A large number of books can be managed neatly and orderly in the school library. Items that have been accidentally stolen can be quickly tracked back. Our express delivery can always be accurate on the route. Do you feel amazing? These are all based on RFID technology. In this era of Internet of Things, it is one of the key technologies for data connection and communication.
What is RFID？
The full name of RFID is radio frequency identification. It is a wireless communication technology that can identify specific targets and read and write related data through radio signals. There is no need to establish mechanical or optical contact between the identification system and a specific target. Up to now, RFID has been widely used in all aspects of our lives.
- Tag: Each tag has a unique electronic code attached to the object to identify the target object.
- Reader: The device that reads label information can be designed as a handheld or fixed type.
- Antenna: It transmits radio frequency signals between tags and readers.
The application of RFID technology has a half-world history. Today, RFID technology is developing well in the world.
Three categories of RFID products
Sourceless RFID product
Such products require touch to identify. Their main operating frequencies are low frequency at 125KHZ, high frequency at 13.56MHZ, ultra high frequency at 433MHZ and 915MHZ. This kind of product is quite common in our daily life. For example, both bus cards and ID cards are applications of sourceless RFID product.
Sourced RFID product
This type of product can be identified automatically over a long distance. It is generally used in some large-scale environments. Their main operating frequencies are microwave 2.45GHZ and 5.8GHZ, UHF 433MHZ.
Semi-Sourced RFID Product
Semi-sourced RFID Product is a combination of sourceless RFID product and sourced RFID product. It combines the advantages of both. It can make microwave 2.45G play an advantage under the trigger of low-frequency 125KHZ frequency(short-range activation positioning, long-distance transmission of data), such as access control access management, regional positioning management, etc.
RFID technology has the characteristics of strong anti-interference and no manual identification. So, it is often used in some areas where information needs to be collected or tracked.
Warehouse Management and Cargo Transportation
Embedding an RFID chip into each piece of goods and then letting the reader automatically collect the information about the goods. In this way, the managers can check the information about the goods at any time when the goods are stored in the warehouse or in the course of transportation. This will reduce the risk of discarding and stolen goods, improve the speed and accuracy of delivery of goods, and prevent the channeling of goods.
Access Control and Attendance
In some companies or large conferences, people can identify and sign in by themselves through the identification system at the door. This makes things much easier.
Fixed Assets Management
Some places with huge assets and valuable items, such as libraries and museums, need complete management procedures and strict protection measures. When the stored information on these items changes abnormally, the administrator will receive this information immediately in the system.
Train and Car Identification and Baggage Safety Inspection
Railway vehicle dispatching system is a typical case. It can complete automatic identification of vehicle number and information input. Most importantly, it saves a lot of manual statistics time and improves accuracy.
Medical Information Tracking
Tracking cases, waste products, and drugs are good ways to improve the level and efficiency of hospital services.
Military and National Defense and National Security
Some important military drugs, guns, ammunition or military vehicles need to be tracked in real time.
The reader can work in harsh environments. It also has strong penetration. Moreover, it can quickly identify and read labels.
Huge data capacity
The data capacity of the RFID tag can reach 10k, which is much higher than that of the 2,725 digits of the two-dimensional barcode.
When the object attached to the RFID tag enters the effective recognition range of the interpreter, the administrator can use programming to dynamically modify the tag’s data, and track and monitor it.
Long service life
It has strong anti-interference. In other words, it can work for a long time.
Within the effective recognition range of the reader, it can read multiple RFID tags at the same time.
The RFID tag has high security. And we can encrypt tag data with a password to improve security.
Generally, the recognition process does not exceed 100 milliseconds.
Top 10 Threats for RFID
There are three types of RFID tags:
- Ordinary tags
- Symmetric key tags
- Asymmetric key tags
Ordinary tags are widely used in logistics management and tourism. However, ordinary tags are not encrypted and easy to forge. Therefore, the attackers can easily write information into a blank RFID tag or modify an existing tag to gain access to the authentication system.
In short, when the RFID tag contains sensitive information such as personal identity card, please be sure to encrypt the information.2
Most RFID tags do not authenticate the reader’s legitimacy. So the attacker can use his own reader to send a request for authentication information to the tag and then grab the tag’s content.
The attackers can use mobile robots to track the location of the tags. So no matter whether the tag is encrypted or not, it can’t avoid being tracked.
The readers and back-end databases are vulnerable to denial-of-service attacks. This will cause the reader to fail to authenticate the tags correctly and lead to the interruption of other corresponding services.
The attacker attempts to forge himself as an administrator of a back-end database. If the forgery succeeds, he can do anything.
When the denial occurs, the system has no way to verify whether the user has done this operation.
In this attack, the attacker inserts a system command into the normal data stored in the tag.
The attacker intercepts the communication between the tag and the reader. Then he records the reader’s response to the tag’s authentication request. After that, he retransmits the information to the reader.
9. Physical attack
The attackers can use X-rays to destroy tag content. Similarly, they can also use electromagnetic interference tags to communicate with readers. In addition, anyone can easily use a knife or other tools to destroy labels.
RFID system is vulnerable to virus attack. In most cases, the target of the virus is the back-end database. RFID virus can destroy and leak the tag content stored in the back-end database, reject or interfere with the communication between the reader and the back-end database.
In recent years, the application of Internet of Things technology has developed rapidly. Therefore, as one of the main technologies of the Internet of Things, RFID has attracted more and more attention.
So, what role should EAS play in this era? Will it disappear? Or keep pace with the times? Certainly, as an effective anti-theft technology, EAS will not end its historical mission. AIRSEC combines with RFID technology and proposes an EAS anti-theft solution based on RFID technology. On the basis of traditional EAS, the anti-theft information is stored in the RFID tag. As a result, the electronic tag can be identified and the purpose of anti-theft of goods can be achieved.
The combination of RFID and EAS can simplify management, reduce costs and prevent theft. It is landmark equipment for high-grade shopping malls, supermarkets, libraries, etc. Most importantly, it will be an inevitable trend in the development of modern retail industry.