Abstract
The growing popularity of IoT (Internet of Things) devices and the ever-increasing multiplicity of their applications ranging from security issues of automated locking systems in homes or hotels to contactless payments. This poses more and more challenges for RFID (Radio-Frequency Identification) users to raise the level of security. Problems of RFID-based devices often involve limited access to computing resources or persistent memory, which is associated with the low cost of the devices and their wide range of applications.The subject of this research is the comparative analysis of the power of communication signals between reader and transponder and reader and attacker. Measurement results were quantified, and the signal was compared for two types of modulations: ASK (Amplitude-Shift Keying) and PSK (Phase-Shift Keying), presenting their readings in the form of contrast histograms based on Fourier transforms. Based on the readings obtained, a security method was proposed based on an algorithm that allows 100% detection of attempted attacks on RFID devices based on the signal power emitted by the transponder to the reader. The conditions under which the effectiveness of the method is possible were also determined based on experiments for IoT devices.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have