Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Normal view MARC view ISBD view

RFID security and privacy /

By: Li, Yingjiu [author.].
Contributor(s): Deng, Robert H [author.] | Bertino, Elisa [author.].
Material type: materialTypeLabelBookSeries: Synthesis digital library of engineering and computer science: ; Synthesis lectures on information security, privacy, and trust: # 7.Publisher: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, 2014.Description: 1 PDF (xiii, 143 pages) : illustrations.Content type: text Media type: electronic Carrier type: online resourceISBN: 9781627053266.Subject(s): Radio frequency identification systems -- Security measures | RFID technology | RFID system | RFID security | RFID privacy | authentication | access control | EPCglobal NetworkDDC classification: 006.245 Online resources: Abstract with links to resource | Abstract with links to full text Also available in print.
Contents:
1. Introduction -- 1.1 RFID technology -- 1.2 RFID technology at the physical level -- 1.3 RFID technology at the network level -- 1.4 RFID security and privacy --
2. RFID security at the physical level -- 2.1 Tag/reader/mutual authentication -- 2.1.1 Public key solutions -- 2.1.2 Symmetric key solutions -- 2.1.3 Hash-based solutions -- 2.1.4 Lightweight solutions -- 2.1.5 Radio frequency distance bounding -- 2.2 Key distribution -- 2.2.1 Secret sharing across space and time -- 2.2.2 Resilient secret sharing -- 2.3 Path authentication -- 2.3.1 TRACKER -- 2.3.2 Other path authentication solutions -- 2.4 Clone tag detection --
3. RFID privacy at the physical level -- 3.1 Indistinguishability-based privacy and unpredictability-based privacy -- 3.1.1 Preliminaries -- 3.1.2 Indistinguishability-based privacy -- 3.1.3 Unpredictability-based privacy -- 3.1.4 Improvements of Unp-privacy model -- 3.1.5 Relation between Unp-privacy and Ind-privacy -- 3.1.6 Minimal requirement on RFID tags for Unp-privacy -- 3.2 Zero-knowledge-based privacy -- 3.2.1 Preliminaries -- 3.2.2 Model of RFID system -- 3.2.3 ZK-privacy -- 3.2.4 Discussions -- 3.2.5 Comparisons with Ind-privacy and Unp-privacy -- 3.2.6 An RFID mutual authentication protocol with ZK-privacy -- 3.3 Vaudenay's privacy framework -- 3.4 Universal composibility-based privacy -- 3.5 Privacy in path authentication -- 3.5.1 Multi-reader system and adversary model -- 3.5.2 Tag unlinkability and step unlinkability -- 3.5.3 Path privacy -- 3.5.4 Path authentication schemes with privacy -- 3.6 Privacy in ownership transfer --
4. RFID security at the network level -- 4.1 Background -- 4.2 Access control policies in EPCglobal network -- 4.3 Access control enforcement in EPCDS -- 4.4 Access control enforcement in EPCIS -- 4.5 Defence against false event injection in EPCDS --
5. RFID privacy at the network level -- 5.1 Anonymity of tag id in EPCDS -- 5.2 Anti-tracing of tag ID in EPCDS -- 5.2.1 Unauthorized tracing mitigation -- 5.2.2 Access control and key management -- 5.2.3 Compatibility and performance issues --
6. Summary and future directions -- Bibliography -- Authors' biographies.
Abstract: As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
E books E books PK Kelkar Library, IIT Kanpur
Available EBKE551
Total holds: 0

Mode of access: World Wide Web.

System requirements: Adobe Acrobat Reader.

Part of: Synthesis digital library of engineering and computer science.

Series from website.

Includes bibliographical references (pages 127-139).

1. Introduction -- 1.1 RFID technology -- 1.2 RFID technology at the physical level -- 1.3 RFID technology at the network level -- 1.4 RFID security and privacy --

2. RFID security at the physical level -- 2.1 Tag/reader/mutual authentication -- 2.1.1 Public key solutions -- 2.1.2 Symmetric key solutions -- 2.1.3 Hash-based solutions -- 2.1.4 Lightweight solutions -- 2.1.5 Radio frequency distance bounding -- 2.2 Key distribution -- 2.2.1 Secret sharing across space and time -- 2.2.2 Resilient secret sharing -- 2.3 Path authentication -- 2.3.1 TRACKER -- 2.3.2 Other path authentication solutions -- 2.4 Clone tag detection --

3. RFID privacy at the physical level -- 3.1 Indistinguishability-based privacy and unpredictability-based privacy -- 3.1.1 Preliminaries -- 3.1.2 Indistinguishability-based privacy -- 3.1.3 Unpredictability-based privacy -- 3.1.4 Improvements of Unp-privacy model -- 3.1.5 Relation between Unp-privacy and Ind-privacy -- 3.1.6 Minimal requirement on RFID tags for Unp-privacy -- 3.2 Zero-knowledge-based privacy -- 3.2.1 Preliminaries -- 3.2.2 Model of RFID system -- 3.2.3 ZK-privacy -- 3.2.4 Discussions -- 3.2.5 Comparisons with Ind-privacy and Unp-privacy -- 3.2.6 An RFID mutual authentication protocol with ZK-privacy -- 3.3 Vaudenay's privacy framework -- 3.4 Universal composibility-based privacy -- 3.5 Privacy in path authentication -- 3.5.1 Multi-reader system and adversary model -- 3.5.2 Tag unlinkability and step unlinkability -- 3.5.3 Path privacy -- 3.5.4 Path authentication schemes with privacy -- 3.6 Privacy in ownership transfer --

4. RFID security at the network level -- 4.1 Background -- 4.2 Access control policies in EPCglobal network -- 4.3 Access control enforcement in EPCDS -- 4.4 Access control enforcement in EPCIS -- 4.5 Defence against false event injection in EPCDS --

5. RFID privacy at the network level -- 5.1 Anonymity of tag id in EPCDS -- 5.2 Anti-tracing of tag ID in EPCDS -- 5.2.1 Unauthorized tracing mitigation -- 5.2.2 Access control and key management -- 5.2.3 Compatibility and performance issues --

6. Summary and future directions -- Bibliography -- Authors' biographies.

Abstract freely available; full-text restricted to subscribers or individual document purchasers.

Compendex

INSPEC

Google scholar

Google book search

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.

Also available in print.

Title from PDF title page (viewed on January 13, 2014).

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha