Professional Documents
Culture Documents
2- Which type of security problems are when somebody uses an RFID system
A fundamental advantage of RFID gadgets above the other stated devices is that
the RFID device is not required to be placed exactly near to the scanner or RFID
code reader. As all of us are well aware of the difficulty which store billers face
while scanning the bar codes and but obviously the credit cards & ATM cards need
to be swiped all though a special card reader. In comparison to it, RFID device can
function from few feet away (approx 20 feet for high frequency devices) of the
scanner machine.
Before we move ahead to the working of the RFID systems let us know what
active & passive RFID tags are
RFID Micro-Chip tags are basically fabricated to function at certain frequencies which
are license free.
These are:
The diagram below describes the fundamental working of all RFID systems. The transponder or
tag can be either active of passive tag. It reacts to the signals from the reader or writer or
interrogator which in turn conveys signals to the computer.
Which type of security problems are when somebody uses an RFID system
RFID Sniffing
Tracking
By reading information received from RFID tag an attacker can track the
location and movement of an object or a person. When a tag is attached to an
object and the object enter the RFID readers field, the RFID read can
identify the object and locate its position. So, you need to remember that
whenever you attach an RFID tag to an object, you need to accept that fact
that an attacker can track your object even if you are using encrypted
messages to communicate between the tags and the RFID readers. An
attacker can use mobile robots in order to track the location.
Spoofing
Denial of Service
Physical Attacks\
It happens when an attacker physically obtain tags and alter its information.
Physically attack can take place in a number of ways such as an attacker using a
probe to read and to alter the data on tags. X-ray band or other radial band destroys
data in tags, which an attacker can use to attack an RFID system-this type of attack
is also known as radiation imprinting. Electromagnetic interference can disrupt
communication between the tags and the reader.
Beside, anyone can easily remove tags from objects with knife or any other tools,
which will make your object unrecognizable by the RFID reader.
Viruses
Like any other information system, RFID is also prone to virus attacks. In
most cases the backend database is the main target. An RFID virus can either
destroy or disclose the tags data stored in the database disrupt the service or
block the communication between the database and the reader.
How can somebody improve the level of the security
RFID has been used for decades to control access to buildings. Companies
issue badges or cards with transponders that have serial numbers stored in a
database. If your serial number is approved, you can enter a building or its
sensitive areas. This has helped to reduce theft of corporate assets. The
technology has also been used to decrease ticket counterfeiting, and to
control access to large events, such as the Olympics.
In addition, RFID can help to reduce the theft of national or company secrets.
One way to accomplish this is to place tamper-resistant RFID transponders
on sensitive documents (national defense plans, for instance, or corporate
research and development plans). A reader is installed in each photocopy
machine, and every time someone attempts to photocopy sensitive
documents, that person must first scan his or her ID. The reader also
interrogates the tag in the document. If the person lacks permission to scan
that document, the photocopier will not work.
Short Answer:
RFID is the process by which items are uniquely identified using radio
waves, and NFC is a specialized subset within the family of RFID
technology. Specifically, NFC is a branch of High-Frequency (HF) RFID,
and both operate at the 13.56 MHz frequency. NFC is designed to be a secure
form of data exchange, and an NFC device is capable of being both an NFC
reader and an NFC tag. This unique feature allows NFC devices to
communicate peer-to-peer.
Long Answer:
Active RFID tags contain their own power source giving them the ability to
broadcast with a read range of up to 100 meters. Their long read range makes
active RFID tags ideal for many industries where asset location and other
improvements in logistics are important.
Passive RFID tags do not have their own power source. Instead, they are
powered by the electromagnetic energy transmitted from the RFID reader.
Because the radio waves must be strong enough to power the tags, passive
RFID tags have a read range from near contact and up to 25 meters.
Also, NFC devices can read passive NFC tags, and some NFC devices are
able to read passive HF RFID tags that are compliant with ISO 15693. The
data on these tags can contain commands for the device such as opening a
specific mobile application. You may start seeing HF RFID tags and NFC
tags more frequently in advertisements, posters, and signs as its an efficient
method to pass along information to consumers.
At the end of the day, NFC builds upon the standards of HF RFID and turns
the limitations of its operating frequency into a unique feature of near-field
communication.
Reference
1- http://blog.atlasrfidstore.com/rfid-vs-nfc
2- https://securitywing.com/top-10-rfid-security-concerns-threats/
3- http://www.th3professional.com/2010/12/rfid.html