Login

Please login for an individual price calculation.

Forgot Password?

Always stay up to date

With our e-mailings you will receive regular information about products, events, services and Balluff.

REGISTER AS A COMPANY

We will check whether you already have a customer number with us in order to link your new online account with it.

Register
Découvrez notre nouvelle fonction de recherche améliorée !

Découvrez notre nouvelle fonction de recherche : rapide, précise et avec des filtres intelligents. Optimisé pour les appareils mobiles. Trouvez tout ce dont vous avez besoin sans effort sur notre site. Essayez-le maintenant !

Vous n'êtes pas sûr des termes de recherche que vous pouvez utiliser ? Voici quelques exemples pour vous :

Code de commande

Technologie

Clé de type

Termes de recherche généraux

Cartes de remplacement

Découvrez notre nouvelle fonction de recherche améliorée !

Découvrez notre nouvelle fonction de recherche : rapide, précise et avec des filtres intelligents. Optimisé pour les appareils mobiles. Trouvez tout ce dont vous avez besoin sans effort sur notre site. Essayez-le maintenant !

Vous n'êtes pas sûr des termes de recherche que vous pouvez utiliser ? Voici quelques exemples pour vous :

Code de commande

Technologie

Clé de type

Termes de recherche généraux

Cartes de remplacement

Découvrez notre nouvelle fonction de recherche améliorée !

Découvrez notre nouvelle fonction de recherche : rapide, précise et avec des filtres intelligents. Optimisé pour les appareils mobiles. Trouvez tout ce dont vous avez besoin sans effort sur notre site. Essayez-le maintenant !

Vous n'êtes pas sûr des termes de recherche que vous pouvez utiliser ? Voici quelques exemples pour vous :

Code de commande

Technologie

Clé de type

Termes de recherche généraux

Cartes de remplacement

Le produit Balluff que vous recherchez n'est malheureusement pas disponible actuellement sur notre site web.

Le produit souhaité n'est actuellement pas validé pour notre site web ou n'est pas disponible pour le moment. Nous sommes à votre disposition pour toute information complémentaire et pour vous aider. N'hésitez pas à nous contacter - nous vous aiderons à tout moment !

Service et assistance

Votre satisfaction est notre priorité. Découvrez toutes les possibilités que nous vous offrons pour vous aider sur notre page Service et Assistance !

Autres caractéristiques de notre site web

Multidownload
Téléchargez rapidement et facilement vos téléchargements de produits de manière groupée.

Tester maintenant et gagner du temps

Service et assistance
Découvrez toutes les possibilités que nous vous offrons !

En savoir plus

Base de connaissances Balluff
Vous trouverez ici des informations complémentaires et des documents relatifs à votre produit Balluff.

En savoir plus

Votre recherche n'a donné aucun résultat !

Nous sommes désolés, mais nous n'avons trouvé aucun résultat correspondant à votre recherche actuelle. Nous vous recommandons de vérifier votre recherche et de vous assurer que vous avez utilisé les bons termes de recherche. Veillez à ce que l'orthographe soit correcte ou essayez un terme de recherche différent/similaire.

Recherches possibles :

  • Code de commande (BES0068)

  • Code de type (BES M12MI-PSC40B-S04G)

  • Caractères de remplacement (BES*M12*)

  • Technologie (Optoélectronique)

  • Mots-clés généraux (IO-Link)

Vous n'avez pas trouvé ce que vous cherchiez ?

Contactez-nous

My Balluff : découvrez maintenant les avantages de notre portail client en ligne

Découvrir les avantages maintenant

Security in RFID technology

Balluff Sp. z o.o.
14 Feb 2024 | 08:53 Clock

Reading Time: 6 minutes

Contactless communication technologies are increasingly used in both consumer and professional electronics. In today's article, we pay special attention to security in RFID technology and the principle of radio tags.

Radio-frequency identification, or RFID, technology makes it possible to identify objects using radio proximity communication. It is particularly associated with passive tags, which do not require additional power for operation. Their essence is a special design - tags are powered by inducing the flow of current due to the phenomenon of electromagnetic induction. They are used in industry, logistics and transportation.

The simplicity of implementation and high security of RFID open new opportunities for designers and engineers to apply the technology in industrial applications. An interesting example is the implementation of a machine identification system in a mine. This allows more efficient estimation of extraction and planning of work. Such a solution has been applied in one of the Scandinavian mines, where the system uses active tags.

What is RFID technology based on?

In the introduction we briefly answered the question - what is RFID technology about? In the following section we will discuss the essence of its operation in a bit more detail.

Most users may associate proximity data tags with transponders used to open doors in the form of cards and key rings. Components in this category usually operate at frequencies of either 125 kHz (Unique standard) or 13.56 MHz (MIFARE standard). However, it is worth mentioning that there are 3 groups of RFID frequencies.

