RFID Technical articles

Hidden dangers and countermeasures of information security based on RFID in the sensing layer of the Internet of Things

The Internet of Things is a network established with the help of information sensing devices. This network connects all items to each other through the Internet according to the network protocol, and can exchange and communicate item information. Compared with the Internet, the Internet of Things has the following characteristics: comprehensive perception, intelligent processing, and reliable delivery.


Since the integrated RFID system is actually a computer network application system, its security issues are similar to those of computers and networks, but it still has two special characteristics: first, the communication between RFID tags and back-end systems is contact and wireless, making them vulnerable to eavesdropping; and second, the computing power and programmability of the tags themselves, directly limited by cost requirements.


At present, the security threats faced by the RFID system mainly come from various aspects (such as: tracking, monitoring, attack, deception and virus), etc., and the main application fields also have strict requirements on the confidentiality of information. In addition to the similarities with computer networks and communication information, general RFID security threats include the following three types:


1. Security Threats on Communication Links

When the RFID electronic tag transmits data to the UHF reader, or when the RFID Reader is interrogating the electronic tag, its data communication link is a wireless communication link, and the wireless signal itself is open. This brings convenience to the interception of illegal users. Usually, the common methods that can be realized include:

1. Hackers illegally intercept communication data. Intercept data through unauthorized RFID readers or remotely eavesdrop on tag information according to the asymmetry of RFID front and back channels.

2. Denial of service attack, that is, illegal users block the communication link by transmitting interference signals, making the RFID reader overload and unable to receive normal tag data.

3. Destroying labels, etc. by emitting specific electromagnetic waves.

4. Use the fake RFID tag to send data to the RFID reader, so that the RFID reader processes all false data, while the real data is hidden.


2. Security Threats of RFID Reader Protocol


There are three main security threats to the RFID reader protocol. The security issues encountered by RFID are much more complex than the usual computer network security issues. By analyzing the security threats of RFID systems, the data subject to unauthorized attacks may be Stored in RFID tags, UHF readers, or when data is transmitted between various components, we must take corresponding countermeasures to solve it.


1. Data security measures in protection labels

In order to prevent RFID tags from revealing personal privacy, and also to prevent confusion caused by users carrying products equipped with tags into the market, people have proposed various solutions technically.

Of course, we can also use various authentication and encryption methods to ensure the data security between the electronic tag and the reader. For example, the tag's data remains locked until the reader sends a password to unlock the data. More stringent ones may include both authentication and encryption schemes. However, the cost of RFID tags directly affects its computing power and the strength of the algorithms used. When choosing an RFID system in real life, you should consider whether to choose a system with a password function according to the actual situation. Therefore, generally speaking, this method can be used in high-end RFID systems (smart cards) and high-value tagged items.


2. Data security countermeasures on the communication chain of each component

(1) Limit the communication distance between the RFID tag and the RFID reader. The use of different operating frequencies, antenna designs, RFID tag technology and reader technology can limit the communication distance between the two, and reduce the risk of illegal access and reading electronic tags, but this still cannot solve the risk of data transmission. at the expense of deployability.

(2) Realize a proprietary communication protocol. Implementing a proprietary communication protocol is effective in situations of high security sensitivity and low interoperability. It involves implementing a set of non-public communication protocols and encryption and decryption schemes. Based on a complete communication protocol and coding scheme, a higher level of security can be achieved. However, this loses the ability to share RFID data with industry-standard systems. Of course, it can also be processed through a dedicated data gateway.

(3) Program the RFID tag so that it can only communicate with authorized RFID readers. The solution is to ensure that all RFID readers on the network must pass authentication before transmitting information to the middleware (the middleware then transmits the information to the application system), and to ensure that the data flow between the reader and the back-end system is Encrypted. When deploying RFID readers, some very practical measures should be taken to ensure that they can be connected to the network after verification, and that important information will not be stolen by others due to transmission.


3. Protect the data security countermeasures in the RFID reader

In the RFID system, the UHF reader is just a simple read-write device without too many security functions, so the security problem of data collection in the reader must be solved by middleware. The security countermeasures of middleware are similar to those of computer network systems. If an attacker wants to attack the reader, he must at least contact the RFID reader in most cases. Therefore, in order to protect data security, in addition to continuously advancing encryption technology to deal with it In addition, it also depends on a safe management system, a complete data management model, and the continuous work of data managers to maintain data security, so confidentiality is a process.

Of course, any single-level solution is incomplete (and the cost is not allowed), and it is impossible to completely guarantee the security of RFID applications. In many cases, a comprehensive solution is required. In any case, before implementing and deploying the RFID application system, a full business security assessment and risk analysis should be carried out according to the actual situation, considering a comprehensive solution and considering the relationship between cost and benefit.


3. Security Threats of Data in Tags

Due to the limited cost of the tag itself, it is difficult for the tag itself to have the ability to ensure safety. In this way, there is a big problem. Illegal users can use legal RFID readers or build a reader to communicate directly with the tag. In this way, the data stored in the tag can be easily obtained. For read-write tags, there is also the risk of data tampering.

At present, the safety issue of radio frequency identification technology has already begun to take shape in terms of overall solutions. In the future, it is believed that RFID technology will undergo tremendous changes and bring great convenience to our lives.


Scan the qr codeclose
the qr code