tailieunhanh - Sổ tay RFID (P8)

Data Security RFID systems are increasingly being used in high security applications, such as access systems and systems for making payments or issuing tickets. However, the use of RFID systems in these applications necessitates the use of security measures to protect against attempted attacks, in which people try to trick the RFID system in order to gain unauthorised access to buildings or avail themselves of services (tickets) without paying. | 8 RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification Second Edition Klaus Finkenzeller Copyright 2003 John Wiley Sons Ltd. ISBN 0-470-84402-7 Data Security RFID systems are increasingly being used in high security applications such as access systems and systems for making payments or issuing tickets. However the use of RFID systems in these applications necessitates the use of security measures to protect against attempted attacks in which people try to trick the RFID system in order to gain unauthorised access to buildings or avail themselves of services tickets without paying. This is nothing new we only have to look to myths and fairy stories to find examples of attempts to outsmart security systems. For example Ali Baba was able to gain access to the supposedly secure hideout of the 40 thieves by discovering the secret password. Modern authentication protocols also work by checking knowledge of a secret . a cryptographic key . However suitable algorithms can be employed to prevent the secret key being cracked. High security RFID systems must have a defence against the following individual attacks Unauthorised reading of a data carrier in order to duplicate and or modify data. The placing of a foreign data carrier within the interrogation zone of a reader with the intention of gaining unauthorised access to a building or receiving services without payment. Eavesdropping into radio communications and replaying the data in order to imitate a genuine data carrier replay and fraud . When selecting a suitable RFID system consideration should be given to cryptological functions. Applications that do not require a security function . industrial automation tool recognition would be made unnecessarily expensive by the incorporation of cryptological procedures. On the other hand in high security applications . ticketing payment systems the omission of cryptological procedures can be a very expensive oversight if manipulated

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.