The full name of RFID is non-contact automatic ID identification technology. This technology obtains the information of this object after the radio frequency signal automatically identifies the ID number of a certain target, and obtains relevant data. Due to its fast, real-time, accurate acquisition and accurate processing of ID information of objects, the world has recognized RFID as one of the top ten technologies of this century. From a certain point of view, this technology can be called an upgraded version of wireless barcode recognition. RFID has the advantages of waterproof, antimagnetic, high temperature resistance, long service life, long reading distance, data on the label can be encrypted, the storage capacity is larger, the storage information can be changed freely, the high-speed moving object can be identified, and multiple identification can be performed at the same time. Labels, operations are quick and easy, and a variety of work environments are available. With the above advantages, it has a wide range of application prospects in various industries such as production, retail, logistics, and transportation.
However, with the further promotion of RFID, some problems have also appeared. These problems restrict its development. The most significant of these is security. Since the original RFID development designers and application personnel did not consider their corresponding security issues, security issues became a bottleneck restricting the development of RFID. If there is no trustworthy information security mechanism. The popularization of RFID technology has become empty talk. Imagine how much of a technology's surviving information can be stolen or even maliciously tampered with. It can only become empty talk like paper. In addition, radio frequency tags that do not have reliable information security mechanisms also have potential safety hazards such as leakage of sensitive information to nearby readers, vulnerability to interference, and vulnerability to tracking. If RFID's security cannot be fully guaranteed. Military secrets, trade secrets, and personal information in RFID systems can all be stolen and exploited. This will inevitably bring incalculable losses to the country, the collective, and the individual. Therefore, the security issue of RFID has already been mentioned on the agenda.
1 RFID System Working Principle
The basic working principle of RFID system. Between the reader and the tag through the wireless signal to establish the communication between the two channels. The reader emits an electromagnetic signal through the antenna. The electromagnetic signal carries the reader's instruction to the tag. When the tag is in the reader's working range. The tag will obtain the command data and energy from the electromagnetic signal and send the tag identification and data to the reader in the form of an electromagnetic signal according to the instructions. Or rewrite the data stored in the RFID tag according to the reader's instructions. The reader can receive the data sent by the RFID tag or send the data to the tag, and can communicate with the back-end server communication network through the standard interface to realize the data communication transmission.
According to the tag energy acquisition method, the working mode of the RFlD system can be divided into close-range inductive coupling and long-distance electromagnetic coupling.
2 RFID security issues and solutions
After researching the working principle, RFID's security risks are readers and tags with respect to readers and back-end servers. The best way to analyze what security problems exist in a system is to stand in the attacker's position and analyze that the attack method they use is the simplest, most effective, and covert. It can identify the vulnerabilities in this system at the lowest cost. We will fix these vulnerabilities to achieve the purpose of improving system security. The same applies to RFID-enabled systems. Suppose an attacker attacks a system that uses RFID technology. There are generally two aspects to the attack: On the one hand, the information is transmitted between the reader and the back-end database. This happens with every computer on the network. The problem is the same; on the other hand, wireless communication between the reader and the tag and the tag itself. The latter is the focus of our research. Because RFID technology requires low cost of the hardware itself, some good security methods cannot be directly applied to this technology. This is the reason why RFID technology is not widely used to replace bar code labels so far. Assuming that the first aspect is safe, the second aspect is studied. The second aspect is divided into the following two aspects: (1) Internal personnel leak the confidentiality of readers and tags; (2) External attacks use software and hardware to readers and Electronic tags attack to get valuable information.
2.1 Internal staff leak RFID confidentiality and solution strategy
There are two ways in which internal personnel can disclose the confidentiality of RFID: a stealing RF tag entity is provided to criminals. The criminals then physically remove the chip package in a laboratory environment and use microprobes to acquire sensitive signals. Thus, complex attacks of radio frequency tag reconstruction are performed; another type of key is provided to criminals. The solution to this threat requires the internal management of the company and internal personnel to raise awareness of security risks.
