Take the pledge to vote

For a better tommorow#AajSawaroApnaKal
  • I agree to receive emails from News18

  • I promise to vote in this year's elections no matter what the odds are.
  • Please check above checkbox.

    SUBMIT

Thank you for
taking the pledge

Vote responsibly as each vote counts
and makes a diffrence

Disclaimer:

Issued in public interest by HDFC Life. HDFC Life Insurance Company Limited (Formerly HDFC Standard Life Insurance Company Limited) (“HDFC Life”). CIN: L65110MH2000PLC128245, IRDAI Reg. No. 101 . The name/letters "HDFC" in the name/logo of the company belongs to Housing Development Finance Corporation Limited ("HDFC Limited") and is used by HDFC Life under an agreement entered into with HDFC Limited. ARN EU/04/19/13618
Tech
News18 » Tech
2-min read

New Radio-Frequency Identification Protocols for Hack-proofing Devices Soon

Many industries, like pharmaceutical companies, use the RFID technology to track inventory and manage supply chains.

IANS

Updated:January 2, 2017, 9:55 AM IST
facebookTwitterskypewhatsapp
New Radio-Frequency Identification Protocols for Hack-proofing Devices Soon
Levashov denies the charges in an eight-count indictment handed down by a federal grand jury in Connecticut in April. (Representative image.)
Loading...

The threat of breaching the Radio-Frequency Identification (RFID) tags that help automated identification of your mobile phone, passport, credit cards, access passes and others could soon be mitigated, thanks to the new security features researchers are developing.

Read more: Samsung to Reveal Galaxy Note 7 Investigation Report This Month

To better safeguard the everyday technologies of RFID, researchers in Singapore are designing and testing new RFID protocols with enhanced security features.

Read more: Coolpad Note 3S Review: A Pleasant-looking Phone That Ticks the Right Boxes

"A security breach in RFID applications would leak valuable information about physical objects to unauthorised parties," Li Yingjiu, Associate Professor at Singapore Management University said in an official statement.

Read more: OnePlus 5 With Water Resistance to Launch Soon? Here's What to Expect

Many industries, like pharmaceutical companies, use the RFID technology to track inventory and manage supply chains.

"Because RFID tags work by broadcasting information to electronic RFID readers, security breaches can occur if hackers eavesdrop on this conversation, and manage to gain access to or tamper with information," the study noted.

The researchers say that such an attack, in the context of supply chain management, for example, would mean industrial espionage and the hacker may obtain sensitive information about inventory levels, trading volumes, trading partners and even business plans.

To tackle such a potential threat, researchers are employing strategies that include making the protocol's output unpredictable, making two tags indistinguishable to the hacker and preventing them from obtaining useful information even if they manage to interact with the tags.

"In addition, there are many instances where sharing of RFID information -- between suppliers and retailers, for example, or between various components of an Internet of Things -- would have obvious benefits," noted Li.

"But without appropriate security controls, however, most companies would be reluctant to make valuable data readily available," he added.

Researchers are also designing improved access control mechanisms that protect RFID information when it is shared on the internet.

The researchers said that one of the data security field's biggest challenges is the widening gap between academia and industry.

"The future of data security, in my vision, is how to narrow the gap and bridge the two communities, which have completely different incentives and evaluation criteria," Li said.

Li and his recently reported Android framework vulnerabilities and potential attacks to Google who acknowledged its findings in its security bulletins.

Also, to give data owners a better control over who can access their data, the researchers are working to develop new solutions for attribute-based encryption.

Get the best of News18 delivered to your inbox - subscribe to News18 Daybreak. Follow News18.com on Twitter, Instagram, Facebook, TikTok and on YouTube, and stay in the know with what's happening in the world around you – in real time.

Subscribe to Moneycontrol Pro and gain access to curated markets data, trading recommendations, equity analysis, investment ideas, insights from market gurus and much more. Get Moneycontrol PRO for 1 year at price of 3 months. Use code FREEDOM.

| Edited by: Krishna Sinha Chaudhury
Read full article
Loading...
Next Story
Next Story

Also Watch

facebookTwitterskypewhatsapp

Live TV

Loading...
Countdown To Elections Results
To Assembly Elections 2018 Results