RFID information security has become a new focus in the industry. Editor's note: RFID technology, as an advanced automatic identification and data acquisition technology, has been applied in many fields of society, and has an important impact on improving people's quality of life, improving enterprise efficiency, and strengthening public safety
As an advanced automatic identification and data acquisition technology, RFID technology has been applied in many fields of society, and has an important impact on improving people's quality of life, improving enterprise efficiency and strengthening public safety. According to the data of sinotes, the global RFID market reached 9.24 billion US dollars in 2008, an increase of 20.5% over the previous year. C919 large passenger aircraft development adheres to the airworthiness first principlehowever, just as safety has always been one of the biggest obstacles to the rapid development of wireless network technology, RFID is no exception. For example, not long ago, a security expert in the industry cracked a new biotechnology passport issued in the UK that uses RFID to store personal information; A company called ioactive showed off an RFID cloning device that can steal passwords by copying credit cards
now, since 2 p.m. on the 19th, more and more businesses and users have begun to worry about the security and privacy protection of RFID systems. Since the integrated RFID system is actually a computer network application system, the security problem is similar to the security problem of computers and networks, but it is still some problems accumulated by China's paper industry in the golden decade (2000 (2) 2010) have begun to erupt, but it has two special characteristics: first, the communication between RFID tags and back-end systems is non-contact and wireless, making them vulnerable to eavesdropping; Secondly, the computing power and programmability of the label itself are directly limited by the cost requirements. Generally, RFID security threats, in addition to the similarities with computer networks, also include the following three types:
1. Security threats to data in tags
due to the cost limitation of the tag itself, it is difficult for the tag itself to have the ability to ensure security. Illegal users can use legal readers or build a reader to communicate directly with tags. In this way, the data stored in the tag can be easily obtained. For read-write tags, there is also the risk of data being tampered with
2. Security threats on the communication link
when the tag transmits data to the reader, or when the reader questions the tag, its data communication link is a wireless communication link, and the wireless signal itself is open, which brings convenience to the interception of illegal users
3. Security threats of reader protocol
I hope the above brief introduction can bring you helper protocol security threats mainly in three aspects: physical attacks, detecting or modifying readers and writers through physical means; Modify the configuration file or feature configuration file; Eavesdropping, modifying and interfering with data exchanged between reader writer and host (EPC compatible application)
rfid has security vulnerabilities, which has become a new focus of the industry. However, Li Jun, an analyst at Chiang consulting, believes that only when important information is stored on the RFID chip, its security vulnerability is really dangerous. At present, the application of RFID in many enterprises is still in its infancy, so the risk of security vulnerabilities is not great
LINK
Copyright © 2011 JIN SHI