Current location - Education and Training Encyclopedia - Graduation thesis - RFID: how to ensure security?
RFID: how to ensure security?
A researcher at a Dutch university published a paper describing that RFID tags provide convenience for bad elements to attack the back-end network infrastructure, and the security of RFID is concerned. However, many experts in the industry believe that in most RFID systems, tags contain a small amount of fixed read-only data, which is unlikely to become a channel for attacking middleware and back-end databases. Patrick sweeney, president and CEO of RFID integrator Odin Technologies, believes that a poorly configured RFID system may be the target of hacker attacks, but only basic skills are needed to make RFID well configured and build a secure RFID network, while a network with basic security configuration will not have such problems. Hacker's attack needs to access the middleware server and put a wireless packet sniffer in the network. Sweeney said that because most RFID tags are only license plate data, even if attackers get these data, it will not cause serious problems. Although industry experts insist that RFID is not more fragile than other network designs, they say that this technology still has its unique security challenges. Joe Bardwell, president and chief scientist of Connect802, a solution provider, said that some organizations are very cautious about adopting RFID technology because personal information may be infringed. Badwell believes that with the increasing popularity of RFID financial devices such as smart cards, criminals may obtain users' personal information through such devices. Electronic product code (EPC) tag is a standard low-cost RFID tag, which is expected to become the most common RFID product in the end. Ari Juels, chief research scientist of RSA Lab, believes that EPC tags have the security function of preventing illegal writing and reading, but they may be copied and forged. RFID architecture requires all its components to be located at the edge of the network, which is contrary to the practice of many companies to integrate the enterprise network structure. Charlie Schmidt, professional service manager of AbeTech Company, believes that the second-generation EPC with color board and rectangle is quite open from the security point of view, and anyone can read data with a reader supporting this protocol. Many organizations are considering encrypting RFID transmission to avoid security problems. Schmidt believes that encryption increases the cost and complexity, and usually he will try his best to avoid customers adopting this method. Juels said that although there has not been a serious RFID attack, it is still important to consider protective measures. We are developing new critical infrastructure, and we don't want to wait until after the attack to consider remedial measures.