RFID data security has a long way to go

Due to the limitation of the cost, craftsmanship and power consumption of the tag, the RFID system generally does
not configure a very complete security module, and its data encryption method may be cracked. As far as the
characteristics of passive tags are concerned, they are more vulnerable to attacks from energy consumption channels.

In the front-end air interface link, due to the openness of the wireless transmission signal itself, the data is subject to greater security threats.
Illegal users can intercept data by using unauthorized readers, block communication channels for denial of service attacks,
and can fake user identities, tamper with, delete tag data, and so on. The safety issue of this link is the focus of most people’s
attention, and it is also an important part of the need for research breakthroughs.

MIND

After the reader receives the data sent by the tag, in addition to the data filtering, time filtering, and management functions of the middleware,
the reader only provides a user business interface, but cannot provide an interface that allows users to improve their safety performance.

In the safe production technology of RFID products, on the one hand, it is the discussion of the safety factor algorithm and application, including
the design of the encryption mechanism, especially the completeness of the application steps; on the other hand, it is the discussion of DFS (security)
from the perspective of the system. Coefficient design) technology.

At present, both symmetric encryption technology (DES, AES or national secret algorithm SM1), or asymmetric encryption technology (RSA, ECC or
national secret algorithm SM2) have developed relatively mature. And, with the progress of the process, the application cost has gradually dropped
to an acceptable level.

For RFID technology, the system itself not only has powerful functions, but also a wide range of applications. Moreover, with the continuous
improvement and development of RFID technology, RFID technology is bound to achieve very considerable and broad development prospects
in the future development. However, in all stages of RFID readers, RFID tags, and Internet access, data and information have security risks, and
security and privacy problems have long been one of the important factors that contain RFID technology.

In some sensitive areas, such as finance, anti-counterfeiting, identification, etc., there are stricter standards for product security. Therefore, continuous
research and development of security methods to protect the information in RFID tags will not only enable better implementation and operation of RFID
projects, but also create better conditions for the popularization and application of RFID technology.

CONTACT

E-Mail: ll@mind.com.cn
Skype: vivianluotoday
Tel/whatspp:+86 182 2803 4833


Post time: Oct-02-2021