ANALYSIS OF EXISTING SOLUTIONS TO INCREASE ISO-14443 RFID-TAGS READING RANGE
Abstract
In this article there is given an analysis of radio frequency identification technology (RFID) and basic ways for applying it. The problem associated with the increase of reading range of ISO-14443 standard is revealed and proved. There is described what areas of life can be accessed by attackers, who use unauthorized readers. Main advantages and disadvantages are described and types of transponders are classified. There is also given a survey on Proxmark 3 hardware, which is needed for scanning, and existing technologies in increasing skimmers working radius. Territory, on which the experiment with the developed antenna will be held, is specified. There is described main problem, which is needed to be solved, to obtain new experimental data and possible research aspects are described.
References
2. Chris Paget Extreme-range RFID tracking // Blackhat USA. - Las Vegas: Blackhat USA, 2010.
3. Ilan Kirschenbaum, Avishai Wool How to Build a Low-Cost, Extended-Range RFID Skimmer // - Vancouver, Canada: Usenix Security, 2006.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.
