RFID security : a lightweight paradigm
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security desig...
Saved in:
Other Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
2016.
|
Series: | Analog circuits and signal processing series.
|
Subjects: | |
ISBN: | 9783319475455 9783319475448 |
Physical Description: | 1 online resource (186 pages) |
LEADER | 05685cam a2200493Mi 4500 | ||
---|---|---|---|
001 | 99556 | ||
003 | CZ-ZlUTB | ||
005 | 20240914112015.0 | ||
006 | m o d | ||
007 | cr un|---aucuu | ||
008 | 161119s2016 sz o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d YDX |d N$T |d IDEBK |d GW5XE |d OCLCQ |d N$T |d IDB |d MERUC |d UAB |d IOG |d ESU |d JBG |d IAD |d ICW |d ICN |d OHI |d OTZ |d MERER |d OCLCQ |d U3W |d CAUOI |d OCLCQ |d KSU |d RRP |d NLE |d OCLCQ |d UKAHL |d OCLCQ | ||
020 | |a 9783319475455 |q (electronic bk.) | ||
020 | |z 9783319475448 |q (print) | ||
035 | |a (OCoLC)963567913 |z (OCoLC)962750941 |z (OCoLC)962824980 |z (OCoLC)963608396 |z (OCoLC)963793520 |z (OCoLC)964546365 |z (OCoLC)967056915 |z (OCoLC)967586175 | ||
245 | 0 | 0 | |a RFID security : |b a lightweight paradigm / |c Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi. |
260 | |a Cham : |b Springer, |c 2016. | ||
300 | |a 1 online resource (186 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Analog circuits and signal processing | |
505 | 0 | |a Preface; Acknowledgements; Contents; List of Figures; List of Tables; Part I RFID Security Preliminaries; 1 Introduction to RFID; 1.1 Automatic Identification; 1.2 RFID History and Standardization; 1.3 RFID Applications; 1.3.1 Logistics and Supply Chain Management; 1.3.2 Ticketing; 1.3.3 Health Care; 1.3.4 Security and Identification; 1.3.5 Toll Systems and Payment Applications; 1.3.6 Tacking Applications; 1.3.7 RIDF and Smart Objects; 1.4 RFID System Overview; 1.5 RFID Construction Formats; 1.6 RFID Classifications; 1.6.1 Communication Mechanism; 1.6.2 Memory; 1.6.3 Operating Frequency. | |
505 | 8 | |a 1.6.4 Power Source; 1.6.4.1 Active Tags; 1.6.4.2 Semi-Passive Tags; 1.6.4.3 Passive Tags; 1.7 How Passive RFID Tags Work; 1.8 RFID Systems Advantages and Challenges; 1.8.1 Advantages of RFID Systems; 1.8.2 Challenges to RFID Systems; 1.9 Book Organization; References; 2 RFID Security Threats and Basic Solutions; 2.1 Security Attacks in RFID Systems; 2.1.1 Physical RFID Threats; 2.1.1.1 Disabling Tags; 2.1.1.2 Tag Modification; 2.1.1.3 Cloning Tags; 2.1.1.4 Reverse Engineering and Physical Exploration; 2.1.2 RFID Channel Threats; 2.1.2.1 Eavesdropping; 2.1.2.2 Snooping; 2.1.2.3 Skimming. | |
505 | 8 | |a 2.1.2.4 Replay; 2.2 RFID Security Measures and Defenses; 2.2.1 Physical Solutions for RFID Privacy Protection; 2.2.1.1 Killing Tags; 2.2.1.2 Sleeping Tags; 2.2.1.3 Faraday Cage; 2.2.1.4 Blocker Tags; 2.2.1.5 Tag Relabeling; 2.2.1.6 Minimalist Cryptography; 2.2.1.7 Proxy Privacy Devices; 2.2.2 Authentication; 2.3 Concluding Remarks; References. | |
505 | 8 | |a 3 Cryptography in RFID Systems; 3.1 Wireless Security Preliminaries; 3.2 Cryptography Overview; 3.2.1 Symmetric Private Key Encryption; 3.2.2 Asymmetric Public Key Encryption; 3.2.3 Hash Function; 3.3 Lightweight Cryptography; 3.4 Asymmetric Key Encryption Lightweight Cryptosystems; 3.4.1 Elliptical Curve Cryptography (ECC); 3.5 Symmetric Key Encryption Lightweight Cryptosystems; 3.5.1 Block Ciphers; 3.5.1.1 Advanced Encryption Standard (AES); 3.5.1.2 PRESENT; 3.5.2 Stream Ciphers; 3.5.2.1 Keystream; 3.5.2.2 Trivium; 3.5.2.3 Grain; 3.5.3 Hybrid Ciphers; 3.5.3.1 Hummingbird (HB). | |
505 | 8 | |a 3.6 Motivation for RBS Lightweight RFID Cryptosystems; 3.6.1 RBS Design Objectives; 3.7 Conclusion; References; Part II Lightweight RFID Redundant Bit Security; 4 RBS Cryptosystem; 4.1 Key and Number of Redundant Bits; 4.1.1 Key Space; 4.1.2 Flexibility in Security Level; 4.2 Location of Redundant Bits; 4.3 Value of Redundant Bits; 4.3.1 Message Authentication and Data Integrity; 4.3.2 Message Authentication and Redundant Bits; 4.4 Plaintext Manipulation; 4.4.1 Direct Appearance Inside the Ciphertext; 4.4.2 Bitwise Addition with a Constant-Value Keystream. | |
505 | 8 | |a 4.4.3 Bitwise Addition with Variable-Value Keystream. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies. | ||
590 | |a SpringerLink |b Springer Complete eBooks | ||
650 | 0 | |a Radio frequency identification systems |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Khattab, Ahmed. | |
700 | 1 | |a Jeddi, Zahra. | |
700 | 1 | |a Amini, Esmaeil. | |
700 | 1 | |a Bayoumi, Magdy A. | |
776 | 0 | 8 | |i Print version: |a Khattab, Ahmed. |t RFID Security : A Lightweight Paradigm. |d Cham : Springer International Publishing, ©2016 |z 9783319475448 |
830 | 0 | |a Analog circuits and signal processing series. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-47545-5 |y Plný text |
992 | |c NTK-SpringerENG | ||
999 | |c 99556 |d 99556 | ||
993 | |x NEPOSILAT |y EIZ |