How to Stop Distant Attacks on RFID Chips

The limited power and processing ability of RFID chips makes them vulnerable to attackers operating at a distance. A new protocol could tackle this problem.

One drawback with RFID chips is their inability to know the distance of any device that is interrogating them. That allows a malicious user to attack from a distance, more or less at leisure and without the owner being any the wiser. One problem, in particular, is that attackers can set themselves up as intermediaries between readers and cards, so-called relay attacks. This gives attackers all the information they need to mount future fraudulent attacks.

That’s an increasingly serious loophole given the role that these cards now play in our society. RFID cards control access to the public transport system, private cars, buildings and in some parts of the world act like ready cash.

In principle, it’s not hard to work out the distances by measuring the signal strength or round trip time of returned messages between the card and reader. The problem for RFID chips is that they normally have no internal power, receiving all they need from the reader, and very limited processing ability, which is determined by the standards to which they are designed. Continue reading.

Related Posts

Software sniffs out criminals by the shape of their nose Forget iris and fingerprint scans -- scanning noses could be a quicker and easier way to verify a person's identity, according to scientists at the Un...
Improved Online Security for a Tenth of the Cost Computer scientists at the University of Hertfordshire have found a way to share information online securely for a fraction of the cost of existing sy...
Scientist Invents a Digital Security Tool Good Enough for the CIA — And for You A British computer hacker equipped with a "Dummies" guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and n...
A Comfortable and Secure Login Method As most Internet users know, it is often hard to remember or keep apart all the passwords and login names for one's different online accounts. Dr. ...
Soft Spots in Hardened Software Over the past decade, Microsoft, the target of choice for many online attackers, has hardened its operating system, adopting technologies designed to ...
What we can learn from Jason Chen’s experience Not too long ago, Jason Chen, a Gizmodo editor, had all the computer related materials in his residence seized by cops acting on a warrant in relation...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.

Leave a Comment

Your email address will not be published. Required fields are marked *