1. Privacy issues
As RFID becomes more and more widely used, it is getting more and more attention. Many members of the public, technical personnel, and those who support the protection of personal privacy have begun to question the use of RFID. Proponents of privacy protection believe that many companies are using RFID tags to track the flow of goods.
At that time, customer privacy was unintentionally leaked. Many organizations involved in confidentiality have also begun to pay attention to this issue, because their identities have been linked to the items when they purchase items. Once they pass through certain shopping malls or centers again, their identities may be embedded in clothing or personal belongings. The RFID tag leaked.
Products based on wireless transmission technology such as RFID tags have an inherent quickness, that is, they exchange information through invisible wireless channels, so it is difficult to determine when the tag sends information. If RFID tags are affixed to many products, it is very convenient to manage the products from the perspective of the store, whether it is sorting or fast charging or preventing theft.
But once the product is sold, if the RFID tag attached to it is not removed, the identity of the buyer can easily be leaked. It may also bring more harm. For example, the thief can obtain the value of the tagged item through the RFID reader, thereby judging the buyer's economic conditions, and bringing convenience to the crime.
In fact, many privacy issues related to RFID tags can be solved. Due to the limitations of the existing RFID identification technology, the identification distance of the tag is still very limited. It is basically impossible to read someone's tag information through a reader in a car or a building far away from someone's line of sight. . In addition, weak radio frequency signals will also make the reader unable to identify under obstacles. Therefore, RFID technology should be safe. However, in some cases, such as when passing through an access control system or a payment system, the user's personal information and related information may be leaked. With the development of antenna technology and 10 techniques, long-distance recognition will eventually become a reality, and it is essential to establish a mechanism that can effectively protect privacy.
2. Security issues
Security is another issue that has attracted much attention from users. For example, some companies use RFID technology to manage the supply of goods, but it does not want other competitors to track the whereabouts and types of goods through the labels on the goods. Similarly, if some devices with user financial information use RFID tags, then the information related to user accounts should also be protected.
To this end, researchers have proposed some encryption algorithms for tags to realize identity authentication to readers and only transmit information to readers that have passed the identity authentication. In the authentication process, the tag needs to record the ID number of the certified reader, and the reader should also send the ID to the tag in the form of broadcast number. In order to ensure that its ID number is not intercepted by other attackers, encrypted transmission must be realized between the reader and the tag. Once the tag fails to pass the authentication of the reader, the tag will refuse to transmit the stored information. However, this keyed authentication strategy is also subject to attacks such as man-in-the-middle attacks and replay attacks.
3. RFID integration problem
Another problem facing RFID technology is how to integrate RFID technology into existing systems. Many R&D departments hope to solve this problem through RFID middleware, and connect the RFID system with the existing back-end system through the interface provided by the middleware. Middleware can solve existing standards problems caused by inconsistency. Using middleware, the data received by the front-end reader can be converted into a data format that meets the requirements of the back-end device, which can bring great flexibility to users. Many RFID middleware systems are equipped with hook technology to connect to operation monitors, and users can monitor the tags used in real time. Similarly, middleware also has the ability to connect readers and databases.