2.2 External attacks use software and hardware to attack readers and electronic tags to obtain valuable information and solutions
Assuming that internal personnel do not disclose information, external attacks from attackers will become the main factor affecting RFID security. That is, use software and hardware to attack readers and electronic tags to obtain valuable information. This is also the focus and difficulty of our research. There are two types of external attacks on designed systems that generally use RFID technology: one is active attack (tamper information, forgery information, replay information, interrupt information); the other is passive attack (tracking tags to monitor the circulation of goods , interfere with the normal operation of readers and tags, interception of tag data transfer information). These seven kinds of attacks are the most common attacks seen in commercial applications of RFID technology.
The above analyses all the information needed to complete the seven attacks. The RFID system security mechanisms for various attack sub-objects are as follows:
1 Prevention of tag frequency detection, such as the Kill tag principle is to disable the tag, thus preventing the tracking of the tag and its contents. Faraday cages: According to electromagnetic field theory, containers made of conductive materials such as Faraday cages can shield radio waves. This prevents external radio signals from entering the Faraday cage and vice versa. Placing the label in a container made of a conductive material can prevent the label from being scanned, ie the passive label cannot receive a signal and cannot obtain energy. The signal emitted by the active tag cannot be transmitted. Therefore, using a Faraday cage can prevent privacy infringers from scanning tags for information. Active interference: Active interference with radio signals is another method of shielding tags. Tag users can actively broadcast radio signals through a device to prevent or destroy the operation of nearby RFID readers. Blocking labels: The principle of blocking labels is achieved by using a special blocking label to interfere with the anti-collision algorithm. The reader reads the command always gets the same response data. This protects the label.
2 to prevent label reading range and energy detection, such as the clip label is a new type of label developed by IBM for RFID privacy issues. The user can tear off or scrape the RFID antenna to reduce the readable range of the tag so that the tag cannot be read at will. Using the clip-on-tag technology, the reader is still able to read the tag at close range despite the fact that the antenna can no longer be used (for example, when the user returns the goods after the article is sold, the user can read the information from the RFID tag).
3 Prevent the detection of security protocols and the theft of related authentication keys. The first is a rigorous authentication security protocol. Such as Hash-I. The ock protocol uses fake IDs instead of real tag IDs in order to avoid information leakage and traceability. The randomized Hash-Lock protocol uses a random-number-based challenge-response mechanism. The Hash chain protocol is also based on a shared secret inquiry-response protocol. When a reader using two different hash functions initiates authentication, the tag always sends a different reply. In this protocol, the tag becomes an active tag with autonomous ID update capability. The hash-based ID change protocol is similar to the Hash chain protocol, and the ID exchange information in each callback is different. The system uses a random number to dynamically update the label's identity, as well as the TID (last time tick) and I. The ST (the last successful answer number) information is updated so that the protocol can resist retransmission attacks. The digital library's RFID protocol proposed by David's digital library RFID protocol David et al. uses a pseudo-random function based on pre-shared secrets to achieve authentication. The distributed RFID query-response authentication protocol is an RFID authentication protocol suitable for distributed database environments. It is a typical inquiry-response two-way authentication protocol. So far, David's digital library RFID protocol and distributed RFID query-response authentication protocol have not found that the protocol has obvious security holes or defects. The LCAP protocol is a challenge-response protocol. However, unlike other protocols of the same type in the past, it dynamically updates the tag ID after each execution. The re-encryption mechanism (Re-encryption) RFID tags have very limited computing resources and storage resources. Therefore, few people design RFID security mechanisms using public key cryptography. The second is related to the protection of authentication keys, Hash lock, random hash lock. Hash chain, Key value update random hash lock.
4 prevent RFID reader frequency detection, such as frequency changes;
5 The prevention of counterfeiting between the RFID reader and the back-end system interface is mainly resolved through the security protocol and the security policy of the network part, which can be solved by means of mutual authentication.
