introduction
The RFID (Radio Frequency IdenTIficaTIon) technology is a radio wave transmission technology with specific identification information. Originally born in the Second World War, it is the development of the aircraft's IFF technology. After more than half a century of research and promotion, with the strong support of the US government, it has gradually been introduced to various application fields in the market since the 1990s. After 20 years of continuous innovation and rapid breakthrough in RFID technology, RFID has penetrated into all aspects of human social life.
With the faster network speed and technical support in the 3G era, the identification and application of 3G and RFID will become the development trend of future mobile phone functions. However, the characteristics of RFID-rewritten data rewriting, RFID tags often store important user data, or even private information, so there is a danger of hackers attacking RFID systems. In this paper, the specific application of customer identification in 3G mobile payment is studied, and the information security and solution of RFID system are studied.
Analysis of the basic composition and security attack of an RFID system
1.1 The basic components of the RFID system
A typical radio frequency identification (RFID) system usually consists of an electronic tag (Tag), a reader (Reader), a middleware (Middleware), and a data management system (Database).
Electronic tags: Electronic tags, also known as smart tags, consist of coupling elements and chips. Each tag has a unique electronic code that is attached (or embedded) to identify the target object on the object. It is divided into active tags and passive tags. Types of.
Reader: Reader, also known as read head, reader, etc., can read (and sometimes write) electronic tag information, can be designed as handheld or fixed, is the RFID system information control and processing center. The reader is generally composed of a radio frequency interface, a logic control unit and an antenna.
Middleware and data management system: The data management system completes the centralized storage and management of RFID data information, which can be various database systems or supply chain systems, and is responsible for collecting and processing information from readers. The middleware is the nerve center of the RFID system and is responsible for contacting RFID readers and data management systems.
1.2 RFID system security attack analysis
Attack methods for RFID identification systems can be divided into active attacks and passive attacks. Active attacks mainly include: cracking and copying the obtained RFID tags through physical means; performing protocol analysis on RFID electronic tags and readers through software or instruments, and searching for weaknesses of protocols and algorithms, thereby deleting electronic tags. Content or tampering with the content of electronic tag content; generating an anomalous environment, causing RFID to fail, or performing a denial of service attack by interfering with, blocking wireless channels, or other means. Passive attacks mainly include: through eavesdropping technology, or analyzing various electromagnetic characteristics generated during normal operation of the RFID system to obtain communication data between the RFID tag and the reader or other RFID communication device; tracking the RFID through the eavesdropping device Tag dynamics, etc.
There are 9 common attack methods:
(1) Data deduction: The attacker obtains the current information of the RFID tag by some means, and then uses the deductive method to infer the historical information of the tag from the information, which will threaten the entire RFID database.
(2) Tracking: When the RFID tag being queried returns a fixed message, the attacker can continuously track the RFID tag, and if the tag contacts the person, there is a possibility of privacy leakage.
(3) Eavesdropping: The attacker uses a radio frequency device to detect the communication content between the reader and the RFID tag. Due to the asymmetry of the RFID system communication (the reader's transmit power is much larger than the RFID tag's transmit power), the attacker can easily intercept the forward channel (reader to RFID tag) content. Eavesdropping is a common passive attack. (4) Physical attack: The attacker obtains the key by analyzing the RFID chip. However, the cost of the attack is too high and it is very attractive to attackers.
(5) Illegal access: As long as the attacker has a read/write device compatible with the RFIF system protocol, the attacker can access the RFID tag and obtain the information on the tag. It may lead to the leakage of personal information and seriously threaten the privacy of the individual.
(6) Refusal of service. The attacker continuously transmits interference signals, making the RFID system unable to communicate properly. This type of attack does not cause damage to the RFID system itself, but only interferes with the communication of the system, but it cannot be implemented in public for a long time, and the system recovers quickly, so denial of service is the least harmful means of all attacks.
(7) Forgery: After an attacker obtains sensitive information of a tag (such as a key or a product code), it can fake the same tag and deceive the reader to verify it for profit. This method belongs to the active attack type and is highly destructive. It is the most commonly used attack method and one of the main hidden dangers of RFID system security.
(8) Replay: The attacker repeats the history information to achieve the purpose of impersonating a tag or a reader.
(9) Tampering: The attacker uses the reader to maliciously modify the information of the legal RFID tag, which causes the legal RFID tag to fail.
GALOCE Multi-axis Load Cell offers 0-10N / 0-20N /0-30N / 0-50N four rated measuring ranges for all three axes, each axis supports both tension and compression force measurement. 3-axis Force Sensor adopts independent wheatstone full bridge for each axis to deliver mV/V output proportional to the applied force and requires no mathematical manipulation. Typical applications for this type of transducer are for example friction force measurement, force control in robotics, force monitoring in handing devices, industrial test benches,etc..
Multi-component force sensor,Multi Axis Load Cell,multicomponent transducer,3 Axis Load Cell
GALOCE (XI'AN) M&C TECHNOLOGY CO., LTD. , https://www.galoce-meas.com