Security Risks/Vulnerability in a RFID System and Possible Defenses

2013 ◽  
pp. 1667-1681 ◽  
Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.

Author(s):  
Morshed U. Chowdhury ◽  
Biplob R. Ray

Remote technologies are changing our way of life. The radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a system that has fraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID systems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID systems.


Author(s):  
Atul Kumar ◽  
Ankit Kumar Jain

Radio frequency identification (RFID) consists of a tag and reader. The RFID system is used in various places, such as finding the location of devices and toll payment. In computer security, CIA (confidentiality, integrity, authentication) is the primary concern for RFID security. In existing scenario, there are various threats present in the RFID system such as de-synchronization attack, disclosure attack, tracking attack and so on. There are various threats that RFID systems are vulnerable to such as a de-synchronization attack, disclosure attack, dos attack, and tracking attack. This chapter discusses various attacks on the RFID system in terms of confidentiality, integrity, and availability as these devices contain a limited amount of memory and low power battery. Therefore, these devices need a lightweight solution for the RFID system. Hence, this chapter additionally discusses various authentication schemes such as lightweight scheme and ultra-lightweight scheme for RFID systems.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


CCIT Journal ◽  
2017 ◽  
Vol 10 (2) ◽  
pp. 239-254
Author(s):  
Ferry Sudarto ◽  
Gustasari Gustasari ◽  
Arwan Arwan

Along with the development of science and technology so rapidly trigger the emergence of new technologies, one of which is RFID. RFID (Radio Frequency Identification) is a process of identifying the object or objects using radio transmission frequency. RFID is a new technology, and will continue to evolve in line with advances in integrated circuit technology, it can be ascertained that the RFID tag can be applied in various fields. RFID systems offer increased efficiency in controlling inventory control in the identification of objects. RFID can be used to store and receive data remotely using a device that RFID TAG (transponder). Many applications can utilize RFID systems, for example for indoor security systems, highways, libraries, class attendance, even as the identity of the student / students. Therefore, in this researchRaharja College presenting a Smartcard System Design using RFID as a device interface and ARDUINO UNO as a controller to be used as a door security system. With the presence of this system is expected to be a useful new innovation in Raharja College and can improve the shortcomings of existing systems and can provide maximum service to the whole personal raharja.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


2014 ◽  
Vol 1079-1080 ◽  
pp. 824-827
Author(s):  
Chang Qiang Zhang

RFID (Radio Frequency Identification) has been playing an important role in the construction and development of Internet of things, for its status as the base and heart of Internet of things, and it also contains a huge market. But at present the judgment criteria and core products in the field of RFID are all tied down by other countries, those companies in our country who need to use RFID not only have to pay for an immense amount of patent royalties, but also have to be ready for the Information security risks at any time. In order to achieve the independent innovation of RFID and meet the RFID system developing demand in our country, there are some needs to do something to solve the problems related to key technology in RFID system, then to win ourselves the proprietary intellectual property rights and the standards system for radio frequency identification of our own.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2012 ◽  
Vol 241-244 ◽  
pp. 2331-2334
Author(s):  
Miao Lei Deng ◽  
Hao Jun Zhang ◽  
Wei Jun Zhu

Radio frequency identification (RFID) systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. This paper analyze two of the newest RFID security protocols which proposed by Niu et al. and Fu et al. form the security viewpoint of data desynchronization attack. These two lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these two RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand space model, data desynchronization attacks on these two protocols were analyzed. Furthermore, improvements to overcome the security vulnerabilities of these two protocols were given.


2009 ◽  
pp. 879-894
Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Author(s):  
Imad Belkacem ◽  
Safia Nait Bahloul ◽  
Oum-El-Kheir Aktouf

Dependability issues become more and more significant in RFID (Radio Frequency Identification) development and especially in critical domains. However, Operations of reading, detection of readers, and measurements of sensors in a RFID system are inevitably subjected to errors. These factors degrade the overall dependability of RFID systems. The authors study the Fault Tolerance in RFID systems as a means to ensure the dependability. The authors propose to perform a statistical analysis on the RFID tags data, using a confidence interval, at the level of the middleware enabling the detection of erroneous readers and sensors.


Sign in / Sign up

Export Citation Format

Share Document