RFID security : a lightweight paradigm

This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security desig...

Full description

Saved in:
Bibliographic Details
Other Authors: Khattab, Ahmed., Jeddi, Zahra., Amini, Esmaeil., Bayoumi, Magdy A.
Format: eBook
Language: English
Published: Cham : Springer, 2016.
Series: Analog circuits and signal processing series.
Subjects:
ISBN: 9783319475455
9783319475448
Physical Description: 1 online resource (186 pages)

Cover

Table of contents

LEADER 05685cam a2200493Mi 4500
001 99556
003 CZ-ZlUTB
005 20240914112015.0
006 m o d
007 cr un|---aucuu
008 161119s2016 sz o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d N$T  |d IDEBK  |d GW5XE  |d OCLCQ  |d N$T  |d IDB  |d MERUC  |d UAB  |d IOG  |d ESU  |d JBG  |d IAD  |d ICW  |d ICN  |d OHI  |d OTZ  |d MERER  |d OCLCQ  |d U3W  |d CAUOI  |d OCLCQ  |d KSU  |d RRP  |d NLE  |d OCLCQ  |d UKAHL  |d OCLCQ 
020 |a 9783319475455  |q (electronic bk.) 
020 |z 9783319475448  |q (print) 
035 |a (OCoLC)963567913  |z (OCoLC)962750941  |z (OCoLC)962824980  |z (OCoLC)963608396  |z (OCoLC)963793520  |z (OCoLC)964546365  |z (OCoLC)967056915  |z (OCoLC)967586175 
245 0 0 |a RFID security :  |b a lightweight paradigm /  |c Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi. 
260 |a Cham :  |b Springer,  |c 2016. 
300 |a 1 online resource (186 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Analog circuits and signal processing 
505 0 |a Preface; Acknowledgements; Contents; List of Figures; List of Tables; Part I RFID Security Preliminaries; 1 Introduction to RFID; 1.1 Automatic Identification; 1.2 RFID History and Standardization; 1.3 RFID Applications; 1.3.1 Logistics and Supply Chain Management; 1.3.2 Ticketing; 1.3.3 Health Care; 1.3.4 Security and Identification; 1.3.5 Toll Systems and Payment Applications; 1.3.6 Tacking Applications; 1.3.7 RIDF and Smart Objects; 1.4 RFID System Overview; 1.5 RFID Construction Formats; 1.6 RFID Classifications; 1.6.1 Communication Mechanism; 1.6.2 Memory; 1.6.3 Operating Frequency. 
505 8 |a 1.6.4 Power Source; 1.6.4.1 Active Tags; 1.6.4.2 Semi-Passive Tags; 1.6.4.3 Passive Tags; 1.7 How Passive RFID Tags Work; 1.8 RFID Systems Advantages and Challenges; 1.8.1 Advantages of RFID Systems; 1.8.2 Challenges to RFID Systems; 1.9 Book Organization; References; 2 RFID Security Threats and Basic Solutions; 2.1 Security Attacks in RFID Systems; 2.1.1 Physical RFID Threats; 2.1.1.1 Disabling Tags; 2.1.1.2 Tag Modification; 2.1.1.3 Cloning Tags; 2.1.1.4 Reverse Engineering and Physical Exploration; 2.1.2 RFID Channel Threats; 2.1.2.1 Eavesdropping; 2.1.2.2 Snooping; 2.1.2.3 Skimming. 
505 8 |a 2.1.2.4 Replay; 2.2 RFID Security Measures and Defenses; 2.2.1 Physical Solutions for RFID Privacy Protection; 2.2.1.1 Killing Tags; 2.2.1.2 Sleeping Tags; 2.2.1.3 Faraday Cage; 2.2.1.4 Blocker Tags; 2.2.1.5 Tag Relabeling; 2.2.1.6 Minimalist Cryptography; 2.2.1.7 Proxy Privacy Devices; 2.2.2 Authentication; 2.3 Concluding Remarks; References. 
505 8 |a 3 Cryptography in RFID Systems; 3.1 Wireless Security Preliminaries; 3.2 Cryptography Overview; 3.2.1 Symmetric Private Key Encryption; 3.2.2 Asymmetric Public Key Encryption; 3.2.3 Hash Function; 3.3 Lightweight Cryptography; 3.4 Asymmetric Key Encryption Lightweight Cryptosystems; 3.4.1 Elliptical Curve Cryptography (ECC); 3.5 Symmetric Key Encryption Lightweight Cryptosystems; 3.5.1 Block Ciphers; 3.5.1.1 Advanced Encryption Standard (AES); 3.5.1.2 PRESENT; 3.5.2 Stream Ciphers; 3.5.2.1 Keystream; 3.5.2.2 Trivium; 3.5.2.3 Grain; 3.5.3 Hybrid Ciphers; 3.5.3.1 Hummingbird (HB). 
505 8 |a 3.6 Motivation for RBS Lightweight RFID Cryptosystems; 3.6.1 RBS Design Objectives; 3.7 Conclusion; References; Part II Lightweight RFID Redundant Bit Security; 4 RBS Cryptosystem; 4.1 Key and Number of Redundant Bits; 4.1.1 Key Space; 4.1.2 Flexibility in Security Level; 4.2 Location of Redundant Bits; 4.3 Value of Redundant Bits; 4.3.1 Message Authentication and Data Integrity; 4.3.2 Message Authentication and Redundant Bits; 4.4 Plaintext Manipulation; 4.4.1 Direct Appearance Inside the Ciphertext; 4.4.2 Bitwise Addition with a Constant-Value Keystream. 
505 8 |a 4.4.3 Bitwise Addition with Variable-Value Keystream. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Radio frequency identification systems  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Khattab, Ahmed. 
700 1 |a Jeddi, Zahra. 
700 1 |a Amini, Esmaeil. 
700 1 |a Bayoumi, Magdy A. 
776 0 8 |i Print version:  |a Khattab, Ahmed.  |t RFID Security : A Lightweight Paradigm.  |d Cham : Springer International Publishing, ©2016  |z 9783319475448 
830 0 |a Analog circuits and signal processing series. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-47545-5  |y Plný text 
992 |c NTK-SpringerENG 
999 |c 99556  |d 99556 
993 |x NEPOSILAT  |y EIZ