16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

RFID <strong>Security</strong> 619<br />

Figure 24.2 : RFID reader including the antenna and electronics package<br />

low enough so that smaller RFID units are attainable to hobbyists. Figure 24.2 is a photo<br />

of an RFID reader.<br />

NOTES FROM THE UNDERGROUND …<br />

Identification Friend or Foe (IFF)<br />

The concept of automatic identification using a radio transponder originated in<br />

World War II as a way to distinguish friendly aircraft from the enemy; hence, the<br />

name Identification Friend or Foe (IFF). The “ friendly ” planes responded with the<br />

correct identification, while those that did not respond were considered “ foes. ”<br />

In principle, IFF operates much the same as RFID. A coded interrogation signal<br />

is sent out on a particular RF, which the transponder receives and decodes.<br />

The transponder then replies with encrypted identification information. Each<br />

transponder has a unique identifier; however, some secondary information can be<br />

manually set by the pilot.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!