<P><BLOCKQUOTE>βRFID is the first important technology of the twenty-first century. Thatβs an awesome responsibility. How can we know when and how RFID is being used? How can we make sure it is not misused? How can we exercise choice over how it affects us personally? How do we ensure it is safe? Th
RFID: applications, security, and privacy
β Scribed by Rosenberg, Beth; Garfinkel, Simson
- Publisher
- Addison-Wesley Professional
- Year
- 2005;2006
- Tongue
- English
- Leaves
- 609
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Brings together contributions from stakeholder community - from RFID suppliers to privacy advocates and beyond. This book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet.
β¦ Table of Contents
Cover......Page 1
Contents......Page 6
Foreword......Page 22
Preface......Page 26
Acknowledgments......Page 48
Part I: Principles......Page 54
Introduction......Page 56
A Brief History of AIDC......Page 57
The "Industry" That Isn't......Page 59
The Interconnected World......Page 60
Clear and Present Benefits......Page 61
Future Applications......Page 64
Conclusions......Page 66
RFID Technology......Page 68
RFID Applications......Page 80
Conclusions......Page 88
The Beginning......Page 90
A Mini-Lecture: The Supply Chain......Page 93
The Auto-ID Center......Page 94
Harnessing the Juggernaut......Page 103
Conclusions......Page 107
Introduction......Page 110
Definitions of Privacy......Page 111
Mapping the RFID Discovery Process......Page 115
Privacy as a Fundamental Human Right......Page 118
Privacy Through Data Protection Law and Fair Information Practices......Page 122
Conclusions......Page 133
Introduction......Page 136
Some Current and Proposed RFID Applications......Page 137
Whither Item-Level Tagging?......Page 139
Understanding RFID's Privacy Threats......Page 141
Conclusions......Page 145
Introduction......Page 152
Current State of RFID Policy......Page 154
RFID Policy Issues......Page 158
Government Versus Individual Context......Page 164
Business Versus Individual Context......Page 167
Industry Leadership......Page 172
Options for Government Leadership......Page 173
Snapshot of Current Status......Page 177
Policy Prescriptions......Page 179
The Case for, and Limits of, EPCglobal Leadership......Page 183
Conclusions......Page 186
Introduction......Page 190
A Few Important Concepts in Authentication......Page 191
Authenticity of Tags and Authenticity of Goods......Page 193
Authenticity of Goods and Anticounterfeiting Measures......Page 194
Authentication of Readers......Page 197
Authentication of Users Across the Supply Chain (Federation)......Page 198
Conclusions......Page 200
Introduction......Page 202
Place and Identity in a World of Habits and Symbols......Page 203
Locational Technologies......Page 205
Rethinking Identity: Beyond Traits and Names......Page 210
On RFID......Page 213
Conclusions......Page 214
Introduction......Page 216
A Common Vocabulary......Page 217
Designing and Modifying WID Systems......Page 219
Conclusions......Page 229
Part II: Applications......Page 230
Introduction......Page 232
Interview with Joe Giordano, ExxonMobil Corporation......Page 10
Introduction......Page 242
Logistics and the Military......Page 243
Conclusions......Page 251
Introduction......Page 254
CVS and Auto-ID......Page 255
Project Jump Start......Page 256
Making RFID Work: The Back End......Page 258
Introduction......Page 264
The Hospital......Page 265
Home Eldercare......Page 269
Challenges......Page 274
Conclusions......Page 279
Introduction......Page 282
RFID System Components and Their Effects in Libraries......Page 283
RFID Standards......Page 286
RFID in U.S. Libraries......Page 287
Best-Practices Guidelines for Library Use of RFID......Page 292
Conclusions......Page 294
Introduction......Page 298
RFID Has to Prove Itself......Page 300
Putting RFID to Work......Page 301
RFID and Livestock Marketing......Page 302
RFID World Livestock Roundup......Page 306
Part III: Threats......Page 310
Introduction......Page 312
RFID Tags and the EPC Code......Page 313
A Ubiquitous RFID Reader Network......Page 316
Watching Everything: RFID and the Four Databases It Will Spawn......Page 318
Corporate Abuse......Page 324
Government Abuse......Page 325
Conclusions......Page 326
Introduction......Page 328
Scenario 1: "No One Wins"......Page 330
Scenario 2: "Shangri-La"......Page 331
Scenario 3: "The Wild West"......Page 332
Scenario 4: "Trust but Verify"......Page 333
Conclusions......Page 334
In-Store Scenarios......Page 336
So, Who Wants to Know?......Page 339
Conclusions......Page 343
Introduction......Page 344
Reverse-Engineering the Protocol......Page 345
Security Implications......Page 348
