The threat of breaching the Radio-Frequency Identification (RFID) tags that help automated identification of your mobile phone, passport, credit cards, access passes and others could soon be mitigated, thanks to the new security features researchers are developing.
To better safeguard the everyday technologies of RFID, researchers in Singapore are designing and testing new RFID protocols with enhanced security features.
"A security breach in RFID applications would leak valuable information about physical objects to unauthorised parties," Li Yingjiu, Associate Professor at Singapore Management University said in an official statement.
Many industries, like pharmaceutical companies, use the RFID technology to track inventory and manage supply chains.
"Because RFID tags work by broadcasting information to electronic RFID readers, security breaches can occur if hackers eavesdrop on this conversation, and manage to gain access to or tamper with information," the study noted.
The researchers say that such an attack, in the context of supply chain management, for example, would mean industrial espionage and the hacker may obtain sensitive information about inventory levels, trading volumes, trading partners and even business plans.
To tackle such a potential threat, researchers are employing strategies that include making the protocol's output unpredictable, making two tags indistinguishable to the hacker and preventing them from obtaining useful information even if they manage to interact with the tags.
"In addition, there are many instances where sharing of RFID information -- between suppliers and retailers, for example, or between various components of an Internet of Things -- would have obvious benefits," noted Li.
"But without appropriate security controls, however, most companies would be reluctant to make valuable data readily available," he added.
Researchers are also designing improved access control mechanisms that protect RFID information when it is shared on the internet.
The researchers said that one of the data security field's biggest challenges is the widening gap between academia and industry.
"The future of data security, in my vision, is how to narrow the gap and bridge the two communities, which have completely different incentives and evaluation criteria," Li said.
Li and his recently reported Android framework vulnerabilities and potential attacks to Google who acknowledged its findings in its security bulletins.
Also, to give data owners a better control over who can access their data, the researchers are working to develop new solutions for attribute-based encryption.
--IANS
qd/sm/vt
Disclaimer: No Business Standard Journalist was involved in creation of this content
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