RFID LF (Low Frequency)

Refers to devices operating in the range from 30 to 300 kHz, among which we most often find 125 and 134 kHz transponders. The tags are used for example, for opening passageways and marking animals and offer a range of about a few centimeters.

HF RFID (High Frequency)

In this group we meet components operating at frequencies of 3-30 MHz. The ISO standard stipulates the use of a specific frequency of 13.56 MHz for HF RFID. The range is up to several tens of centimetres.

RFID UHF (Ultra High Frequency)

The last group consists of solutions operating in the 300-3000 MHz range. In practice, one encounters RFID devices operating in the 860-960 MHz range offering a read-write range of up to 15 metres at most.

It is worth mentioning that active UHF RFID tags can offer much longer ranges. However, they require an external power supply unlike passive tags. RFID transponders themselves are built from several components, i.e. an integrated circuit with a microprocessor and memory, a transmit/receive antenna and a housing.

An interesting aspect is the variety of memories used in the integrated circuit of a secure RFID card or any type of proximity tag. We distinguish between EPC memory, User Memory, TID memory and so-called security memory. The latter memory is a bank storing two 32-bit passwords, protecting the data stored in the RFID tag.

Security in RFID technology

A topic discussed by many engineers and decision-makers in the industry is security in RFID technology. Of course, one should be aware that in theory it is possible for example, to clone RFID cards. In practice, however, everything depends on the details of the proximity technology used. Manufacturers are developing more and more perfect solutions that clearly improve the security level of radio tags.

One of the problems that designers may run into is the possibility of interfering with the electromagnetic spectrum in which RFID technology operates. An example would be for example, the intentional excitation of active tags at high frequency. If the active tag is battery-powered, this causes the cell to wear out faster. As a result, the attacker can cause the power supply to shut down and consequently render the system inoperable.

Engineers may also run into problems recognising an impersonating tag as an unauthorised RFID transponder. One solution is to include a special recognition number - the digital signature of the RFID tag. Of course, this may raise some difficulties. If it becomes necessary to update the contents of the memory, user access to the security-sensitive system will be necessary.

Designers of RFID radio systems are constantly improving the transponders available on the market. The fruit of their work is a special Smart Mode. It allows tags to be recognised independently of EPC and TID numbers. Thus, even copying a card or tag with unique numbers will not allow a forged transponder to be used in the system. As a result, an RFID tag copied by an intruder will remain useless.

What blocks the RFID signal?

Blocking the RFID signal is one effective method of protecting against proximity card cloning. Specialised blockers, either in the form of a case or tag housing are made of diamagnetic materials, which have very low magnetic conductivity. As a result, they block the flow of electromagnetic fields, preventing accidental excitation of the transponder by an intruder wishing to copy the RFID tag.

How to destroy an RFID chip?

The simplest method to destroy an RFID chip is to mechanically damage either the chip or the antenna. This can be done by physically drilling into the transponder in the appropriate location. A more sophisticated method can be the emission of a directed stream of high-power microwaves. In practice, destruction of an RFID chip by an intruder is very difficult due to the level of complexity of the operation.

RFID security in industry

We already know that the security of RFID applications in industry stands at a high level. Proximity identification systems with the use of radio waves are getting better and better. The technology itself is used in access control systems, tool marking or cargo identification on warehouse floors. Due to the increasing level of RFID security, it is worth considering their implementation in an industrial plant.

Learn more!

Keywords

  • RFID
  • Safety

Did you like this post?

0

Share this post

Author

Balluff Sp. z o.o.

Balluff Sp. z o.o.

We have been active on the Polish market for more than 25 years. We serve our customers from Pomerania to the Tatra Mountains, providing first-class service and technical support. We are also present online, where we share our knowledge about the latest implementations, industry trends, events or technical aspects of our solutions.


41 Contributions

Comment

Contact form

Do you have any questions or suggestions? We are at your disposal.

Balluff Limited

  • 20 Cheshire Business Park
    Cheshire Avenue
    Lostock Gralam
    Northwich, CW9 7UA

To the contact form

Discover related topics

More from the author

Découvrez notre nouvelle fonction de recherche améliorée !

Découvrez notre nouvelle fonction de recherche : rapide, précise et avec des filtres intelligents. Optimisé pour les appareils mobiles. Trouvez tout ce dont vous avez besoin sans effort sur notre site. Essayez-le maintenant !

Vous n'êtes pas sûr des termes de recherche que vous pouvez utiliser ? Voici quelques exemples pour vous :

Code de commande

Technologie

Clé de type

Termes de recherche généraux

Cartes de remplacement