In the current development blueprint, the difference between RFID with other wireless technology, RFID tags are mainly used to identify and authenticate. but all wireless technologies need to consider security issues, RFID is no exception. RFID is mainly used in areas such as logistics and consumer, privacy requirements in these areas are not too high, so that trade considerations and not enough emphasis on RFID Security. In typical logistic application with hundreds of RFID reading devices, cargo tag information was stolen in what will be the loss? In most cases, even if it was to worry about, but not in this one seriously evaluated. However, noteworthy is that concerns about RFID Security has slowed the pace of development of RFID. Both have already applied RFID system users are those users who are evaluating RFID system, RFID potential security problems are causing the problem.
The security issue is how to prevent the most basic RFID tag information to intercept and decipher, because these labels is the core of the application and the information in the media in obtaining the label information an attacker can all kinds of unauthorized use of RFID systems. Due to the limited RFID applications span, hacker groups are widely involved in RFID field. At this stage, most of the problems are demonstrated by a number of research organizations. DST is harnessing the power of reading device in the role of radio frequency identification devices, in conjunction with car keys in capsule form, only when the component is correctly identify the car will not start until after the car alarm system. This study shows that, in the case of contactless RFID devices is possible to steal information. Although DST at dozens of cm range can only be read, but in the elevator, lounge environments made close contact with car owners there is a great possibility. RFID tags are integrated circuit chip, which means a method for attacking smart card product in the RFID tag is also equally possible. Cracking process of RFID tags is not complicated. Uses a 40-bit key products are usually completed in less than an hour to break out for stronger encryption, you can brute force via dedicated hardware devices, but this usually need to have label objects.
Through special protective layer of the solution on the label can also be removed, allowing external devices can connect with those labels. In this case, an attacker can not only get the label data, but also analyzing the structural design of labels to identify problems completing certain forms of attack can take advantage of. It would appear that even if RFID tags are “small”, however, may still exist as a complete system security vulnerability once poor design will have a considerable impact. To set the encryption mechanism is strong enough, strong to the attacker cannot crack, but RFID tags still faces the risk of being copied. Especially those protected RFID tags using the smart card reader and RFID tags attached devices will be able to easily complete the label copy work.
Despite the tampering with information in the RFID tag is also very difficult, or at least are more limited, however, in most cases, copies the label information should be able to successfully cheat RFID system. For example: attacker holding a copy of RFID credentials through the security system, access to RFID as a means of authentication of database systems, and so on. This defines a certain relationship with the RFID protocols: RFID technology standards, writes for RFID labels and management has a more detailed specification, but the limit is relatively easy to read, this internal copy is a RFID threats.