• About
  • Advertise
  • Contact
Friday, January 27, 2023
No Result
View All Result
NEWSLETTER
iotillinois
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotillinois
No Result
View All Result
Home Networking

An RFID warning shot

by iotadmin
May 19, 2021
in Networking
0
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Radio frequency identification is a part of the present and may well be a major part of our future. This situation is, at best, a mixed bag.

It would not be quite so bad if vendors of RFID products and companies that say they want to use them better understood security and privacy.

For those of you who have been cave dwellers over the last few years, RFIDs are small electronic devices, normally with no battery or power supply, that can interact wirelessly to identify themselves to a scanner.

The best-known examples are the very simple devices that companies such as Wal-Mart are asking suppliers to put on pallets of goods and that drug companies are beginning to attach to containers in the distribution chain (see Privacy as an afterthought ). These RFIDs are basically wireless bar codes that respond with a unique serial number when queried by a wireless scanner. Companies with large database infrastructures, like Wal-Mart, can keep track of where individual cartons of goods are in their supply chain or, someday far too soon, what individual products are in a shopper’s physical cart.

But not all RFIDs are that simple. Some, like those being considered for the next generation of U.S. passports, can report back a bunch of passport-holder-specific data. Others, like the electronic key used in some cars and the ExxonMobil SpeedPass, include a cryptographic challenge-response interaction in an attempt to make sure that the RFID is not counterfeit.

These have not been particularly good days for the RFID business. Researchers at Johns Hopkins University and RSA Laboratories have shown that the RFID used in the SpeedPass and in the keys for some Ford vehicles can be spoofed reasonably easily (see rfidanalysis.org). The researchers demonstrated that the RFID chips used weak encryption keys that can be broken within a few hours. Imagine thieves scanning for car owners’ encrypted keys while standing next to the car owners on elevators. The thieves then could break the encrypted keys and steal the car using normal car burglary tools, knowing that they could fool the electronic interlock into thinking they had the right key.

Texas Instruments, which makes the circuits used in the Ford keys and the SpeedPass, makes similar circuits with longer and harder-to-break keys. But Ford and Exxon decided to use the less expensive, weaker chips. Texas Instruments is not immune from blame here, as it is using a secret encryption algorithm, which violates the most basic of good encryption rules.

At the same time, the National Institute of Science and Technology (NIST) has shown that RFIDs to be used in U.S. passports can be read from as far away as 30 feet. This would make it easy to spot people carrying U.S. passports and capture information about them, and maybe even the passport holders themselves.

Finally, Wal-Mart and other merchants investigating the use of RFIDs seem to be genetically blind to privacy issues inherent in setting up a system that would let individuals be singled out by wirelessly determining the pattern and values reported back by the RFIDs embedded in their clothing and possessions.

I wonder how much bad news the RFID business can absorb before it begins to figure out that there are still problems to be solved before it’s time to deploy. So far, the RFID business has shown a remarkable level of absorbency.

Disclaimer: From time to time the local community complains about Harvard’s ability to absorb property near the campus, but the above absorbency puzzlement is mine, not the university’s.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2005 IDG Communications, Inc.

Download Best WordPress Themes Free Download
Download WordPress Themes Free
Download Best WordPress Themes Free Download
Download Premium WordPress Themes Free
free online course
download xiomi firmware
Download Nulled WordPress Themes
lynda course free download
Tags: An RFID warning shot
iotadmin

iotadmin

Next Post

RFID/EPC spec in contention

Recommended

6G will achieve terabits-per-second speeds

6G will achieve terabits-per-second speeds

3 years ago
IoT and LPWA are ‘changing the game’ for water and gas utility networks, says Navigant

IoT and LPWA are ‘changing the game’ for water and gas utility networks, says Navigant

3 years ago

Buy CBD Online

  • CBD Oils
  • CBG
  • Sleep spray
  • CBD gummies
  • buy CBD oil
  • Dab pens
  • CBD Patches
  • CBD pills
  • Pet CBD
  • CBD for pain
  • CBD for sleep
  • CBD Flower
Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Illinois USA

© 2019-20 iotillinois.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2019-20 iotillinois.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In