Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Registered members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
RAM TRX - TRX-Forum.com
Bronco Raptor - BroncoRaptorForum.com
Forums
GEN 2 (2017-2020) Ford F-150 Raptor Forums
Ford F-150 Raptor General Discussions [GEN 2]
Keyfob Boosting - Thefts
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="JAndreF321" data-source="post: 1465933" data-attributes="member: 40327"><p>You could be jammin like Robert Nesta...plagiarized myself from a class discussion post:</p><p></p><p> Radio Frequency Identification is an old technology which has become very cheap and easy to use. This cheap part means that it is also easy to take advantage of since there are several ways individuals can track and use the information on your RFID device. There are several options to prevent this. The most simple one is simple protective containers. If you use an RFID device for security then you could use an RFID blocking container to prevent anyone from accessing it. You could also employ blocker tags which emit their own frequency and block malicious readers from accessing the correct tag. Another option is mutual authentication cryptography. This requires both the reader and the tag to approve each other using cryptographic keys which are difficult to break. The final option I’ll mention is active jamming. Active jamming would need to be used in conjunction with Blocker tags to prevent unauthorized scanning during the use of active tags. The appropriate scanning device would jam malicious scanners during the interval when blockers are disabled for the use of the actual tag. The jammer would need to be low power and only near the real scanner. </p><p></p><p></p><p></p><p> The first line of defense is always people and policies. You should keep your device in a safe location to prevent unauthorized scanning and limit exposure to third parties.</p><p></p><p></p><p></p><p>Liu, A. X., Shahzād, M., Liu, X., & Li, K. (2017). <em>RFID Protocol Design, Optimization, and Security for the Internet of Things</em>. The Institution of Engineering and Technology.</p></blockquote><p></p>
[QUOTE="JAndreF321, post: 1465933, member: 40327"] You could be jammin like Robert Nesta...plagiarized myself from a class discussion post: Radio Frequency Identification is an old technology which has become very cheap and easy to use. This cheap part means that it is also easy to take advantage of since there are several ways individuals can track and use the information on your RFID device. There are several options to prevent this. The most simple one is simple protective containers. If you use an RFID device for security then you could use an RFID blocking container to prevent anyone from accessing it. You could also employ blocker tags which emit their own frequency and block malicious readers from accessing the correct tag. Another option is mutual authentication cryptography. This requires both the reader and the tag to approve each other using cryptographic keys which are difficult to break. The final option I’ll mention is active jamming. Active jamming would need to be used in conjunction with Blocker tags to prevent unauthorized scanning during the use of active tags. The appropriate scanning device would jam malicious scanners during the interval when blockers are disabled for the use of the actual tag. The jammer would need to be low power and only near the real scanner. The first line of defense is always people and policies. You should keep your device in a safe location to prevent unauthorized scanning and limit exposure to third parties. Liu, A. X., Shahzād, M., Liu, X., & Li, K. (2017). [I]RFID Protocol Design, Optimization, and Security for the Internet of Things[/I]. The Institution of Engineering and Technology. [/QUOTE]
Insert quotes…
Verification
Post reply
Members online
ausmark
Reptar854
Speedhunter
schumacher1111
Suren27
jfondren3
Josfue
steverferguson
Gator85
Chop96
IHAVETWO
never_summer
kingshredd
Sharpie69
WA2012
fordfreek
james9
jond
cfmistry
dtalabany
Raptor801
MDJAK
970rap
BBR
IIAWAH808
ograptor
bigmyke84
TheButcher
jAKe47
grussell
blazn5667
bigjava2002
WatFam
DS550
cuts
thatJeepguy
Badboy4fun_wa
tabvette
ReddingRaptor
Forum statistics
Threads
93,191
Posts
1,955,703
Members
56,469
Latest member
ngodavid23
Forums
GEN 2 (2017-2020) Ford F-150 Raptor Forums
Ford F-150 Raptor General Discussions [GEN 2]
Keyfob Boosting - Thefts
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top