Security in RFID and sensor networks [electronic resource] / edited by Yan Zhang, Paris Kitsos.

In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As alw...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Taylor & Francis)
Other Authors: Zhang, Yan, 1977-, Kitsos, Paris
Format: Electronic eBook
Language:English
Published: Boca Raton : CRC Press, ©2009.
Series:Wireless networks and mobile communications series.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b12790547
003 CoU
005 20221011213018.0
006 m o d
007 cr |||||||||||
008 090520s2009 flua ob 000 0 eng d
019 |a 647813113  |a 708649655  |a 900343568  |a 901241892  |a 910291812  |a 935373227  |a 991939606  |a 994988958  |a 1031041515  |a 1058256764  |a 1064084551  |a 1086547046  |a 1260360717  |a 1300672844  |a 1303344498 
020 |a 9781420068405  |q (electronic bk.) 
020 |a 1420068407  |q (electronic bk.) 
020 |a 1322629692 
020 |a 9781322629698 
020 |a 9781466543386 
020 |a 1466543388 
020 |a 9780429119903  |q (electronic bk.) 
020 |a 0429119909  |q (electronic bk.) 
020 |z 9781420068399 
020 |z 1420068393 
024 7 |a 10.1201/9781420068405 
035 |a (OCoLC)crc327055668 
035 |a (OCoLC)327055668  |z (OCoLC)647813113  |z (OCoLC)708649655  |z (OCoLC)900343568  |z (OCoLC)901241892  |z (OCoLC)910291812  |z (OCoLC)935373227  |z (OCoLC)991939606  |z (OCoLC)994988958  |z (OCoLC)1031041515  |z (OCoLC)1058256764  |z (OCoLC)1064084551  |z (OCoLC)1086547046  |z (OCoLC)1260360717  |z (OCoLC)1300672844  |z (OCoLC)1303344498 
037 |a crc9780429119903 
040 |a HNK  |b eng  |e pn  |c HNK  |d CUS  |d CEF  |d VLB  |d E7B  |d OCLCQ  |d B24X7  |d OCLCQ  |d DEBSZ  |d STF  |d CRCPR  |d N$T  |d IDEBK  |d CAUOI  |d EBLCP  |d S3O  |d OCLCQ  |d PIFBY  |d OTZ  |d OCLCQ  |d UAB  |d OCLCQ  |d ERL  |d OCLCQ  |d UPM  |d AU@  |d COO  |d UKMGB  |d WYU  |d S9I  |d TYFRS  |d UKAHL  |d OCLCQ  |d EYM  |d SFB  |d OCLCO  |d DST  |d OCLCQ 
049 |a GWRE 
050 4 |a TK7872.D48 
245 0 0 |a Security in RFID and sensor networks  |h [electronic resource] /  |c edited by Yan Zhang, Paris Kitsos. 
260 |a Boca Raton :  |b CRC Press,  |c ©2009. 
300 |a 1 online resource (1 volume (various pagings)) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a data file. 
490 1 |a Wireless networks and mobile communications. 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references. 
505 0 |a Front Cover; Security in RFID and Sensor Networks; Contents; Editors; Contributors; Part I: Security in RFID; Chapter 1: Multi-Tag RFID Systems; 1.1 Introduction; 1.2 Multi-Tag Approach; 1.2.1 Optimal Placement of Multi-Tags; 1.3 Experimental Equipment and Setup; 1.4 Experimental Results; 1.4.1 Linear Antennas; 1.4.2 Circular Antennas; 1.5 Importance of Tag Orientation; 1.6 Controlling Experimental Variables; 1.6.1 Tag Variability; 1.6.2 Reader Variability; 1.7 Object Detection in the Presence of Metals and Liquids; 1.8 Effect of Object Quantity on Detection. 
505 8 |a 1.9 Effect of Multi-Tags on Anticollision Algorithms1.10 Multi-Tags as Security Enhancers; 1.10.1 Chaffing and Winnowing; 1.10.2 Preventing Side-Channel Attacks; 1.10.3 Splitting ID among Multi-Tags; 1.11 Applications of Multi-Tags; 1.11.1 Reliability; 1.11.2 Availability; 1.11.3 Safety; 1.11.4 Object Location; 1.11.5 Packaging; 1.11.6 Theft Prevention; 1.11.7 Tagging Bulk Materials; 1.12 Economics of Multi-Tags; 1.12.1 Costs and Benefits of Multi-Tags; 1.12.2 Tag Manufacturing Yield Issues; 1.12.3 RFID Demand Drivers; 1.12.4 Cost-Effective Tag Design Techniques. 
