The wiegand Protocol

Wiegand protocol is named after John R. Wiegand. He discovered the Wiegand effect. Which is a physical phenomenon in which a special wire produces small magnetic fields. So this magnetic effect is used to transmit information.

Indeed, over 90% of access control systems use the Wiegand protocol. This is the most common communication method to send information from the card reader to the controller.

The wiegand technology can also refer to the coding format of the card

Wiegand protocol

The Wiegand interface consists of a wire of three conductors called Data 0 (Green). Data 1 (White). And Ground (Black). It is a Wiegand wire.

Actually, John Wiegand revolutionized the access control industry in late 1970s with several new inventions based on “Wiegand Wire.”

He also created the Wiegand card by embedding 26 small pieces of wire within the base of the credential. Then Hi designed Wiegand reader to interpret the arrangement of the wires as someone swipes the card or approaches it to the reader.

In addition to this, he developed the Wiegand protocol as a way for the reader to send card data to the system where authorized credential values were stored.

The wire transmits either +5 VDC or 0 VDC signal as 1’s and 0’s, respectively, creating a binary data line for authenticating the scanned card’s credentials.

The 26-bit Wiegand format is the original and it is the most used. The diagram below shows its format

wiegand protocol 26 bit format
Wiegand protocol 26 bits fofrmat

Limitation of Wiegand protocol

  • There is no encryption of data transfer on wiegand protocol. This makes hacking easier
  • The communication in wiegand protocol is unidirectional. As a result, the system is not able to re-quest status from the reader. It is also impossible to update the devices collectively, for example we need to update the readers manually. Therfore, it will not be an easy thing when it comes to a site with several readers

Conclusion

Wiegand technology revolutionised the security system industry since the 80’s.  Most of security are working with this technology. Still it suffers from big vulnerabilities. As a result, it is obvious that for reader technology and capabilities to progress.

Access control actors recognized this need and came up with many solutions and a possible alternative such as an OSDP protocol (Open Supervised Device Protocol)

Read our post on readers and card readers

Read our article on OSDP communication protocol

About Yazid

Check Also

access control management

How to manage a Physical Access Control

In many structured companies, physical access control is managed by the security department. So, security …

2 comments

  1. Valuable info. Lucky me I found your site by accident, and I’m shocked why this accident did not happened earlier! I bookmarked it.