ABSTRACT

The state of security in radio frequency identification device (RFID) systems is generally weak compared with other mature computational technologies such as Internet servers, shared computing workstations, and even smartcards. This chapter provides a survey of existing security techniques employed in RFID systems, including authentication and encryption as well as commonly employed types of attacks, and security features of existing RFID standards. It presents a security scheme called layers of security for an RFID tag that combines features from passive and active tags. In the spoofing attack, a malicious device forges an existing tag with a cloned tag that can interact in a trusted manner by a reader. Security techniques for RFID tags must leverage specific details of RFID communication to create low-overhead secure transmissions. Active RFID tags generally communicate using some form of Manchester encoding. Manchester encoding combines data communication with a synchronization clock.