O'Reilly logo

Seven Deadliest Wireless Technologies Attacks by Brad Haines

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4

Radio Frequency Identification Attacks

Publisher Summary

Radio Frequency Identification (RFID) is a wireless technology, and as such, communications can be read at a distance and captured. Most common RFID systems fall into two categories: active and passive. An active device typically has a battery or some other power system. The device is always “on” and typically has a longer range than passive tags. These devices are broadcasting their signal all the time and can be received by any appropriate reader in the vicinity. Passive devices are unpowered until brought into proximity of the reader. The reader powers up the tag through a process called induction. Several issues that always seem to come up with regard to RFID systems and security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required