Limit search to available items
Book Cover
E-book
Author Henrici, Dirk

Title RFID security and privacy : concepts, protocols, and architectures / Dirk Henrici
Published Berlin : Springer, ©2008

Copies

Description 1 online resource (284 pages) : illustrations
Series Lecture notes in electrical engineering ; v. 17
Lecture notes in electrical engineering ; v. 17.
Contents Cover -- Contents -- Outline -- 1 Motivation and Vision -- 2 Fundamentals -- 2.1 RFID -- 2.1.1 History -- 2.1.2 Tags -- 2.1.3 RFID Readers -- 2.1.4 RFID Communication -- 2.1.5 Backend/Middleware -- 2.1.6 Overall System -- 2.1.7 Summary -- 2.2 Security -- 2.2.1 Properties of Secure Systems -- 2.2.2 Safeguards -- 2.2.3 Security by Design -- 2.2.4 Security Summary -- 2.3 Privacy -- 2.3.1 Historical Overview -- 2.3.2 Defining Privacy -- 2.3.3 The Importance of Privacy -- 2.3.4 Privacy Today -- 2.3.5 Current Development -- 2.3.6 Perception of Privacy -- 2.3.7 Regulation Approaches -- 2.3.8 Design Guidelines for Technical Regulation -- 2.3.9 Privacy Summary -- 2.4 Cryptographic Primitives -- 2.4.1 Symmetric-Key Cryptography -- 2.4.2 Public-Key Cryptography -- 2.4.3 Hash Functions -- 2.4.4 Random Number Generation -- 2.4.5 Implementation Considerations -- 2.4.6 Cryptographic Primitives Summary -- 2.5 Summary -- 3 Analysis and Modeling -- 3.1 Motivating Examples -- 3.2 Threats -- 3.3 Goals -- 3.4 Challenges -- 3.5 Attacker Capabilities -- 3.6 Attacks on RFID Systems -- 3.7 Current Situation -- 3.7.1 Regulation Approaches -- 3.7.2 Assessment of EPC and Gen II Tags -- 3.8 Assessment of RFID Security and Privacy -- 3.9 Summary -- 4 Securing RFID Systems -- 4.1 Data Management -- 4.2 Discussion of Security and Privacy Goals -- 4.3 Overview of Functionality Regarding Tags -- 4.4 Implementation Considerations -- 4.4.1 Limitations for Implementation -- 4.4.2 Primitives for Implementation -- 4.5 Discussion of Basic Functionality -- 4.5.1 Identification -- 4.5.2 Authentication -- 4.5.3 Modification -- 4.6 Additional Building Blocks -- 4.6.1 Distinguishing Different Tag States -- 4.6.2 Evaluating Lower Layer Information -- 4.6.3 Alternative Communication Channels -- 4.7 Evaluation Criteria -- 4.8 Hash-based ID Variation -- 4.8.1 Basic Concepts -- 4.8.2 Protocol Realization -- 4.8.3 Security Analysis -- 4.8.4 Variants -- 4.8.5 Evaluation -- 4.8.6 Hash-based ID Variation Summary -- 4.9 Summary -- 5 Pseudonymization Infrastructures -- 5.1 Motivation -- 5.2 Basic Idea for Addressing the Problem -- 5.3 Pseudonymization: Introduction and Related Work -- 5.4 Definition of Requirements and Common Concepts -- 5.5 Attack Targets and Attacker Capabilities -- 5.6 Approach Based on Asymmetric Encryption -- 5.7 Basic Approach Based on Hash Functions -- 5.8 Advanced Approach Based on Hash Functions -- 5.9 Hash Collisions and Pseudonym Shortening in Hash-Based Approaches -- 5.10 Summary -- 6 Extending the RFID System Model -- 6.1 Classic RFID Model -- 6.2 Untrusted Reading Entities -- 6.3 Tag Bearer as Additional Entity -- 6.4 Personal Manager -- 6.5 Assembling the Building Blocks -- 6.6 Summary -- 7 Current Research -- 7.1 Partial Solutions -- 7.1.1 Identifier Modification Based on Triggered Hash Chains -- 7.1.2 Policy Restricted Key-Value Pair Authentication -- 7.2 ID-Zone Architecture -- 7.2.1 Consideration of Requirements -- 7.2.2 The Concept of Location Zones -- 7.2.3 Device Identifiers and Certificates -- 7.2.4 Basic Considerations Regarding Tag Identifiers -- 7.2.5 Architectural Overview -- 7.2.6 Procedure of Tag Identifier Alterati
Summary The vision of a world in which privacy persists and security is ensured but the full potential of the technology is nevertheless tapped guides this work. It is argued that security and privacy can be ensured using technical safeguards if the whole RFID system is designed properly. The challenge is immense since many constraints exist for providing security and privacy in RFID systems: technically and economically but also ethically and socially. Not only security and privacy needs to be provided but the solutions also need to be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and lasting. After analyzing the problem area in detail, this work introduces a number of new concepts and protocols that provide security and ensure privacy in RFID systems by technical means. The classic RFID model is extended and considerations in new directions are taken. This leads to innovative solutions with advantageous characteristics. Finally, a comprehensive framework including required protocols for operation is proposed. It can be used within a global scope, supports inter-organizational cooperation and data sharing, and adheres to all the architectural guidelines derived in this work. Security and privacy is provided by technical means in an economic manner. Altogether, the goal of building scalable and efficient RFID systems on a global, inter-organizational scale without neglecting security and privacy has been achieved well
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Radio frequency identification systems.
COMPUTERS -- Information Theory.
TECHNOLOGY & ENGINEERING -- Signals & Signal Processing.
Ingénierie.
Radio frequency identification systems
Form Electronic book
ISBN 9783540790761
3540790764
9783540790754
3540790756
Other Titles Radio frequency identification security and privacy