RFID security : a lightweight paradigm / Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi.

This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security desig...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Other Authors: Khattab, Ahmed, Jeddi, Zahra, Amini, Esmaeil, Bayoumi, Magdy A.
Format: eBook
Language:English
Published: Cham : Springer, 2016.
Series:Analog circuits and signal processing series.
Subjects:

MARC

LEADER 00000cam a2200000Mi 4500
001 b9007233
006 m o d
007 cr |||||||||||
008 161119s2016 sz o 000 0 eng d
005 20240418151558.8
019 |a 962750941  |a 962824980  |a 963608396  |a 963793520  |a 964546365  |a 967056915  |a 967586175 
020 |a 9783319475455  |q (electronic bk.) 
020 |a 3319475452  |q (electronic bk.) 
020 |z 9783319475448  |q (print) 
020 |z 3319475444 
035 |a (OCoLC)spr963567913 
035 |a (OCoLC)963567913  |z (OCoLC)962750941  |z (OCoLC)962824980  |z (OCoLC)963608396  |z (OCoLC)963793520  |z (OCoLC)964546365  |z (OCoLC)967056915  |z (OCoLC)967586175 
037 |a spr978-3-319-47545-5 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d N$T  |d IDEBK  |d GW5XE  |d OCLCQ  |d N$T  |d IDB  |d MERUC  |d UAB  |d IOG  |d ESU  |d JBG  |d IAD  |d ICW  |d ICN  |d OHI  |d OTZ  |d MERER  |d OCLCQ  |d U3W  |d CAUOI  |d OCLCQ  |d KSU  |d RRP  |d NLE  |d OCLCQ  |d UKAHL  |d OCLCQ 
049 |a GWRE 
050 4 |a TA1-2040 
245 0 0 |a RFID security :  |b a lightweight paradigm /  |c Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi. 
260 |a Cham :  |b Springer,  |c 2016. 
300 |a 1 online resource (186 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Analog circuits and signal processing. 
505 0 |a Preface; Acknowledgements; Contents; List of Figures; List of Tables; Part I RFID Security Preliminaries; 1 Introduction to RFID; 1.1 Automatic Identification; 1.2 RFID History and Standardization; 1.3 RFID Applications; 1.3.1 Logistics and Supply Chain Management; 1.3.2 Ticketing; 1.3.3 Health Care; 1.3.4 Security and Identification; 1.3.5 Toll Systems and Payment Applications; 1.3.6 Tacking Applications; 1.3.7 RIDF and Smart Objects; 1.4 RFID System Overview; 1.5 RFID Construction Formats; 1.6 RFID Classifications; 1.6.1 Communication Mechanism; 1.6.2 Memory; 1.6.3 Operating Frequency. 
505 8 |a 1.6.4 Power Source; 1.6.4.1 Active Tags; 1.6.4.2 Semi-Passive Tags; 1.6.4.3 Passive Tags; 1.7 How Passive RFID Tags Work; 1.8 RFID Systems Advantages and Challenges; 1.8.1 Advantages of RFID Systems; 1.8.2 Challenges to RFID Systems; 1.9 Book Organization; References; 2 RFID Security Threats and Basic Solutions; 2.1 Security Attacks in RFID Systems; 2.1.1 Physical RFID Threats; 2.1.1.1 Disabling Tags; 2.1.1.2 Tag Modification; 2.1.1.3 Cloning Tags; 2.1.1.4 Reverse Engineering and Physical Exploration; 2.1.2 RFID Channel Threats; 2.1.2.1 Eavesdropping; 2.1.2.2 Snooping; 2.1.2.3 Skimming. 
505 8 |a 2.1.2.4 Replay; 2.2 RFID Security Measures and Defenses; 2.2.1 Physical Solutions for RFID Privacy Protection; 2.2.1.1 Killing Tags; 2.2.1.2 Sleeping Tags; 2.2.1.3 Faraday Cage; 2.2.1.4 Blocker Tags; 2.2.1.5 Tag Relabeling; 2.2.1.6 Minimalist Cryptography; 2.2.1.7 Proxy Privacy Devices; 2.2.2 Authentication; 2.3 Concluding Remarks; References. 
505 8 |a 3 Cryptography in RFID Systems; 3.1 Wireless Security Preliminaries; 3.2 Cryptography Overview; 3.2.1 Symmetric Private Key Encryption; 3.2.2 Asymmetric Public Key Encryption; 3.2.3 Hash Function; 3.3 Lightweight Cryptography; 3.4 Asymmetric Key Encryption Lightweight Cryptosystems; 3.4.1 Elliptical Curve Cryptography (ECC); 3.5 Symmetric Key Encryption Lightweight Cryptosystems; 3.5.1 Block Ciphers; 3.5.1.1 Advanced Encryption Standard (AES); 3.5.1.2 PRESENT; 3.5.2 Stream Ciphers; 3.5.2.1 Keystream; 3.5.2.2 Trivium; 3.5.2.3 Grain; 3.5.3 Hybrid Ciphers; 3.5.3.1 Hummingbird (HB) 
505 8 |a 3.6 Motivation for RBS Lightweight RFID Cryptosystems; 3.6.1 RBS Design Objectives; 3.7 Conclusion; References; Part II Lightweight RFID Redundant Bit Security; 4 RBS Cryptosystem; 4.1 Key and Number of Redundant Bits; 4.1.1 Key Space; 4.1.2 Flexibility in Security Level; 4.2 Location of Redundant Bits; 4.3 Value of Redundant Bits; 4.3.1 Message Authentication and Data Integrity; 4.3.2 Message Authentication and Redundant Bits; 4.4 Plaintext Manipulation; 4.4.1 Direct Appearance Inside the Ciphertext; 4.4.2 Bitwise Addition with a Constant-Value Keystream. 
505 8 |a 4.4.3 Bitwise Addition with Variable-Value Keystream. 
520 |a This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies. 
588 0 |a Print version record. 
650 0 |a Radio frequency identification systems  |x Security measures. 
700 1 |a Khattab, Ahmed. 
700 1 |a Jeddi, Zahra. 
700 1 |a Amini, Esmaeil. 
700 1 |a Bayoumi, Magdy A. 
776 0 8 |i Print version:  |a Khattab, Ahmed.  |t RFID Security : A Lightweight Paradigm.  |d Cham : Springer International Publishing, ©2016  |z 9783319475448. 
830 0 |a Analog circuits and signal processing series. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-319-47545-5  |z Full Text (via Springer) 
907 |a .b90072339  |b 11-22-21  |c 02-01-17 
998 |a web  |b  - -   |c f  |d b   |e -  |f eng  |g sz   |h 0  |i 1 
915 |a M 
956 |a Springer e-books 
956 |b Springer Nature - Springer Engineering eBooks 2017 English International 
999 f f |i 1dbf431a-2627-56b3-85be-1f2681c6c1bf  |s 829cf914-8b9e-583b-802e-d02bc7c95af5 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e TA1-2040  |h Library of Congress classification  |i Ebooks, Prospector  |n 1