SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

Security considerations for RFID and mobile access

Security considerations for RFID and mobile access
Kiran Vasishta
Kiran Vasishta
Contact company
Contact ELATEC USA
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • RFID security depends on encryption, tamper detection, and communication interfaces.
  • Contactless credentials and Wiegand interfaces pose data interception risks.
  • Choose RFID products with flexible security features for future adaptability.
Related Links
  • Truck manufacturing company’s quality management begins with RFID badge readers
  • Elatec and KioWare announce OEM partnership to develop products and solutions that are easily paired together
  • Universal, future-proof RFID readers enable device safety, security and compatibility in healthcare ecosystems

In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber, and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online.

As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data.

RFID readers

RFID readers very much belong to the ecosystem wherein personal or user identification data is transmitted either to a host system such as a PC or to an endpoint such as a Human Machine Interface (HMI). A passive RFID transponder, soft credentials such as a mobile phone app using BLE/NFC or smart cards and other contact-based credentials all can carry sensitive data or personal information.

In the case of a smart card or contact-based credentials, the storage of personal information such as name, address, or date of birth is more prevalent compared to contactless credentials where an identification number may be used.

Security

While accounting for security across a system is needed it is more important to consider the application

In general, security is always related to the entire system which includes RFID media (contact/ contactless credentials), RFID reader, the host system, and any database or cloud server. While accounting for security across a system is needed it is more important to consider the application or use case that is in question.

One should carefully evaluate the consequences of any security breaches and if there is any sensitive information being exchanged from the RFID media to the host.

Application security 

As an example, the simple choice of RFID media may directly lead to a compromise in an intended application’s security. There are numerous references on security vulnerabilities related to Low Frequency (125KHz) contactless transponder types. The concerns focus on using interceptors to access unprotected static card information.

The adversaries may then clone this credential that may be used for triggering actions such as granting access to a facility or unlocking a computer.

Wiegand interface

Some references also highlight vulnerabilities in the Wiegand interface about intercepting the data signals to capture card value. Therefore, some older RFID transponders and communication interfaces that may be based on the aforementioned technology or have been subject to vulnerability hacks are now considered fundamentally compromised.

As mentioned previously, the overall security depends on every component of the system that includes the RFID reader. This article will mainly focus on some of the basic security considerations that need to be accounted for when choosing an RFID reader but also whether or not the application requires these abilities. Some of the key security considerations are as follows:

1.   Does your application require Encryption capabilities? If so, does the reader have the capability To execute cryptographic algorithms?

Contactless transponders can store data within their memory segments and encrypt or lock these segments

In every application where RFID technologies are involved there is a need to first assess whether encryption is required and if so, determine the exact channel where this needs to be enforced. It could be that the host interface requires the exchange of encrypted data or the air interface needs to transfer protected data.

Once the requirements are established, one may then evaluate the strength of this security. Furthermore, many types of contactless transponders can store data within their memory segments and encrypt or lock these segments with cryptographic keys.

Customised cryptographic keys

An apt card reader cannot only decrypt the memory segments and access the data but also provides an easy means for the end-user to carry out this operation. In many instances, the end-users have customised cryptographic keys for their credentials and are unwilling to share these keys with the card reader provider.

Therefore, having the capability to load custom keys by someone other than the card reader manufacturer becomes essential. This can be facilitated in multiple ways, such as implementing high-level APIs and allowing the user to write applications for the card reader, or it could be enabling the customer with a graphical user interface to enter keys used to access data sectors.

2.   Do you require encrypted data exchange? If so, where can the card reader support this?

In a typical scenario, the card reader behaves as a medium to facilitate data collection and transfer between the contactless or contact-based transponder and the host system. The host system can either be an endpoint that locally validates the credential presented to it or it can be a microcontroller that sends data over the network to the cloud or a database for validation and authentication.

As mentioned previously, assessing whether the need for encryption is between the RFID media and the reader or from the reader to the host is important. If the former, the appropriate credentials are required. Depending on this factor users may then consider choosing an appropriate RFID reader.

Encryption 

In cases where smartcards or contact-based credentials are used, the host system typically drives the communication

There are use cases wherein personal information such as name, address, date of birth or biometric data can be stored within the credential, eg: smart cards or passports as credentials. Therefore, encrypting the exchange of such data both between the credential and the reader as well as the reader and the host becomes critical.

Moreover, encryption algorithm engines such as AES, DES, and 3DES, or the capability to implement custom algorithms, need to be present on the card reader as this enables ease of integration. In cases where smartcards or contact-based credentials are used, the host system typically drives the communication in its entirety.

So, the card reader must also have:

  • Software capabilities such as Personal Computer Smart Card (PCSC) or Chip Card Interface Device (CCID) mode of communication. The availability of drivers to facilitate communication with the host also enables easy software integration.
  • Hardware support for communication standards such as ISO7816 and the presence of Secure Access Modules (SAM) slots and other contact-based interfaces.

3. Does your application require mutual authentication with Secure access modules (SAM) and RFID media? If so, does the reader support this?

A Secure Access Module is a type of smart card that follows a contact-based communication standard to interact with a card reader. These modules ensure the protection of security keys as well as facilitate cryptographic operations.

Typically, SAMs are used to generate application keys based on a specific master key or to generate session keys. They also enable secure messaging between the RFID media, the reader, and the host system.

Contactless credentials

Many contactless credentials hold memory segments/ applications that are encrypted with cryptographic keys

Many contactless credentials hold memory segments/ applications that are encrypted with cryptographic keys. These keys are often stored in SAMs and supplied to card reader manufacturers.

This not only ensures the security of the keys but adds a step in the authentication process. The card reader in this case should first perform authentication operations with the SAM and then carry out a series of cryptographic and bit manipulation operations between the contactless card and the SAM. This can be further secured by adding a key diversification step.

