The RFID system typically consists of a single-chip RFID tag and an RFID card reader. The tag includes a radio frequency front end, memory, and a controller. The RFID card reader is responsible for decoding the data stored on the tag and then performing appropriate actions, such as unlocking a door or granting access. RFID tags are similar to barcodes but store product information electronically. Beyond basic security features, modern RFID tags can automatically update relevant data as products move through the supply chain.
RFID tags are widely used for tracking a variety of items, from pets and livestock to high-end electronics. They can automatically collect tolls on bridges and roads and control access to restricted areas. Recently, RFID technology has expanded into more secure domains like pharmaceuticals, contactless payments, cargo security, and e-passports.
To meet the growing demands of these applications, new standards must be established for defining RFID tags and readers. These standards should cover aspects like memory capacity, encryption strength, the number of distinct data zones, and overall security. Additionally, storage density and configuration flexibility are essential for supporting complex tracking needs.
In industries like pharmaceuticals, accurate tracking is critical. According to the U.S. Food and Drug Administration (FDA), counterfeit drugs have increased tenfold in the past five years. In some cases, fake medicines can even endanger lives. While barcodes offer some level of security, they can be easily copied. It's estimated that 10% of prescription drugs worldwide are counterfeit, resulting in thousands of deaths annually.
To combat this issue, states like Florida have mandated paper-based medical records for prescription drugs, including detailed information such as drug names, dosages, manufacturers, batch numbers, and transaction details. California followed suit by requiring electronic drug records starting in 2009, with other states expected to adopt similar measures.
Tracking such detailed information requires RFID tags with larger memory capacities and multiple secure data zones. For example, a manufacturer’s ID, production date, and product specifications may need to be readable by all, but only the manufacturer should be able to write them. Retailers might also need limited write access at different stages of the supply chain.
Such data-intensive applications often require at least 64Kb of on-chip EEPROM and up to 16 user-defined memory areas. Many current RFID tags, however, only offer 2Kb or less with just two memory banks, which is insufficient for complex tracking scenarios.
Figure 1: Atmel offers a range of RFID tags, from 64-bit read-only memory to 64K-bit read/write protected memory, with 4 to 16 memory areas available.
RFID Security
Security is a crucial aspect of RFID systems, yet many currently available tags and readers lack sufficient protection. Most RFID tags use outdated 48-bit encryption algorithms, which can be cracked within hours using standard computing equipment.
However, recent advancements have introduced more secure options. Some RFID vendors now provide tags and readers with advanced 64-bit encryption algorithms. Compared to 48-bit keys, 64-bit encryption offers significantly higher security—over 64,000 times stronger in terms of key space. This makes it much harder for unauthorized users to break into the system.
Designers should prioritize selecting tags that support efficient and secure encryption algorithms with at least 64-bit key lengths to ensure robust protection.
RFID Tag and Reader
The security of an RFID tag is only as strong as the reader that interacts with it. Even if a tag uses a 64-bit encryption algorithm, it will be ineffective if the reader does not support the same level of security. Unfortunately, most RFID readers on the market today still rely on outdated encryption methods with short key lengths, making them vulnerable to attacks.
Newer, more secure readers now support advanced military-grade 128-bit AES encryption while also being compatible with simpler encryption protocols. They also allow for password protection and support optional encryption algorithms across multiple zones on the RFID tag, providing greater flexibility and security for complex applications.
Trade Elevator Spare Parts
Shanghai Janetec Electric Co., Ltd. , https://www.janetecelectric.com