Michal Krumnikl, P. Moravec, Petr Olivka, D. Seidl
{"title":"EM410x RFID克隆卡检测系统","authors":"Michal Krumnikl, P. Moravec, Petr Olivka, D. Seidl","doi":"10.5220/0005229700760082","DOIUrl":null,"url":null,"abstract":"RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection systems, mobile payments, and other application areas. The purpose of this paper is to propose a solution that is capable of detecting fake (cloned) low cost 125 kHz RFID tags. The paper is focusing on detecting clones and emulators of EM410x tags. The proposed method is based on modifying the RFID reader and exploiting the specific features and properties of the fake tags. The experiments performed with the RFID reader with the implementation of the proposed clone detection techniques have shown that it is possible to reliably detect the majority of the publicly available fake tags and emulators. Moreover, the reader is capable of deactivating some of the clone tags if necessary.","PeriodicalId":345016,"journal":{"name":"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"EM410x RFID cloned card detection system\",\"authors\":\"Michal Krumnikl, P. Moravec, Petr Olivka, D. Seidl\",\"doi\":\"10.5220/0005229700760082\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection systems, mobile payments, and other application areas. The purpose of this paper is to propose a solution that is capable of detecting fake (cloned) low cost 125 kHz RFID tags. The paper is focusing on detecting clones and emulators of EM410x tags. The proposed method is based on modifying the RFID reader and exploiting the specific features and properties of the fake tags. The experiments performed with the RFID reader with the implementation of the proposed clone detection techniques have shown that it is possible to reliably detect the majority of the publicly available fake tags and emulators. Moreover, the reader is capable of deactivating some of the clone tags if necessary.\",\"PeriodicalId\":345016,\"journal\":{\"name\":\"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-02-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5220/0005229700760082\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0005229700760082","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection systems, mobile payments, and other application areas. The purpose of this paper is to propose a solution that is capable of detecting fake (cloned) low cost 125 kHz RFID tags. The paper is focusing on detecting clones and emulators of EM410x tags. The proposed method is based on modifying the RFID reader and exploiting the specific features and properties of the fake tags. The experiments performed with the RFID reader with the implementation of the proposed clone detection techniques have shown that it is possible to reliably detect the majority of the publicly available fake tags and emulators. Moreover, the reader is capable of deactivating some of the clone tags if necessary.