The document discusses RFID technology, including how it works, its benefits and threats, and security considerations. RFID uses radio waves to read tags attached to objects without needing direct contact or line-of-sight. There are two types of tags - active tags with batteries and passive tags without. The document outlines security risks like spoofing, replay attacks, and unauthorized tracking. It emphasizes the need for lightweight cryptography and random number generation on tags to address security challenges in RFID systems.
Generative AI for Technical Writer or Information Developers
RFID Security Benefits and Threats Explained
1. RFID Security
By :
Anil Kumar
Student ,BCA V semester(Roll-no. -5)
School of Computer And Systems Sciences
Jaipur National University
Jaipur
2. INTRODUCTION
Radio-Frequency Identification (RFID) is the use of
radio waves to read and capture information stored on
a tag attached to an object.
The RFID technology is a means of gathering data
about a certain item without the need of touching or
seeing the data carrier, through the use of inductive
coupling or electromagnetic waves.
3. RFID Principle’s
RFID devices into two classes: active and passive.
Active tags require a power source—they’re either
connected to a powered infrastructure or use energy stored
in an integrated battery. In the latter case, a tag’s lifetime is
limited by the stored energy, balanced against the number
of read operations the device must undergo. One example
of an active tag is the transponder attached to an aircraft
that identifies its national origin.
Passive RFID is of interest because the tags don’t require
batteries or maintenance. The tags also have an indefinite
operational life and are small enough to fit into a practical
adhesive label.
4. RFID SECURITY BENEFITS AND THREATS
Such as airline passenger and baggage tracking, can be
made practical by using RFID systems. Authentication
systems already take advantage of RFID technology, for
example car key-less entry systems. Embedding RFID tags
as seals of authenticity in documents, designer products,
and currency may discourage forgery. While RFID tags
improve certain security properties in these applications,
they may exacerbate privacy threats or pose new security
risks.
RFID systems are different from other means of
identification because RF communication is non-contact
and non-line-of-sight, whereas other means of
identification are either contact-based or require line-of-sight.
In other words,
5. SECURITY OF RFID SYSTEMS
The consideration of RFID system security can be addressed on
different levels: the field of security for middleware and
databases has been generally ad-dressed in information
technologies and internet based systems during the recent
decade.
Basic principles for attacking such RFID front-end systems are
among others:
• Sniffing
• Spoofing
• Replay
• Denial-of-service attacks
• Relay attacks and
• Unauthorized tracking.
6. SECURITY OF RFID SYSTEMS
Generally the following security requirements have to be considered in
the context of RFID systems:
• Functional Reliability
• Authenticity
• Confidentiality
• Integrity
• Availability
• Liability and
• Data privacy
Symmetric encryption methods are not suitable, since the effort for a
secure key management is comparatively high and not affordable at the
required limited transponder Complexities/costs. Furthermore there is
a certain risk that secret keys could be revealed by reverse engineering
and this in effect would compromise the whole security concept.
7. SECURITY OF RFID SYSTEMS
Therefore new lightweight cryptography methods are
required, including effective methods for the on-tag
generation of random numbers and the computation of
hash functions. Concepts as physically unlovable functions
may show a way out of the security at high implementation
cost dilemma. This contribution summarizes essential
results of a RFID security report, supported by the German
Ministry of Research and Education (BMBF), which has
been published in spring 2007.
Finally we’ll provide a roadmap for ongoing research and
development targeting secure RFID system solutions.
8. RFID SYSTEMS
RFID system has a structure as depicted in figure.
RFID readers scan tags, and then forward the
information to the backend. The backend in general
consists of a database and a well-defined application
interface.
9. HOW DOES RFID WORK?
An RFID tag, or transponder, that carries object-identifying
data.
An RFID tag reader, or transceiver, that reads and
writes tag data.
A back-end database, that stores records associated
with tag contents.
10. RFID APPLICATION
As manufacturing costs dropped, RFID systems began to
be used for lower-value items in industries besides
transport.
Automobiles, railcars, and shipping containers are all high-value
items, with ample physical space that can
accommodate more expensive and bulky RFID devices.
Early commercial examples of RFID applications include
automatic tracking of train cars, shipping containers, and
automobiles
Other widespread applications of RFID systems include
contactless payment, access control, or stored-value
systems.
11. RFID APPLICATION
Livestock, particularly cattle, are often labeled with a
RFID device that is clamped or pierced through their
ear, attached to a collar, or swallowed. Unlike
implanted pet tags, these RFID Devices are rugged and
able to be read from greater distances. Concerns over
Bovine Spongiform Encephalopathy (mad cow)
disease have motivated proposals for universal
tracking of livestock with these types of RFID systems.
Like transport applications, animal tracking is still
essentially a low-volume, high-value market that may
justify relatively expensive RFID systems.
12. CONCLUSION
Strong security properties are achievable within simple
security protocol designs that are suitable for
implementation in RFID systems. In this paper, we
described about the RFID, principle, application,
benefits using of RFID, how does its work etc. protocol
for anonymous RFID identification that
simultaneously achieves security against tracking,
cloning, and disabling of tags, and that is not
vulnerable to replay attacks. Recently, O-TRAP has
been extended to provide forward-security.