6 monitoring node to find out the most sent. The main purpose is to send data packets in a decentralized manner. Do not concentrate on one or two nodes. You can also use fake packets and fake nodes to confuse attackers.
However, with the further promotion of RFID, some problems have also appeared. These problems restrict its development. The most significant of these is security. Since the original RFID development designers and application personnel did not consider their corresponding security issues, security issues became a bottleneck restricting the development of RFID. If there is no trustworthy information security mechanism. The popularization of RFID technology has become empty talk. Imagine how much of a technology's surviving information can be stolen or even maliciously tampered with. It can only become empty talk like paper. In addition, radio frequency tags that do not have reliable information security mechanisms also have potential safety hazards such as leakage of sensitive information to nearby readers, vulnerability to interference, and vulnerability to tracking. If RFID's security cannot be fully guaranteed. Military secrets, trade secrets, and personal information in RFID systems can all be stolen and exploited. This will inevitably bring incalculable losses to the country, the collective, and the individual. Therefore, the security issue of RFID has already been mentioned on the agenda.
1 RFID System Working Principle
The basic working principle of RFID system. Between the reader and the tag through the wireless signal to establish the communication between the two channels. The reader emits an electromagnetic signal through the antenna. The electromagnetic signal carries the reader's instruction to the tag. When the tag is in the reader's working range. The tag will obtain the command data and energy from the electromagnetic signal and send the tag identification and data to the reader in the form of an electromagnetic signal according to the instructions. Or rewrite the data stored in the RFID tag according to the reader's instructions. The reader can receive the data sent by the RFID tag or send the data to the tag, and can communicate with the back-end server communication network through the standard interface to realize the data communication transmission.
According to the tag energy acquisition method, the working mode of the RFlD system can be divided into close-range inductive coupling and long-distance electromagnetic coupling.
2 RFID security issues and solutions
After researching the working principle, RFID's security risks are readers and tags with respect to readers and back-end servers. The best way to analyze what security problems exist in a system is to stand in the attacker's position and analyze that the attack method they use is the simplest, most effective, and covert. It can identify the vulnerabilities in this system at the lowest cost. We will fix these vulnerabilities to achieve the purpose of improving system security. The same applies to RFID-enabled systems. Suppose an attacker attacks a system that uses RFID technology. There are generally two aspects to the attack: On the one hand, the information is transmitted between the reader and the back-end database. This happens with every computer on the network. The problem is the same; on the other hand, wireless communication between the reader and the tag and the tag itself. The latter is the focus of our research. Because RFID technology requires low cost of the hardware itself, some good security methods cannot be directly applied to this technology. This is the reason why RFID technology is not widely used to replace bar code labels so far. Assuming that the first aspect is safe, the second aspect is studied. The second aspect is divided into the following two aspects: (1) Internal personnel leak the confidentiality of readers and tags; (2) External attacks use software and hardware to readers and Electronic tags attack to get valuable information.
2.1 Internal staff leak RFID confidentiality and solution strategy
There are two ways in which internal personnel can disclose the confidentiality of RFID: a stealing RF tag entity is provided to criminals. The criminals then physically remove the chip package in a laboratory environment and use microprobes to acquire sensitive signals. Thus, complex attacks of radio frequency tag reconstruction are performed; another type of key is provided to criminals. The solution to this threat requires the internal management of the company and internal personnel to raise awareness of security risks.
2.2 External attacks use software and hardware to attack readers and electronic tags to obtain valuable information and solutions
Assuming that internal personnel do not disclose information, external attacks from attackers will become the main factor affecting RFID security. That is, use software and hardware to attack readers and electronic tags to obtain valuable information. This is also the focus and difficulty of our research. There are two types of external attacks on designed systems that generally use RFID technology: one is active attack (tamper information, forgery information, replay information, interrupt information); the other is passive attack (tracking tags to monitor the circulation of goods , interfere with the normal operation of readers and tags, interception of tag data transfer information). These seven kinds of attacks are the most common attacks seen in commercial applications of RFID technology.
