正在加载图片...
standards for protecting information stored on RFID chips is still being explored and strengthened.Research into the development and adaptation of efficient hardware for security codes and random number generators will improve RFID security.In addition,advances in RFID circuit design and manufacturing technology can also lower development costs releasing more resources in tags that can be used for other functions. Today,certain public key technologies are also being studied and in some cases deployed by RFID vendors.This helps improve confidentiality,user authentication and privacy of RFID tags and associated applications. What You Can Do to Protect Your Privacy There are a variety of solutions for tackling the security and privacy issues surrounding RFID.They can be categorized into the following areas. 1.Tag Data Protection One of solutions for tag data protection is password.Passwords can be used to protect tag data,preventing tags from being read without the owner's permission. But if the passwords for all the tags are identical,then the data becomes public. However,if each tag has a different or unique password,there may be millions of passwords that need to be recorded.So another solution,physical locking,has been come up.The tag manufacturer locks information such as a unique identifier into tag before the tag is released into an open environment.In other words,the chip is read-only and is embedded with information during the manufacturing process.This provides proof of origin.But this would result in higher memory cost and a larger size memory. 2.Reader Integrity When it comes to reader protection,readers can reject tag replies with anomalies in response times or signal power levels which don't match the physical properties of tags.If passive tags are used,this can be a way to prevent spoofing attempts.Readers can also use random frequencies with tags designed to follow a frequency dictated bystandards for protecting information stored on RFID chips is still being explored and strengthened. Research into the development and adaptation of efficient hardware for security codes and random number generators will improve RFID security. In addition, advances in RFID circuit design and manufacturing technology can also lower development costs releasing more resources in tags that can be used for other functions. Today, certain public key technologies are also being studied and in some cases deployed by RFID vendors. This helps improve confidentiality, user authentication and privacy of RFID tags and associated applications. What You Can Do to Protect Your Privacy There are a variety of solutions for tackling the security and privacy issues surrounding RFID. They can be categorized into the following areas. 1. Tag Data Protection One of solutions for tag data protection is password. Passwords can be used to protect tag data, preventing tags from being read without the owner’s permission. But if the passwords for all the tags are identical, then the data becomes public. However, if each tag has a different or unique password, there may be millions of passwords that need to be recorded. So another solution, physical locking, has been come up. The tag manufacturer locks information such as a unique identifier into tag before the tag is released into an open environment. In other words, the chip is read-only and is embedded with information during the manufacturing process. This provides proof of origin. But this would result in higher memory cost and a larger size memory. 2. Reader Integrity When it comes to reader protection, readers can reject tag replies with anomalies in response times or signal power levels which don’t match the physical properties of tags. If passive tags are used, this can be a way to prevent spoofing attempts. Readers can also use random frequencies with tags designed to follow a frequency dictated by
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有