E-Book, Englisch, 275 Seiten
Henrici RFID Security and Privacy
1. Auflage 2008
ISBN: 978-3-540-79076-1
Verlag: Springer-Verlag
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Concepts, Protocols, and Architectures
E-Book, Englisch, 275 Seiten
ISBN: 978-3-540-79076-1
Verlag: Springer-Verlag
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: 'There must exist better solutions. ' I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ¨ , whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security,privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ¨ supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;6
2;Contents;8
3;Outline;11
4;1 Motivation and Vision;13
5;2 Fundamentals;17
5.1;2.1 Radio-Frequency Identification;17
5.2;2.2 Security;33
5.3;2.3 Privacy;37
5.4;2.4 Cryptographic Primitives;55
5.5;2.5 Summary;65
6;3 Analysis and Modeling;67
6.1;3.1 Motivating Examples;68
6.2;3.2 Threats;70
6.3;3.3 Goals;74
6.4;3.4 Challenges;75
6.5;3.5 Attacker Capabilities;77
6.6;3.6 Attacks on RFID Systems;83
6.7;3.7 Current Situation;85
6.8;3.8 Assessment of RFID Security and Privacy;89
6.9;3.9 Summary;90
7;4 Securing RFID Systems;91
7.1;4.1 Data Management;92
7.2;4.2 Discussion of Security and Privacy Goals;93
7.3;4.3 Overview of Functionality Regarding Tags;96
7.4;4.4 Implementation Considerations;97
7.5;4.5 Discussion of Basic Functionality;100
7.6;4.6 Additional Building Blocks;130
7.7;4.7 Evaluation Criteria;134
7.8;4.8 Hash-based ID Variation;138
7.9;4.9 Summary;153
8;5 Pseudonymization Infrastructures;155
8.1;5.1 Motivation;155
8.2;5.2 Basic Idea for Addressing the Problem;156
8.3;5.3 Pseudonymization: Introduction and Related Work;157
8.4;5.4 Definition of Requirements and Common Concepts;161
8.5;5.5 Attack Targets and Attacker Capabilities;163
8.6;5.6 Approach Based on Asymmetric Encryption;165
8.7;5.7 Basic Approach Based on Hash Functions;170
8.8;5.8 Advanced Approach Based on Hash Functions;177
8.9;5.9 Hash Collisions and Pseudonym Shortening in Hash-Based Approaches;186
8.10;5.10 Summary and Research Directions;188
9;6 Extending the RFID System Model;190
9.1;6.1 Classic RFID Model;191
9.2;6.2 Untrusted Reading Entities;192
9.3;6.3 Tag Bearer as Additional Entity;196
9.4;6.4 Personal Manager;199
9.5;6.5 Assembling the Building Blocks;203
9.6;6.6 Summary;205
10;7 Current Research;207
10.1;7.1 Partial Solutions;207
10.2;7.2 ID-Zone Architecture;221
10.3;7.3 Summary;253
11;List of Figures;255
12;List of Tables;258
13;References;259
14;Index;271