End-to-end encryption/security

The card reader must be able to support such a scenario both in the hardware as well as in the software. Many end-users require the card reader to natively support such a scenario and have the ability to provide high-level APIs to help in their implementation. In addition to this, high-security applications demand the transfer of data in an encrypted format.

One can ensure end-to-end encryption/security with the help of SAMs. In such an architecture, the reader facilitates mutual authentication with the RFID media and the SAM, thus transferring protected data over a Radio-Link and also ensuring the security of encryption keys.

Safety and Security

The reader can also transfer data encrypted by the SAM to the host system maintaining a high level of security across the system. Note that the safety of distributing SAMs as well as administering the installation process within the reader should be treated as a separate issue and tackled accordingly.

There is also an issue of the readers being stolen or the SAM modules being dismounted from the reader. The security considerations here do not indulge in these topics and appropriate precautions are to be put in place to improve the overall security of the system.

4. Does the card reader have Communication interfaces other than Wiegand such as RS485 or RS232?

These cards are still based on the Wiegand data format that is susceptible to interception as the data are available

The Wiegand card as well as the Wiegand interface for data transmission is a 40-year-old technology that originates from the Wiegand effect discovered by John Wiegand in the early 1970s.

While the Wiegand cards are still in production, they have been largely replaced by newer and cheaper forms of access cards. However, these cards are still based on the Wiegand data format that is susceptible to interception as the data are available in plain text.

Communication interface 

Also, the Wiegand interface introduced in the 1980s remains prevalent across the logical access as well as the physical access control industry despite various security vulnerabilities. This technology no longer conforms to the current security standards.

It is therefore important for integrators to choose a communication interface that can offer higher security from interception and support encrypted data exchange.

5. Do you require tamper detection technologies? If so, can the reader meet this requirement?

The need for tamper detection largely varies from one application to another so it is more important to consider whether this level of security is suitable for your respective use case. As an example, card readers attached to multi-function printers (MFPs) for releasing print jobs in an enterprise environment can be considered less critical since tampering with the reader can ultimately lead to the downtime of the printers but will not compromise the safety of your documents.

Typically, in such scenarios, the card reader works hand in hand with the MFP and a print management solution that ensures the release of print jobs. Therefore, if the card reader is sabotaged or tampered with, the MFP or the solution simply prevents the release of any information.

Tamper detection technology

Mechanical and optical tamper detectors that can be embedded directly in the card reader for superior protection

On the other hand, high-security environments such as data centers certainly need greater protection. One must thoroughly evaluate the consequences of any attempts directed toward compromising the device's integrity or the data associated with the device. These topics need to be considered separately and are outside the scope of this article.

In conclusion, depending on the application, the credentials involved as well as the data that is being exchanged with the card reader and eventually the host, tamper detection technologies can improve the security of the device. There are several technologies in the market such as mechanical and optical tamper detectors that can be embedded directly in the card reader for superior protection against threats.

6. Do you require the reader's configuration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement?

We’re all aware of system and application software updates as at some point our phones have received security patches or app upgrades over the network. In the case of card readers, the process is quite similar except here the software or configuration updates might require encryption based on your use case.

For example, if an end customer is reading static card numbers from an RFID media or isn’t using data protected by encryption keys this does not require the firmware or the configuration to be encryption for the simple reason that these files do not carry any sensitive information.

Encrypted firmware

The need to encrypt configuration/ firmware files arises if the data that is being read by the reader contains any personal information or is part of a proprietary corporate format that is confidential, or should a customer wish to move to a higher security credential encrypted with keys.

This means that either their existing card readers or new card readers must have a configuration that holds these keys. In such a scenario the configuration or firmware must also be encrypted since it holds sensitive information.

Choosing the right card reader

After all, it is essential to choose a card reader that can carry out the aforementioned security considerations

If the configuration or the firmware is encrypted, the file will no longer pose a security risk and it can be shared with customers to perform updates to the existing readers or with the card reader manufacturers to load new readers with the configuration of firmware updates. This not only secures the sharing process but also the update process since the reader is now receiving an already encrypted file.

After all, it is essential to choose a card reader that can carry out the aforementioned security considerations but more importantly the security features that are chosen need to be appropriate to the requirement of the customer.

Security features 

Any integrator first and foremost should thoroughly evaluate the respective application. They should work with subject matter experts in the field and establish requirements and objectives.

After developing the concept, system architecture, data flow as well as various secure channels, only then can one begin to account for the security features needed. This process not only helps cement the end system’s overall security view but also elucidates the exact security requirements that correspond to the resulting application.

Conclusion 

In conclusion, choosing an RFID product that not only has the above security features but also has a flexible system design capable of accommodating future adaptions will prove to be the right choice for OEMs and system integrators.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Shop security systems
  • Application security
  • Industrial security
  • Mall security
  • Commercial security
  • Shopping centre security
  • Security management
  • Security monitoring system
  • Network monitoring
  • Fingerprint reader
  • Store security
  • Store surveillance
  • Industrial security systems
  • Network cameras
  • Security software
  • Security service
  • Industrial surveillance
  • Mobile surveillance
  • Green security
  • Security communication
  • Integration software
  • Mobile communications
  • Internet of Things (IoT)
  • Corporate Security
  • Network Video Recorders
  • Artificial intelligence (AI)
  • Mobile access
  • GDPR
  • Touchless Security
  • Related links
  • HID Access control readers
  • Articles by Kiran Vasishta
  • Related categories
  • Digital video recorders (DVRs)
  • Access control readers
  • Network video recorders (NVRs)
  • Storage
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Expert commentary
About this page

Explore security considerations for RFID technology and mobile access control solutions, ensuring efficient and secure door entry systems.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec