Moscow-City Skyscrapers Using RFID to Streamline Parking Access, Control

Moscow-City Skyscrapers Using RFID to Streamline Parking Access, Control

Dec. 20, 2019
The new system enables authorized vehicle entry into areas reserved for private residential use or corporate tenants, while also allowing the availability of temporary, fee-based visitor parking.

One of the world’s largest business district projects, called Moscow-City, recently announced it will deploy, the UCODE DNA RFID security and parking contactless identification solution.

Established in 1992 and still growing, Moscow-City is the revitalization of an industrial riverfront into a modern upscale business and residential district. Twelve of the twenty-three planned facilities have already been completed, with seven currently under construction. Six skyscrapers in Moscow-City reach a height of at least 300 meters, including Europe’s tallest building, Federation Tower, which rises more than 100 stories.

Partnering with ISBC and deploying FEIG Electronic RFID solutions, Moscow-City is delivering security and access control to its city center today, as it grows into the city of tomorrow.

The management of Moscow-City not only selected long-range, passive UHF RFID to implement in its controlled parking areas, it also chose to implement UCODE DNA, the highest form of secure RAIN RFID technology, developed by NXP Semiconductors.   

“UCODE DNA is considered the only identification technology to match the physical protection of a barrier with the cybersecurity necessary to truly protect entrances from unauthorized access,” said Manuel Haertlé, senior product manager for FEIG Electronic.

FEIG’s partner ISBC Group provided the knowledge and support for this successful implementation using FEIG’s long-range UHF RFID. The resulting system enables authorized vehicle entry into areas reserved for private residential use or corporate tenants, while also allowing the availability of temporary, fee-based visitor parking. Thanks to the cryptographic authentication of UCODE DNA, both the tag and reader must go through an authentication procedure before the reader will validate the data from the tag, which is transmitted wirelessly. This level of authentication is typically used in the most secure data communication networks.

“The system’s two-step authentication means that only authorized equipment can handle the secure protocol and the data exchange with the UCODE DNA based tag,” said Andrey Krasovskiy, director of the RFID department at ISBC Group. “Without the required cryptographic secrets, other readers would query the tag in vain, because the tag’s response cannot be interpreted or understood. On top of this, each data exchange in the authentication process is unique, so even if a malicious actor were to intercept the communication, the transmission is only good for a single exchange and the tag’s unique identity is protected from cloning.”

Latest from Technology & Automation

#177137895@Mustsansar Syed| Dreamstime
AI's Role in Developing Resilient Supply Chains
#146171327 © Kittipong Jirasukhanont| Dreamtime
Warehouse Market to Increase 24% By 2030