Protecting Against These Types of Attacks......Page 350
Conclusions......Page 353
Bluetooth......Page 356
Bluetooth Security and Privacy Attacks......Page 369
Conclusions......Page 378
Part IV: Technical Solutions......Page 380
Introduction......Page 382
The Technical Challenges of RFID Privacy......Page 384
Blocker Tags......Page 385
Soft Blocking......Page 388
Tags with Pseudonyms......Page 389
Corporate Privacy......Page 390
Conclusions......Page 391
The Problems in RFID Security......Page 394
Conclusions......Page 396
Introduction......Page 400
RFID Recoding and Infomediaries......Page 402
Infrastructure Issues......Page 405
Conclusions......Page 408
Part V: Stakeholder Perspectives......Page 410
Introduction......Page 412
Toll Tracking: Who Knows Where You Are Going?......Page 413
Contactless Payment: Are Safeguards Already in Place?......Page 414
RFID and Automotive Anti-Theft: Staying Ahead of the Security Curve......Page 416
How and What We Communicate......Page 417
Conclusions......Page 419
What Is a Smart Card?......Page 420
Smart Card Communication and Command Format......Page 423
Card Life Cycle......Page 424
Smart Card Applications......Page 425
"Contactless" Cards......Page 426
Protocols and Secure Communication Schemes......Page 427
Constraints of Contactless Products......Page 428
Contactless Products and the Contact Interface......Page 430
Conclusions......Page 433
Payment Applications......Page 434
Inventory Management Applications......Page 436
Hybrid Scanners......Page 442
Privacy Concerns......Page 445
RFID Portal......Page 446
Conclusions......Page 448
Introduction......Page 450
Procter & Gamble's Position......Page 451
RFID Technology and the Supply Chain......Page 452
Global Guidelines for EPC Usage......Page 461
Conclusions......Page 465
Introduction......Page 466
After the Point of Sale: Nonconsumer Goods......Page 467
After the Point of Sale: Consumer Goods......Page 468
After the Point of Sale: Privacy Interests......Page 469
Eliminating the RFID Threats to Privacy......Page 472
Conclusions......Page 481
Introduction......Page 484
RFID Characteristics That Threaten Privacy......Page 485
Proposed Technology-Based Solutions......Page 486
Calling for a Technology Assessment......Page 487
Conclusions......Page 490
Introduction......Page 492
The Surveillance Society: It's Already Here......Page 493
A Trick to Overcome Resistance......Page 494
Constituents to Changeβand to Stasis......Page 495
Privacy Advocates Own This Story......Page 497
Privacy, Change, and Language......Page 498
How to Make Consumers Demand Change (and RFID)......Page 500
Conclusions......Page 502
Factors Separating Western and Asian RFID Experience......Page 504
The Extant Paper Database and Electronic Credit Card Systems......Page 508
RFID in India......Page 509
RFID Across Asia......Page 514
Conclusions......Page 518
Introduction......Page 520
An Overview of Wireless Services Penetration into Central America......Page 521
Pervasiveness of Telecommunications in Central America......Page 523
Privacy Concerns......Page 526
An Overview of Privacy Across Latin America......Page 528
Conclusions: Privacy, Poverty, and the Future......Page 530
Appendixes......Page 532
Appendix A: Position Statement on the Use of RFID on Consumer Products......Page 534
Appendix B: RFID and the Construction of Privacy: Why Mandatory Kill Is Necessary......Page 550
Appendix C: Guidelines for Privacy Protection on Electronic Tags of Japan......Page 560
Appendix D: Adapting Fair Information Practices to Low-Cost RFID Systems......Page 568
Appendix E: Guidelines on EPC for Consumer Products......Page 578
Appendix F: Realizing the Mandate: RFID at Wal-Mart......Page 582
A......Page 588
B......Page 589
C......Page 590
E......Page 592
F......Page 593
H......Page 594
K......Page 595
L......Page 596
M......Page 597
P......Page 598
R......Page 601
S......Page 602
T......Page 604
W......Page 607
Z......Page 608
π SIMILAR VOLUMES
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worldβs largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its pote
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: βThere must exist better solutions. β I c- cerned myself with the topic in my spare time. A
<p>As modern technologies continue to transform and impact our society, Radio Frequency Identification has emerged as one of the top areas of study to do just that. Using its wireless data capturing technique and incredible capabilities such as automatic identification, tracking, handling large amou
<p><p></p><p>This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018.</p><p>The 16 full papers and 5 short papers presented were carefully reviewed