RFID: Security issues and threats

Like other security devices, the security of RFID devices is not perfect. Although RFID devices are widely used, the security threats they require need to be addressed before the device is deployed. This article will focus on several RFID-related security issues.

1.RFID forgery
According to computing power, RFID can be divided into three categories:
1). General tag (tag);
2). Labels using symmetric keys;
3). Labels using asymmetric keys.
Among them, the ordinary label does not perform any encryption operation, and it is easy to forge. However, common tags are widely used in logistics management and tourism. Attackers can easily write information into a blank RFID tag or modify an existing tag to obtain access rights for the authentication system using RFID tags. . For ordinary tag attackers, you can do the following three things:
(1). Modify the data in the existing tag to make an invalid tag valid, or conversely, invalidate the valid tag. For example, you can modify an item's label content and then purchase an expensive item at a lower price.
(2). Also modify the label, but modify the content of one label to the content of another label, that is, the raccoon cat changes the Prince.
(3). Create a label of your own based on the content of the other people's tags.
Therefore, when you want to use RFID tags in systems that handle sensitive information such as ID cards, you must use encryption technology. But if you have to use a common label, be sure to have the appropriate security specifications, monitoring and audit procedures to detect any anomalous behavior in the RFID system.

2.RFID sniffing
RFID sniffing is a major problem in RFID systems. The RFID reader always sends information requesting authentication to the tag. When the reader receives the authentication information sent by the tag, it uses the backend database to verify the validity of the tag authentication information. But unfortunately, most RFID tags do not authenticate the legitimacy of RFID readers. Then an attacker can use his own reader to fetch the contents of the tag.

3. Tracking
By reading the content on the tag, an attacker can track the trajectory of an object or person. When a tag enters a range readable by the reader, the reader can identify the tag and record the current location of the tag. Whether or not the communication between the tag and the reader is encrypted, the fact that the tag is being tracked cannot be avoided. An attacker can use a mobile robot to track the location of a tag.

4. Denial of service
When the reader receives authentication information from the tag, it compares the authentication information with the information in the backend database. Readers and back-end databases are vulnerable to denial of service attacks. When a denial of service attack occurs, the reader will not be able to complete the authentication of the label and cause the interruption of other corresponding services. Therefore, you must ensure that there is a mechanism to prevent denial of service attacks between the reader and the backend database.

5. Deception
In a spoofing attack, an attack often turns itself into a legitimate user. Sometimes, the attacker will pretend to be the administrator of the back-end database. If the forgery is successful, the attacker can do whatever he wants, for example: corresponding invalid request, change the RFID identity, reject the normal service or simply directly Malicious code is implanted in the system.

6. Denial
The so-called denial is that when a user refuses to admit that he has done it after performing an operation, when denying the sending, the system has no way to verify whether the user has performed the operation. In the use of RFID, there are two possible denials: one is that the sender or receiver may deny an operation, such as issuing an RFID request, at this time we have no evidence to prove whether the sender or receiver has issued The RFID request; the other is that the owner of the database may deny that they have given any item or person any label.

7. Insert the attack
In this type of attack, the attacker attempts to send a system command to the RFID system instead of the original normal data content. One of the simplest examples is that an attacker inserts an attack command into the normal data stored in the tag.

8. Retransmission attack
The attacker intercepts the message from the tag to the reader by intercepting the communication between the tag and the reader, and then retransmits the message to the reader. An example of a retransmission attack is when an attacker logs information between a tag and a reader for authentication.

9. Physical attacks
A physical attack sends information that an attacker can physically touch a tag and tamper with the tag. Physical attacks can occur in a variety of ways, such as using a microprobe to read and modify the contents of a tag, using X-rays or other rays to destroy the contents of the tag, and using electromagnetic interference to disrupt communication between the tag and the reader.
In addition, anyone can easily use a knife or other tool to manually damage the label so that the reader cannot recognize the label.

10. Virus
Like other information systems, RFID systems are vulnerable to virus attacks. In most cases, the target of the virus is the backend database. The RFID virus can destroy or leak the contents of the tags stored in the backend database, rejecting or interfering with the communication between the reader and the backend database. In order to protect the back-end database, it is necessary to fix database vulnerabilities and other risks in a timely manner.
Although RFID systems are often the target of attack, due to the low cost of RFID systems, they are widely used in many fields. So when preparing to deploy an RFID system, be sure to pay more attention to its security issues, especially the first four attacks described in this article: forgery, sniffing, tracing, and denial of service attacks.

Other Pet Cage

Other Pet Cage are mainly for small animals except pet birds and dogs.
The multi-layer metal cage is suitable for mothers and kittens during lactation.
Or rabbits, squirrels, ferrets, etc
Hamster Cage And Habitats is equipped with rollers, water feeders, toilets, nests, external cages, and mazes.
Suitable for new owners of hamsters.
The desk aquarium with creative building blocks is suitable for small pet fish.

It is a very creative interior decoration to make a simple scene in the fish tank, and then freely assemble it and put it on the desk.

Other Pet Cage

Hutches Cage For Rabbit,Metal Chinchilla Cage,Small Squirrel Cage,Big Cat Cage

Mianyang Crossing Cross-Border E-Commerce Co., Ltd. , https://www.wycypet.com

Posted on