505 8 |a 1.12.5 Summary of Multi-Tag Economics1.13 Conclusion; Acknowledgment; References; Chapter 2: Attacking RFID Systems; 2.1 Introduction; 2.1.1 Background; 2.1.2 Attack Objectives; 2.1.3 Security Needs; 2.2 Main Security Concerns; 2.2.1 Privacy; 2.2.2 Tracking; 2.3 Tags and Readers; 2.3.1 Operating Frequencies and Reading Distances; 2.3.2 Eavesdropping; 2.3.3 Authentication; 2.3.4 Skimming; 2.3.5 Cloning and Physical Attacks; 2.3.6 Replay and Relay Attacks; 2.3.7 Hiding; 2.3.8 Deactivating; 2.3.9 Cryptographic Vulnerabilities; 2.4 Back-End Database; 2.4.1 Tag Counterfeiting and Duplication. 
505 8 |a 2.4.2 EPC Network: ONS Attacks2.4.3 Virus Attacks; References; Chapter 3: RFID Relay Attacks: System Analysis, Modeling, and Implementation; 3.1 Introduction; 3.2 Common Attacks on RFID Devices; 3.2.1 Replay Attacks; 3.2.2 Power Analysis Attacks; 3.2.3 Relay Attacks; 3.3 RFID System Model; 3.3.1 Application Software (APP); 3.3.2 Initialization and Anticollision Protocol (MAC); 3.3.3 Coder; 3.3.4 Modulator; 3.3.4.1 On-Off Keying (OOK); 3.3.4.2 Bipolar Phase Shift Keying (BPSK); 3.3.4.3 Amplitude Shift Keying (ASK); 3.3.5 Demodulator; 3.3.6 Channel; 3.4 System Architecture. 
505 8 |a 3.4.1 Channel Link Budget3.4.1.1 Received Power; 3.4.1.1.1 Tag to Reader Link Range Calculation; 3.4.2 Multi-Protocol Support; 3.4.2.1 Frequency Scanning; 3.4.2.1.1 FPGA; 3.4.2.1.2 Fractional-N Synthesizer; 3.4.2.1.3 Loop Filter; 3.4.2.1.4 VCO; 3.4.3 Smart Antennas; 3.4.3.1 Beamforming; 3.4.3.2 Beam-Selection; 3.4.3.3 Switch and Stay; 3.4.3.4 Switch and Compare; 3.4.4 Improving the Attack; 3.4.4.1 Improving the Security; 3.4.4.2 Increasing Channel Capacity; 3.4.4.3 General Implementation Comments on Smart Antennas; 3.5 System Delay; 3.6 Relay Attack Implementation; 3.6.1 Using the DSP. 
520 |a In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, pr. 
546 |a English. 
588 0 |a Print version record. 
650 0 |a Sensor networks  |x Security measures. 
650 0 |a Radio frequency identification systems  |x Security measures. 
700 1 |a Zhang, Yan,  |d 1977-  |0 http://id.loc.gov/authorities/names/n2006044046  |1 http://isni.org/isni/0000000459795426. 
700 1 |a Kitsos, Paris.  |0 http://id.loc.gov/authorities/names/n2008058729  |1 http://isni.org/isni/0000000083676807. 
776 0 8 |i Print version:  |t Security in RFID and sensor networks.  |d Boca Raton : CRC Press, ©2009  |z 9781420068399  |w (DLC) 2008037932  |w (OCoLC)166358473. 
830 0 |a Wireless networks and mobile communications series.  |0 http://id.loc.gov/authorities/names/no2007000017. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=https://www.taylorfrancis.com/books/9780429119903  |z Full Text (via Taylor & Francis) 
907 |a .b127905479  |b 11-01-22  |c 10-12-22 
998 |a web  |b 10-31-22  |c b  |d b   |e -  |f eng  |g flu  |h 0  |i 1 
907 |a .b127905479  |b 10-31-22  |c 10-12-22 
944 |a MARS - RDA ENRICHED 
915 |a - 
956 |a EngNetBase 
956 |b Taylor & Francis ENGnetBASE 
999 f f |i 910e3571-b57f-5110-89ca-12f96d629862  |s 0b688f18-9f1f-5b21-9331-cebe2f284d22 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e TK7872.D48  |h Library of Congress classification  |i web  |n 1