RFID security : a lightweight paradigm / Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi.
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security desig...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Other Authors: | , , , |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
2016.
|
Series: | Analog circuits and signal processing series.
|
Subjects: |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | b9007233 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 161119s2016 sz o 000 0 eng d | ||
005 | 20240418151558.8 | ||
019 | |a 962750941 |a 962824980 |a 963608396 |a 963793520 |a 964546365 |a 967056915 |a 967586175 | ||
020 | |a 9783319475455 |q (electronic bk.) | ||
020 | |a 3319475452 |q (electronic bk.) | ||
020 | |z 9783319475448 |q (print) | ||
020 | |z 3319475444 | ||
035 | |a (OCoLC)spr963567913 | ||
035 | |a (OCoLC)963567913 |z (OCoLC)962750941 |z (OCoLC)962824980 |z (OCoLC)963608396 |z (OCoLC)963793520 |z (OCoLC)964546365 |z (OCoLC)967056915 |z (OCoLC)967586175 | ||
037 | |a spr978-3-319-47545-5 | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d YDX |d N$T |d IDEBK |d GW5XE |d OCLCQ |d N$T |d IDB |d MERUC |d UAB |d IOG |d ESU |d JBG |d IAD |d ICW |d ICN |d OHI |d OTZ |d MERER |d OCLCQ |d U3W |d CAUOI |d OCLCQ |d KSU |d RRP |d NLE |d OCLCQ |d UKAHL |d OCLCQ | ||
049 | |a GWRE | ||
050 | 4 | |a TA1-2040 | |
245 | 0 | 0 | |a RFID security : |b a lightweight paradigm / |c Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi. |
260 | |a Cham : |b Springer, |c 2016. | ||
300 | |a 1 online resource (186 pages) | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Analog circuits and signal processing. | |
505 | 0 | |a Preface; Acknowledgements; Contents; List of Figures; List of Tables; Part I RFID Security Preliminaries; 1 Introduction to RFID; 1.1 Automatic Identification; 1.2 RFID History and Standardization; 1.3 RFID Applications; 1.3.1 Logistics and Supply Chain Management; 1.3.2 Ticketing; 1.3.3 Health Care; 1.3.4 Security and Identification; 1.3.5 Toll Systems and Payment Applications; 1.3.6 Tacking Applications; 1.3.7 RIDF and Smart Objects; 1.4 RFID System Overview; 1.5 RFID Construction Formats; 1.6 RFID Classifications; 1.6.1 Communication Mechanism; 1.6.2 Memory; 1.6.3 Operating Frequency. | |
505 | 8 | |a 1.6.4 Power Source; 1.6.4.1 Active Tags; 1.6.4.2 Semi-Passive Tags; 1.6.4.3 Passive Tags; 1.7 How Passive RFID Tags Work; 1.8 RFID Systems Advantages and Challenges; 1.8.1 Advantages of RFID Systems; 1.8.2 Challenges to RFID Systems; 1.9 Book Organization; References; 2 RFID Security Threats and Basic Solutions; 2.1 Security Attacks in RFID Systems; 2.1.1 Physical RFID Threats; 2.1.1.1 Disabling Tags; 2.1.1.2 Tag Modification; 2.1.1.3 Cloning Tags; 2.1.1.4 Reverse Engineering and Physical Exploration; 2.1.2 RFID Channel Threats; 2.1.2.1 Eavesdropping; 2.1.2.2 Snooping; 2.1.2.3 Skimming. | |
505 | 8 | |a 2.1.2.4 Replay; 2.2 RFID Security Measures and Defenses; 2.2.1 Physical Solutions for RFID Privacy Protection; 2.2.1.1 Killing Tags; 2.2.1.2 Sleeping Tags; 2.2.1.3 Faraday Cage; 2.2.1.4 Blocker Tags; 2.2.1.5 Tag Relabeling; 2.2.1.6 Minimalist Cryptography; 2.2.1.7 Proxy Privacy Devices; 2.2.2 Authentication; 2.3 Concluding Remarks; References. | |
505 | 8 | |a 3 Cryptography in RFID Systems; 3.1 Wireless Security Preliminaries; 3.2 Cryptography Overview; 3.2.1 Symmetric Private Key Encryption; 3.2.2 Asymmetric Public Key Encryption; 3.2.3 Hash Function; 3.3 Lightweight Cryptography; 3.4 Asymmetric Key Encryption Lightweight Cryptosystems; 3.4.1 Elliptical Curve Cryptography (ECC); 3.5 Symmetric Key Encryption Lightweight Cryptosystems; 3.5.1 Block Ciphers; 3.5.1.1 Advanced Encryption Standard (AES); 3.5.1.2 PRESENT; 3.5.2 Stream Ciphers; 3.5.2.1 Keystream; 3.5.2.2 Trivium; 3.5.2.3 Grain; 3.5.3 Hybrid Ciphers; 3.5.3.1 Hummingbird (HB) | |
505 | 8 | |a 3.6 Motivation for RBS Lightweight RFID Cryptosystems; 3.6.1 RBS Design Objectives; 3.7 Conclusion; References; Part II Lightweight RFID Redundant Bit Security; 4 RBS Cryptosystem; 4.1 Key and Number of Redundant Bits; 4.1.1 Key Space; 4.1.2 Flexibility in Security Level; 4.2 Location of Redundant Bits; 4.3 Value of Redundant Bits; 4.3.1 Message Authentication and Data Integrity; 4.3.2 Message Authentication and Redundant Bits; 4.4 Plaintext Manipulation; 4.4.1 Direct Appearance Inside the Ciphertext; 4.4.2 Bitwise Addition with a Constant-Value Keystream. | |
505 | 8 | |a 4.4.3 Bitwise Addition with Variable-Value Keystream. | |
520 | |a This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Radio frequency identification systems |x Security measures. | |
700 | 1 | |a Khattab, Ahmed. | |
700 | 1 | |a Jeddi, Zahra. | |
700 | 1 | |a Amini, Esmaeil. | |
700 | 1 | |a Bayoumi, Magdy A. | |
776 | 0 | 8 | |i Print version: |a Khattab, Ahmed. |t RFID Security : A Lightweight Paradigm. |d Cham : Springer International Publishing, ©2016 |z 9783319475448. |
830 | 0 | |a Analog circuits and signal processing series. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-319-47545-5 |z Full Text (via Springer) |
907 | |a .b90072339 |b 11-22-21 |c 02-01-17 | ||
998 | |a web |b - - |c f |d b |e - |f eng |g sz |h 0 |i 1 | ||
915 | |a M | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Engineering eBooks 2017 English International | ||
999 | f | f | |i 1dbf431a-2627-56b3-85be-1f2681c6c1bf |s 829cf914-8b9e-583b-802e-d02bc7c95af5 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e TA1-2040 |h Library of Congress classification |i Ebooks, Prospector |n 1 |