TAILIEUCHUNG - Sổ tay RFID (P8)

Data Security RFID systems are increasingly being used in high security applications, such as access systems and systems for making payments or issuing tickets. However, the use of RFID systems in these applications necessitates the use of security measures to protect against attempted attacks, in which people try to trick the RFID system in order to gain unauthorised access to buildings or avail themselves of services (tickets) without paying. | 8 RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification Second Edition Klaus Finkenzeller Copyright 2003 John Wiley Sons Ltd. ISBN 0-470-84402-7 Data Security RFID systems are increasingly being used in high security applications such as access systems and systems for making payments or issuing tickets. However the use of RFID systems in these applications necessitates the use of security measures to protect against attempted attacks in which people try to trick the RFID system in order to gain unauthorised access to buildings or avail themselves of services tickets without paying. This is nothing new we only have to look to myths and fairy stories to find examples of attempts to outsmart security systems. For example Ali Baba was able to gain access to the supposedly secure hideout of the 40 thieves by discovering the secret password. Modern authentication protocols also work by checking knowledge of a secret . a cryptographic key . However suitable algorithms can be employed to prevent the secret key being cracked. High security RFID systems must have a defence against the following individual attacks Unauthorised reading of a data carrier in order to duplicate and or modify data. The placing of a foreign data carrier within the interrogation zone of a reader with the intention of gaining unauthorised access to a building or receiving services without payment. Eavesdropping into radio communications and replaying the data in order to imitate a genuine data carrier replay and fraud . When selecting a suitable RFID system consideration should be given to cryptological functions. Applications that do not require a security function . industrial automation tool recognition would be made unnecessarily expensive by the incorporation of cryptological procedures. On the other hand in high security applications . ticketing payment systems the omission of cryptological procedures can be a very expensive oversight if manipulated

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.