In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: βThere must exist better solutions. β I c- cerned myself with the topic in my spare time. A
RFID Security and Privacy: Concepts, Protocols, and Architectures (Lecture Notes Electrical Engineering)
β Scribed by Dirk Henrici
- Publisher
- Springer
- Year
- 2008
- Tongue
- English
- Leaves
- 275
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The vision of a world in which privacy persists and security is ensured but the full potential of the technology is nevertheless tapped guides this work. It is argued that security and privacy can be ensured using technical safeguards if the whole RFID system is designed properly. The challenge is immense since many constraints exist for providing security and privacy in RFID systems: technically and economically but also ethically and socially. Not only security and privacy needs to be provided but the solutions also need to be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and lasting. After analyzing the problem area in detail, this work introduces a number of new concepts and protocols that provide security and ensure privacy in RFID systems by technical means. The classic RFID model is extended and considerations in new directions are taken. This leads to innovative solutions with advantageous characteristics. Finally, a comprehensive framework including required protocols for operation is proposed. It can be used within a global scope, supports inter-organizational cooperation and data sharing, and adheres to all the architectural guidelines derived in this work. Security and privacy is provided by technical means in an economic manner. Altogether, the goal of building scalable and efficient RFID systems on a global, inter-organizational scale without neglecting security and privacy has been achieved well.
β¦ Table of Contents
Cover......Page 1
Lecture Notes Electrical Engineering Volume 17......Page 2
RFID Security and Privacy......Page 3
Copyright......Page 4
Preface......Page 6
Contents......Page 8
Outline......Page 11
1 Motivation and Vision......Page 13
2 Fundamentals......Page 17
3 Analysis and Modeling......Page 67
4 Securing RFID Systems......Page 91
5 Pseudonymization Infrastructures......Page 155
6 Extending the RFID System Model......Page 190
7 Current Research......Page 207
List of Figures......Page 255
List of Tables......Page 258
References......Page 259
Index......Page 271
π SIMILAR VOLUMES
<p>Β This book consists of refereed selected papers from the International Conference on Security & Privacy β ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and c
<p><span>This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blo
<p><span>This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blo
<p><span>This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blo
This volume contains contributions from prominent researchers who participated in the 2007 IAENG International Conference on Operations Research. Topics covered include quality management systems, reliability and quality control, engineering experimental design, computer supported collaborative engi