Please use this identifier to cite or link to this item:

Comparative Analysis of RFID and NFC Devices

File Size Format  
ssym-fall2021-0026.pdf 252.37 kB Adobe PDF View/Open

Item Summary

Title:Comparative Analysis of RFID and NFC Devices
Authors:Babichenko, Albert
Date Issued:Nov 2021
Publisher:University of Hawaiʻi — West Oʻahu
Abstract:Radio Frequency Identification (RFID) and Near-Field Communication (NFC) are examples of secure wireless technologies. An NFC device is a subset of RFID technology that functions similarly but can also act as a reader. This enables two-way communication between two NFC devices. These wireless devices are inexpensive to manufacture, and their ease of use allows them to be utilized for many situations. The distinguishing factor between these devices is the security, compatibility, and the range at which they communicate. It is well known that the security elements in most RFID cards utilize AES, DES, and proprietary Crypto-1 encryption. This encryption is the primary factor against attacks. However, older forum types are well known to be easily defeated. One method in which we can test this is by attacking the older NFC equipped cards and comparing their security against more recent forum types. This will be a test for real world scenarios as attackers can utilize wireless transmissions and potentially steal data without being detected. With the growing number of RFID objects and the abundance of smart devices, the security of these technologies may be at risk. The purpose of this paper is to explore the security of RFID and its standards as well as assess the different architecture and communication protocols of those devices. Recommendations for different tags will be proposed based on their ideal use-case, the standard of communication, and the encryption it uses.
Description:A student presentation to the Fall 2021 Student Research and Creative Works Symposium
Pages/Duration:1 page
Rights:Attribution-NonCommercial-NoDerivs 3.0 United States
Appears in Collections: Student Research Symposium

Please email if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons