Can a combination of software and hardware be used to breach RFID-enabled doors without the use of predetermined access code?
Cardiff Metropolitan University
MetadataShow full item record
RFID (Radio Frequency IDentification) is a technology that is rapidly increasing its exposure to the mass market both in the public and private sector. This rapid growth of understanding and implementation has lead to various issues being overlooked due to the convenient nature of the technology. A specifically overlooked area has been the security aspect of this technology. There are still significant flaws that have yet to be addressed by both the manufacturers of the components and the organisations that are implementing this technology into everyday life. The current awareness of this technology and the risk thereby associated with this technology are generally unknown by the users. Organisations are typically reluctant to disclose such information in fear of potential security breaches to the systems. Regardless, there are currently known ways to breach such systems, however, in some circumstances, these require expensive technology and extensive knowledge of the technology. As the technology is relatively new it can be said that these issues will be resolved in due course over the coming years. Alarmingly, these systems are currently being implemented into our everyday lives without the awareness of these issues. RFID is making ways in the financial sector in form of contactless payment cards, public transport, in the form of contactless passes and within buildings, to safeguard important documentation or geographical location from unauthorised access. This study takes a different approach to breaching these RFID-enabled systems by using an iterative method of brute force attacking to gain area access without stating an access code prior. The research hereby conducted concludes that it possible to preform a brute force attack on RFID transponders using an iterative method in theory, however, there are limiting factor in the brute force process such as interference of the systems and duration of the attack. This success does indicate the current flaws within currently implemented systems and identifies that there is an opportunity for further breaches of a similar nature.
Showing items related by title, author, subject and abstract.
Pigott, Jon (2016-04-15)From a technological necessity in projects like the Telharmonium, to a creative opportunity enjoyed by current sound installation artists, the electromechanical condition is a mainstay of electronic and experimental music ...
The design and development of a prototype for restaurant's mobile based food order processing system Bwomezi Bacwa, Alfred (Cardiff Metropolitan University, 2015)The evolution of the digital age has seen technology become increasingly mobile, accessible and the restaurant like other industries is using it to improve efficiency. The highly mobile food-ordering process is struggling ...
An Investigation into Students Awareness Regarding their Online Privacy and Private Information rights Holland, Matthew Scott (Cardiff Metropolitan University, 2018-07)In today’s society we rely on technology more than ever. Given this fact, it is right to say that our privacy and data security is being called in to question. This research attempts to clear up how knowledgeable our ...