000 05987nam a2200721 i 4500
001 6813192
003 IEEE
005 20200413152913.0
006 m eo d
007 cr cn |||m|||a
008 140113s2014 caua foab 000 0 eng d
020 _a9781627053266
_qebook
020 _z9781627053259
_qpaperback
024 7 _a10.2200/S00550ED1V01Y201311SPT007
_2doi
035 _a(CaBNVSL)swl00403034
035 _a(OCoLC)868157000
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK6570.I34
_bL57 2014
082 0 4 _a006.245
_223
090 _a
_bMoCl
_e201311SPT007
100 1 _aLi, Yingjiu.,
_eauthor.
245 1 0 _aRFID security and privacy /
_cYingjiu Li, Robert H. Deng, Elisa Bertino.
264 1 _aSan Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
_bMorgan & Claypool,
_c2014.
300 _a1 PDF (xiii, 143 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aSynthesis lectures on information security, privacy, & trust,
_x1945-9750 ;
_v# 7
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat Reader.
500 _aPart of: Synthesis digital library of engineering and computer science.
500 _aSeries from website.
504 _aIncludes bibliographical references (pages 127-139).
505 0 _a1. Introduction -- 1.1 RFID technology -- 1.2 RFID technology at the physical level -- 1.3 RFID technology at the network level -- 1.4 RFID security and privacy --
505 8 _a2. RFID security at the physical level -- 2.1 Tag/reader/mutual authentication -- 2.1.1 Public key solutions -- 2.1.2 Symmetric key solutions -- 2.1.3 Hash-based solutions -- 2.1.4 Lightweight solutions -- 2.1.5 Radio frequency distance bounding -- 2.2 Key distribution -- 2.2.1 Secret sharing across space and time -- 2.2.2 Resilient secret sharing -- 2.3 Path authentication -- 2.3.1 TRACKER -- 2.3.2 Other path authentication solutions -- 2.4 Clone tag detection --
505 8 _a3. RFID privacy at the physical level -- 3.1 Indistinguishability-based privacy and unpredictability-based privacy -- 3.1.1 Preliminaries -- 3.1.2 Indistinguishability-based privacy -- 3.1.3 Unpredictability-based privacy -- 3.1.4 Improvements of Unp-privacy model -- 3.1.5 Relation between Unp-privacy and Ind-privacy -- 3.1.6 Minimal requirement on RFID tags for Unp-privacy -- 3.2 Zero-knowledge-based privacy -- 3.2.1 Preliminaries -- 3.2.2 Model of RFID system -- 3.2.3 ZK-privacy -- 3.2.4 Discussions -- 3.2.5 Comparisons with Ind-privacy and Unp-privacy -- 3.2.6 An RFID mutual authentication protocol with ZK-privacy -- 3.3 Vaudenay's privacy framework -- 3.4 Universal composibility-based privacy -- 3.5 Privacy in path authentication -- 3.5.1 Multi-reader system and adversary model -- 3.5.2 Tag unlinkability and step unlinkability -- 3.5.3 Path privacy -- 3.5.4 Path authentication schemes with privacy -- 3.6 Privacy in ownership transfer --
505 8 _a4. RFID security at the network level -- 4.1 Background -- 4.2 Access control policies in EPCglobal network -- 4.3 Access control enforcement in EPCDS -- 4.4 Access control enforcement in EPCIS -- 4.5 Defence against false event injection in EPCDS --
505 8 _a5. RFID privacy at the network level -- 5.1 Anonymity of tag id in EPCDS -- 5.2 Anti-tracing of tag ID in EPCDS -- 5.2.1 Unauthorized tracing mitigation -- 5.2.2 Access control and key management -- 5.2.3 Compatibility and performance issues --
505 8 _a6. Summary and future directions -- Bibliography -- Authors' biographies.
506 1 _aAbstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0 _aCompendex
510 0 _aINSPEC
510 0 _aGoogle scholar
510 0 _aGoogle book search
520 3 _aAs a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.
530 _aAlso available in print.
588 _aTitle from PDF title page (viewed on January 13, 2014).
650 0 _aRadio frequency identification systems
_xSecurity measures.
653 _aRFID technology
653 _aRFID system
653 _aRFID security
653 _aRFID privacy
653 _aauthentication
653 _aaccess control
653 _aEPCglobal Network
700 1 _aDeng, Robert H.,
_eauthor.
700 1 _aBertino, Elisa.,
_eauthor.
776 0 8 _iPrint version:
_z9781627053259
830 0 _aSynthesis digital library of engineering and computer science.
830 0 _aSynthesis lectures on information security, privacy, and trust ;
_v# 7.
_x1945-9750
856 4 2 _3Abstract with links to resource
_uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6813192
856 4 0 _3Abstract with links to full text
_uhttp://dx.doi.org/10.2200/S00550ED1V01Y201311SPT007
999 _c562051
_d562051