You are previewing Advanced Security and Privacy for RFID Technologies.
O'Reilly logo
Advanced Security and Privacy for RFID Technologies

Book Description

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book’s expansive coverage on the topic.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  5. Dedication
  6. Preface
    1. SECTION 1: BACKGROUND AND PRELIMINARIES
    2. SECTION 2: ATTACKS
    3. SECTION 3: EXISTING SOLUTIONS
    4. SECTION 4: PRIVACY
  7. Section 1: Background and Preliminaries
    1. Chapter 1: Security Terminology
      1. ABSTRACT
      2. 1.1 BACKGROUND
      3. 1.2 KEY SHARING
      4. 1.3 SECURITY REQUIREMENTS
      5. 1.4 MEASURING SECURITY
      6. SUMMARY
    2. Chapter 2: RFID Standards
      1. ABSTRACT
      2. 2.1 INTRODUCTION
      3. 2.2 AN OVERVIEW OF RFID SYSTEMS
      4. 2.3 RFID STANDARDS ORGANIZATIONS
      5. 2.4 MAJOR RFID STANDARDS
      6. 2.5 CLASSIFICATION OF RFID RELATED STANDARDS
      7. CONCLUSION
  8. Section 2: Attacks
    1. Chapter 3: RFID Wireless Link Threats
      1. ABSTRACT
      2. 3.1 INTRODUCTION
      3. 3.2 EAVESDROPPING ATTACKS
      4. 3.3 TAMPERING
      5. 3.4 SESSION HIJACKING
      6. 3.5 REPLAY ATTACK
      7. 3.6 RELAY ATTACKS
      8. CONCLUSION
    2. Chapter 4: Hardware Attacks
      1. ABSTRACT
      2. 4.1 BACKGROUND
      3. 4.2 CLONING ATTACK
      4. 4.3 DIRECT READ
      5. 4.4 SIDE CHANNEL ATTACK
      6. 4.5 PHYSICAL TAMPERING
      7. 4.6 HARDWARE PROTECTION
      8. CONCLUSION
    3. Chapter 5: Computer System Attacks
      1. ABSTRACT
      2. 5.1 INTRODUCTION
      3. 5.2 ATTACKS ON TAGS
      4. 5.3 ATTACKS ON READERS
      5. 5.5 ATTACKS ON MIDDLEWARE
      6. 5.5 ATTACKS ON BACK-END SYSTEMS
      7. 5.6 ATTACKS ON WIRED LINKS
      8. 5.7 DOS ATTACKS
      9. CONCLUSION
      10. FUTURE RESEARCH DIRECTIONS
  9. Section 3: Existing Solutions
    1. Chapter 6: An Overview of Cryptography
      1. ABSTRACT
      2. 6.1 INTRODUCTION
      3. 6.2 NUMBER THEORETIC PRELIMINARIES
      4. 6.3 A CRYPTOGRAPHIC TOOLKIT
      5. 6.4 ONE-WAY PROBLEMS FOR CRYPTOGRAPHY
      6. 6.5 CRYPTOGRAPHIC PROTOCOLS
      7. 6.6 LIGHTWEIGHT CRYPTOGRAPHY
      8. CONCLUSION
    2. Chapter 7: Identification and Authentication for RFID Systems
      1. ABSTRACT
      2. BACKGROUND
      3. 7.1 IDENTIFICATION IN RFID SYSTEMS
      4. 7.2 AUTHENTICATION IN RFID SYSTEMS
      5. 7.3 SYMMETRIC AUTHENTICATION SCHEMES
      6. 7.4 ASYMMETRIC AUTHENTICATION SCHEMES
      7. 7.5 SPECIALLY-DESIGNED AUTHENTICATION SCHEMES
      8. 7.6 NON-CRYPTOGRAPHIC SOLUTIONS
      9. CONCLUSION
  10. Section 4: Privacy
    1. Chapter 8: Privacy Issues in RFID
      1. ABSTRACT
      2. 8.1 INTRODUCTION
      3. 8.2 RFID PRIVACY ISSUES
      4. 8.3 RFID PRIVACY MODELS
      5. 8.4 FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 9: DoS Attacks on RFID Systems
      1. ABSTRACT
      2. 9.1 INTRODUCTION
      3. 9.2 BACKGROUND
      4. 9.3 DENIAL-OF-SERVICE ATTACKS ON PRIVACY-PRESERVING RFID AUTHENTICATION PROTOCOLS AND COUNTERMEASURES
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    3. Chapter 10: Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network
      1. ABSTRACT
      2. 10.1 INTRODUCTION
      3. 10.2 BACKGROUND
      4. 10.3 RFSCREEN
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. APPENDIX: ADDITIONAL RESOURCES
    4. Chapter 11: Addressing Covert Channel Attacks in RFID-Enabled Supply Chains
      1. ABSTRACT
      2. 11.1 INTRODUCTION
      3. 11.2 BACKGROUND
      4. 11.3 THREATS IN RFID-ENABLED SUPPLY CHAINS
      5. 11.4 SUPPLY CHAIN MODEL
      6. 11.5 EVALUATION AND ANALYSIS
      7. 11.6 RESPONSES TO COVERT CHANNELS
      8. CONCLUSION
    5. Chapter 12: Building Scalable, Private RFID Systems
      1. ABSTRACT
      2. 12.1 OVERVIEW
      3. 12.2 PRIVACY-PRESERVATION IN RFID SYSTEMS
      4. 12.3 FORMAL PRIVACY MODELS FOR RFID SYSTEMS
      5. FUTURE RESEARCH AND RECOMMENDATIONS
      6. CONCLUSION
  11. Compilation of References
  12. About the Contributors