Henrici | RFID Security and Privacy | E-Book | www.sack.de
E-Book

E-Book, Englisch, 275 Seiten

Henrici RFID Security and Privacy

Concepts, Protocols, and Architectures
1. Auflage 2008
ISBN: 978-3-540-79076-1
Verlag: Springer-Verlag
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Concepts, Protocols, and Architectures

E-Book, Englisch, 275 Seiten

ISBN: 978-3-540-79076-1
Verlag: Springer-Verlag
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: 'There must exist better solutions. ' I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ¨ , whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security,privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ¨ supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own.

Henrici RFID Security and Privacy jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Preface;6
2;Contents;8
3;Outline;11
4;1 Motivation and Vision;13
5;2 Fundamentals;17
5.1;2.1 Radio-Frequency Identification;17
5.2;2.2 Security;33
5.3;2.3 Privacy;37
5.4;2.4 Cryptographic Primitives;55
5.5;2.5 Summary;65
6;3 Analysis and Modeling;67
6.1;3.1 Motivating Examples;68
6.2;3.2 Threats;70
6.3;3.3 Goals;74
6.4;3.4 Challenges;75
6.5;3.5 Attacker Capabilities;77
6.6;3.6 Attacks on RFID Systems;83
6.7;3.7 Current Situation;85
6.8;3.8 Assessment of RFID Security and Privacy;89
6.9;3.9 Summary;90
7;4 Securing RFID Systems;91
7.1;4.1 Data Management;92
7.2;4.2 Discussion of Security and Privacy Goals;93
7.3;4.3 Overview of Functionality Regarding Tags;96
7.4;4.4 Implementation Considerations;97
7.5;4.5 Discussion of Basic Functionality;100
7.6;4.6 Additional Building Blocks;130
7.7;4.7 Evaluation Criteria;134
7.8;4.8 Hash-based ID Variation;138
7.9;4.9 Summary;153
8;5 Pseudonymization Infrastructures;155
8.1;5.1 Motivation;155
8.2;5.2 Basic Idea for Addressing the Problem;156
8.3;5.3 Pseudonymization: Introduction and Related Work;157
8.4;5.4 Definition of Requirements and Common Concepts;161
8.5;5.5 Attack Targets and Attacker Capabilities;163
8.6;5.6 Approach Based on Asymmetric Encryption;165
8.7;5.7 Basic Approach Based on Hash Functions;170
8.8;5.8 Advanced Approach Based on Hash Functions;177
8.9;5.9 Hash Collisions and Pseudonym Shortening in Hash-Based Approaches;186
8.10;5.10 Summary and Research Directions;188
9;6 Extending the RFID System Model;190
9.1;6.1 Classic RFID Model;191
9.2;6.2 Untrusted Reading Entities;192
9.3;6.3 Tag Bearer as Additional Entity;196
9.4;6.4 Personal Manager;199
9.5;6.5 Assembling the Building Blocks;203
9.6;6.6 Summary;205
10;7 Current Research;207
10.1;7.1 Partial Solutions;207
10.2;7.2 ID-Zone Architecture;221
10.3;7.3 Summary;253
11;List of Figures;255
12;List of Tables;258
13;References;259
14;Index;271



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.