, including, for example, the ISO 18000 series of standards that define the air interfaces, collision detection mechanisms, and communication protocols for different frequency bands (Knospe & Pohl, 2004). In the 21st century, with the development of RFID standards, decreasing prices, and mandates from large organizations such as Wal-Mart and the U.S. Department of Defense (DoD), RFID has become “the first important technology of the twenty-first century” (Garfinkel & Rosenberg, 2005). An RFID system has three key components: the tag, the reader, and the backend system. RFID tags, also known as transponders, are identification devices that are attached to objects. Each tag typically consists of an antenna constructed from a small coil of wires; a microchip used to store information electronically about the object (e.g. a vehicle or a container); and encapsulating material to enclose the chip and the coil. Like there are various types of barcode, RFID tags are available with different memory sizes and encoding O pe n A cc es s D at ab as e w w w .in te ch w eb .o rg
منابع مشابه
IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملRFID Security and Privacy: Threats and Countermeasures
The vulnerability of Radio Frequency Identification (RFID) and the objection of consumers to buy products that include non-protected RFID are holding organizations back from investing in this promising technology. Information security and privacy are therefore important academic research areas. This research presents the RFID Threat Countermeasure Framework (RTCF) to better understand the wide ...
متن کاملSecurity Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and MAP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchronization between the RFID reader and the tag in a singl...
متن کاملClassification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Although RFID networks have many advantages, they also present a number of inherent vulnerabilities with serious potential security implications. This paper develops a structural methodology for risks that RFID networks fa...
متن کاملA Survey of RFID Deployment and Security Issues
This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Secti...
متن کامل