Proximity Sensor Monitoring
Definition
Monitoring events from proximity sensors that indicate a credential or tagged asset is within the sensor’s read range or a defined zone. Common enabling technologies include RFID, Bluetooth Low Energy (BLE), and Ultra-Wideband (UWB).
Synonyms: RFID Reader Monitoring, Proximity Reader Monitoring.How it works
Proximity readers and sensors detect credentials or tagged assets within their read field, then report presence and, when applicable, authenticate to a controller for access decisions. Systems may use RSSI, dwell time, or time-of-flight to enforce zones and policies such as anti-passback. Secure, authenticated communication between readers and controllers helps prevent cloning and replay attacks.
Considerations
- Place readers and align antennas to achieve consistent read ranges; account for materials like metal and liquids that can detune signals.
- Use cryptographic credentials with mutual authentication and encrypted, supervised reader links to mitigate cloning and relay attacks.
- Protect privacy by minimizing collected data, limiting retention, and restricting access to proximity logs.
- Calibrate detection thresholds and zone boundaries; re-test after layout changes or equipment moves.
- Monitor reader and tag health, including battery status for BLE and UWB tags and supervision signals for wired and wireless devices.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
References
The following references were used to develop the Proximity Sensor Monitoring knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)