The above analyses all the information needed to complete the seven attacks. The RFID system security mechanisms for various attack sub-objects are as follows:
1 Prevention of tag frequency detection, such as the Kill tag principle is to disable the tag, thus preventing the tracking of the tag and its contents. Faraday cages: According to electromagnetic field theory, containers made of conductive materials such as Faraday cages can shield radio waves. This prevents external radio signals from entering the Faraday cage and vice versa. Placing the label in a container made of a conductive material can prevent the label from being scanned, ie the passive label cannot receive a signal and cannot obtain energy. The signal emitted by the active tag cannot be transmitted. Therefore, using a Faraday cage can prevent privacy infringers from scanning tags for information. Active interference: Active interference with radio signals is another method of shielding tags. Tag users can actively broadcast radio signals through a device to prevent or destroy the operation of nearby RFID readers. Blocking labels: The principle of blocking labels is achieved by using a special blocking label to interfere with the anti-collision algorithm. The reader reads the command always gets the same response data. This protects the label.
2 to prevent label reading range and energy detection, such as the clip label is a new type of label developed by IBM for RFID privacy issues. The user can tear off or scrape the RFID antenna to reduce the readable range of the tag so that the tag cannot be read at will. Using the clip-on-tag technology, the reader is still able to read the tag at close range despite the fact that the antenna can no longer be used (for example, when the user returns the goods after the article is sold, the user can read the information from the RFID tag).
3 Prevent the detection of security protocols and the theft of related authentication keys. The first is a rigorous authentication security protocol. Such as Hash-I. The ock protocol uses fake IDs instead of real tag IDs in order to avoid information leakage and traceability. The randomized Hash-Lock protocol uses a random-number-based challenge-response mechanism. The Hash chain protocol is also based on a shared secret inquiry-response protocol. When a reader using two different hash functions initiates authentication, the tag always sends a different reply. In this protocol, the tag becomes an active tag with autonomous ID update capability. The hash-based ID change protocol is similar to the Hash chain protocol, and the ID exchange information in each callback is different. The system uses a random number to dynamically update the label's identity, as well as the TID (last time tick) and I. The ST (the last successful answer number) information is updated so that the protocol can resist retransmission attacks. The digital library's RFID protocol proposed by David's digital library RFID protocol David et al. uses a pseudo-random function based on pre-shared secrets to achieve authentication. The distributed RFID query-response authentication protocol is an RFID authentication protocol suitable for distributed database environments. It is a typical inquiry-response two-way authentication protocol. So far, David's digital library RFID protocol and distributed RFID query-response authentication protocol have not found that the protocol has obvious security holes or defects. The LCAP protocol is a challenge-response protocol. However, unlike other protocols of the same type in the past, it dynamically updates the tag ID after each execution. The re-encryption mechanism (Re-encryption) RFID tags have very limited computing resources and storage resources. Therefore, few people design RFID security mechanisms using public key cryptography. The second is related to the protection of authentication keys, Hash lock, random hash lock. Hash chain, Key value update random hash lock.
4 prevent RFID reader frequency detection, such as frequency changes;
5 The prevention of counterfeiting between the RFID reader and the back-end system interface is mainly resolved through the security protocol and the security policy of the network part, which can be solved by means of mutual authentication.
6 monitoring node to find out the most sent. The main purpose is to send data packets in a decentralized manner. Do not concentrate on one or two nodes. You can also use fake packets and fake nodes to confuse attackers.
Bird bath are mostly made of porcelain, because apart from pecking at rice, bird bath are more convenient for birds to drink, so porcelain bird bath are the most suitable materials for all. Because the ceramic is heavy, it is not easy for birds to turn over when they step on it. It is better to find wide than high.
Hanging Bird Feeder, Ceramic Bird Bath , Glazed Birdbath
Yixing Bocai Pottery Co.,Ltd , https://www.bocaipottery.com