RFID Security and Privacy: Concepts, Protocols, and Architectures

Portada
Springer Science & Business Media, 2008 M04 18 - 269 páginas
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better solutions. ” I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ̈ , whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security,privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ̈ supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own.
 

Comentarios de la gente - Escribir un comentario

No encontramos ningún comentario en los lugares habituales.

Contenido

Motivation and Vision
3
Fundamentals
7
211 RFID History
9
213 RFID Readers
12
214 Communication Between Tags and Readers
13
215 RFID Backend Systems and Middleware
18
216 RFID Overall System
20
217 RFID Summary
23
46 Additional Building Blocks
120
462 Evaluating Lower Layer Information
121
47 Evaluation Criteria
124
48 Hashbased ID Variation
128
482 Protocol Realization
130
483 Security Analysis
133
484 Variants
140
485 Evaluation
141

221 Properties of Secure Systems
24
223 Security by Design
26
23 Privacy
27
232 Defining Privacy
28
233 The Importance of Privacy
30
234 Privacy Today
31
235 Current Development
32
236 Perception of Privacy
35
237 Regulation Approaches
40
238 Design Guidelines for Technical Regulation
42
239 Privacy Summary
45
241 SymmetricKey Cryptography
46
243 Hash Functions
47
244 Random Number Generation
51
246 Cryptographic Primitives Summary
55
Analysis and Modeling
57
31 Motivating Examples
58
32 Threats
60
33 Goals
64
34 Challenges
65
35 Attacker Capabilities
67
36 Attacks on RFID Systems
73
37 Current Situation
75
372 Assessment of EPC and Gen II Tags
76
38 Assessment of RFID Security and Privacy
79
39 Summary
80
Securing RFID Systems
81
41 Data Management
82
42 Discussion of Security and Privacy Goals
83
43 Overview of Functionality Regarding Tags
86
44 Implementation Considerations
87
442 Primitives for Implementation
88
45 Discussion of Basic Functionality
90
451 Identification
91
452 Authentication
94
453 Modification
112
486 Hashbased ID Variation Summary
143
Pseudonymization Infrastructures
145
52 Basic Idea for Addressing the Problem
146
Introduction and Related Work
147
54 Definition of Requirements and Common Concepts
151
55 Attack Targets and Attacker Capabilities
153
56 Approach Based on Asymmetric Encryption
155
57 Basic Approach Based on Hash Functions
160
58 Advanced Approach Based on Hash Functions
167
59 Hash Collisions and Pseudonym Shortening in HashBased Approaches
176
510 Summary and Research Directions
178
Extending the RFID System Model
180
61 Classic RFID Model
182
62 Untrusted Reading Entities
183
63 Tag Bearer as Additional Entity
187
64 Personal Manager
190
65 Assembling the Building Blocks
194
66 Summary
196
Current Research
199
712 Policy Restricted KeyValue Pair Authentication
208
72 IDZone Architecture
213
721 Consideration of Requirements
214
722 The Concept of Location Zones
215
723 Device Identifiers and Certificates
216
724 Basic Considerations Regarding Tag Identifiers
217
725 Architectural Overview
218
726 Procedure of Tag Identifier Alterations
221
727 Elaboration of the IDZone Architecture
224
728 Evaluation
240
729 IDZone Architecture Summary
244
73 Summary
245
List of Figures
247
List of Tables
250
References
253
Index
265
Derechos de autor

Otras ediciones - Ver todas

Términos y frases comunes

Pasajes populares

Página 3 - The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.
Página 260 - D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In B.

Información bibliográfica