Fundamentals.- RFID: Fundamentals and Applications.- RFID: An Anticounterfeiting Tool.- RFID Security and Privacy.- Security Protocols and Techniques.- Design Trade-Offs for Realistic Privacy.- RFID Security: Cryptography and Physics Perspectives.- RFID Anticounterfeiting: An Architectural Perspective.- An Efficient and Secure RFID Security Method with Ownership Transfer.- Digital Signature Transponder.- Scalability Issues in Privacy-Compliant RFID Protocols.- Dynamic Privacy Protection for Mobile RFID Service.- Using RFID-based "Touch" for Intuitive User Interaction with Smart Space Security.- RFID Readers Deployment for Scalable Identification of Private Tags.- Encryption and Hardware Implementations.- Public-Key Cryptography for RFID Tags and Applications.- New Designs in Lightweight Symmetric Encryption.- Hardware Implementation of Symmetric Algorithms for RFID Security.- Hardware Implementation of a TEA-Based Lightweight Encryption for RFID Security.
Introduction.- Part I.- RFID Security and privacy.- RFID chips.- Part II.- Techniques and Protocols.- RFID anti-counterfeiting.- Man-in-the-middle attacks on RFID systems.- Digital Signature Transponder.- Combining Physics and Cryptography to Enhance Privacy in RFID Systems.- Scalability Issues in Large-Scale Applications.- An Efficient and Secure RFID Security Method with Ownership Transfe.- Policy-based Dynamic Privacy Protection Framework leveraging Globally Mobile RFIDs.- User-Centric Security for RFID-based Distributed Systems.- Optimizing RFID protocols for Low Information Leakage.- RFID: an anti-counterfeiting tool.- Part III.- Hardware implementation and Cryptography.- Light Weight Cryptography for RFID.- Hardware implementation of symmetric algorithms for RFID security.- Hardware-based Privacy Enhancing Technology for RFID.- Public-key Cryptography for RFID tags.- Unclonable RFID Tags and Their Hardware Implementation.- Low-cost Cryptographic Algorithms for RFID.- Implementation of Low Power Hardware Encryption Core for Low Cost Secure RFID Using Tiny Encryption Algorithm (TEA).
This is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. It is the first book to comprehensively cover RFID security issues and solutions. Part 1 deals with RFID fundamentals. Part 2 addresses RFID security protocols and techniques. Finally, the book discusses hardware implementation of security algorithms and protocols dedicated to RFID platforms and chips.
The first book to comprehensively cover RFID security issues and solutions
Provides a reference for engineers to develop efficient security algorithms in practical RFID systems
Provides a comprehensive reference on state-of-the-art technologies for RFID security
Details the hardware implementation for the algorithms and protocols in RFID security
Allows easy cross-referencing via the broad coverage on a variety of security issues and solutions