You are previewing Security and Trends in Wireless Identification and Sensing Platform Tags.
O'Reilly logo
Security and Trends in Wireless Identification and Sensing Platform Tags

Book Description

Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed. Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Preface
  5. Acknowledgment
  6. Section 1: Fundamentals
    1. Chapter 1: Tag Identification Protocols in RFID Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. WISP TECHNOLOGY
      4. ALOHA-BASED PROTOCOLS
      5. TREE-BASED PROTOCOLS
      6. HYBRID PROTOCOLS
      7. EPCGLOBAL
      8. PERFORMANCE COMPARISON
      9. CONCLUSION
    2. Chapter 2: Security of EPC Class-1
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. CLASS-1 GENERATION-2 SPECIFICATIONS
      5. 4. PRIVACY AND SECURITY
      6. 5. CRYPTOGRAPHIC PRIMITIVES
      7. 6. PROTOCOLS FOR LOW-COST RFID
      8. 7. FUTURE RESEARCH DIRECTIONS
      9. 8. CONCLUSION
  7. Section 2: Security
    1. Chapter 3: Towards Sensing-Enabled RFID Security and Privacy
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SENSING-CENTRIC SECURITY AND PRIVACY: PRINCIPLES AND FEASIBILITY
      5. CONTEXT RECOGNITION
      6. LOCATION-LIMITED COMMUNICATION
      7. RANDOMNESS EXTRACTION
      8. EVALUATION OF SENSING-CENTRIC ATTACKS
      9. DISCUSSION AND CONCLUSION
    2. Chapter 4: RFID Grouping-Proofs
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE SETTING FOR RFID GROUPING-PROOFS
      4. 3. BACKGROUND
      5. 4. ADVERSARIAL MODEL
      6. 5. GUIDELINES FOR SECURE RFID APPLICATIONS
      7. 6. RECENTLY PROPOSED SCHEMES
      8. 7. DISCUSSION ON SECURITY
      9. 8. CONCLUSION
    3. Chapter 5: Elliptic Curve Cryptography on WISPs
      1. ABSTRACT
      2. INTRODUCTION
      3. ELLIPTIC CURVE CRYPTOGRAPHY
      4. WIRELESS IDENTIFICATION AND SENSING PLATFORMS
      5. ECC ON WISPS
      6. RESULTS
      7. COMPARISON WITH RELATED WORK
      8. SECURITY CONSIDERATIONS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    4. Chapter 6: Low Complexity Minimal Instruction Set Computer Design using Anubis Cipher for Wireless Identification and Sensing Platform
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND LITERATURE REVIEW
      4. THE PROPOSED MINIMAL INSTRUCTION SET COMPUTER PROCESSOR FOR ANUBIS
      5. IMPLEMENTATION RESULTS AND DISCUSSIONS
      6. CONCLUSION
      7. FUTURE RESEARCH DIRECTIONS
  8. Section 3: Applications
    1. Chapter 7: Monitoring Sleep with WISP Tags
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. WISP BASED SLEEP MONITORING SYSTEM
      5. EVALUATION: CONTROLLED EXPERIMENTS
      6. CONCLUSION
    2. Chapter 8: WISP-Based Devices as Part of a Home Telecare Node
      1. ABSTRACT
      2. INTRODUCTION
      3. INTEGRATION OF WISP AND RFID DEVICES INTO A HOME TELECARE NODE
      4. APPLICATION AREAS
      5. A CASE STUDY: WISP-BASED DEVICES FOR COMPLIANCE MONITORING
      6. RESULTS
      7. CONCLUSION
      8. DISCUSSION
    3. Chapter 9: Real-Time Traceability with Sensing in RFID Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TRACEABILITY BASED ON WSN AND RFID
      5. RADIO-PROPAGATION ANALYSIS
      6. TRACEABILITY BASED ON SENSOR AREA NETWORKS
      7. WIRELESS IDENTIFICATION AND SENSING PLATFORM
      8. CONCLUSION
    4. Chapter 10: From the Farm to Fork
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PRIVACY AND DATA PROTECTION IMPACT ASSESSMENT FRAMEWORK FOR RFID APPLICATIONS
      5. THE PIA PROCESS
      6. F2F: PILOT
      7. EPCIS: RFID MIDDLEWARE
      8. THE PIA QUESTIONNAIRE FOR F2F PROJECT PILOTS
      9. RFID TAGS, PIA, AND WISP
      10. CONCLUSION
      11. APPENDIX 1: CHARACTERISATION OF THE RFID APPLICATION DESCRIPTION
      12. APPENDIX 2: CHARACTERISATION OF THE RFID APPLICATION DESCRIPTION
      13. APPENDIX 3: PRIVACY RISKS
      14. APPENDIX 4: CHARACTERISATION OF THE RFID APPLICATION DESCRIPTION
  9. Compilation of References
  10. About the Contributors