<p><P>RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamen
RFID Security: Techniques, Protocols and System-On-Chip Design
β Scribed by Andreas Hagl, Konstantin Aslanidis (auth.), Paris Kitsos, Yan Zhang (eds.)
- Publisher
- Springer US
- Year
- 2009
- Tongue
- English
- Leaves
- 441
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
RFID Security: Techniques, Protocols and System-on-Chip Design focuses on the security issues in RFID systems, recent advances in RFID security, attacks and solutions, security techniques, and practical hardware implementation of cryptography algorithms. This book includes coverage of fundamentals, security protocols and techniques, and hardware implementations of cryptographic algorithms dedicated to RFID.
Features of the book consist of
- basic concepts, key technologies, and cutting-edge research outcomes of RFID security
- comprehensive references on state-of-the-art technologies for RFID security
- illustrative figures for easy reading and understanding of the materials
- implementations for algorithms in RFID security
- selected techniques for enhancing RFID security and performance.
The book is written for those interested in wireless networks and mobile communications, especially researchers and engineers interested in communications as it relates to RFID Security.
β¦ Table of Contents
Front Matter....Pages i-xii
RFID: Fundamentals and Applications....Pages 3-26
RFID: An Anticounterfeiting Tool....Pages 27-55
RFID Security and Privacy....Pages 57-79
Design Trade-Offs for Realistic Privacy....Pages 83-101
RFID Security: Cryptography and Physics Perspectives....Pages 103-130
RFID Anticounterfeiting: An Architectural Perspective....Pages 131-146
An Efficient and Secure RFID Security Method with Ownership Transfer....Pages 147-176
Digital Signature Transponder....Pages 177-189
Scalability Issues in Privacy-Compliant RFID Protocols....Pages 191-228
Dynamic Privacy Protection for Mobile RFID Service....Pages 229-254
Using RFID-based βTouchβ for Intuitive User Interaction with Smart Space Security....Pages 255-287
RFID Readers Deployment for Scalable Identification of Private Tags....Pages 289-314
Public-Key Cryptography for RFID Tags and Applications....Pages 317-348
New Designs in Lightweight Symmetric Encryption....Pages 349-371
Hardware Implementation of Symmetric Algorithms for RFID Security....Pages 373-415
Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security....Pages 417-433
Back Matter....Pages 435-443
β¦ Subjects
Circuits and Systems; Signal, Image and Speech Processing; Communications Engineering, Networks; Data Encryption; Electronics and Microelectronics, Instrumentation; Computer Communication Networks
π SIMILAR VOLUMES
<p><span>RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID
<p><span>Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localizat
<p><p>This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs β current industrial practice, as well as emerging approaches to architecting SoC security policies and security pol
<p><p>This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will lear