Muutke küpsiste eelistusi

RFID Security: A Lightweight Paradigm 1st ed. 2017 [Kõva köide]

  • Formaat: Hardback, 171 pages, kõrgus x laius: 235x155 mm, kaal: 4203 g, 61 Illustrations, color; 19 Illustrations, black and white; XXII, 171 p. 80 illus., 61 illus. in color., 1 Hardback
  • Sari: Analog Circuits and Signal Processing
  • Ilmumisaeg: 21-Nov-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319475444
  • ISBN-13: 9783319475448
  • Kõva köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 171 pages, kõrgus x laius: 235x155 mm, kaal: 4203 g, 61 Illustrations, color; 19 Illustrations, black and white; XXII, 171 p. 80 illus., 61 illus. in color., 1 Hardback
  • Sari: Analog Circuits and Signal Processing
  • Ilmumisaeg: 21-Nov-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319475444
  • ISBN-13: 9783319475448
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today"s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

Part I. RFID Security Preliminaries.- 1. Introduction to RFID.- 2. RFID Security Threats and Basic Solutions.- 3. Cryptography in RFID Systems.- Part II. Lightweight RFID Redundant Bit Security.- 4. RBS Cryptosystem.- 5. RBS Security Analysis.- 6. RBS Performance Evaluation.- 7. RBS RFID Security and The Internet of Things.
Part I RFID Security Preliminaries
1 Introduction to RFID
3(24)
1.1 Automatic Identification
4(2)
1.2 RFID History and Standardization
6(1)
1.3 RFID Applications
7(5)
1.3.1 Logistics and Supply Chain Management
8(2)
1.3.2 Ticketing
10(1)
1.3.3 HealthCare
10(1)
1.3.4 Security and Identification
11(1)
1.3.5 Toll Systems and Payment Applications
11(1)
1.3.6 Tacking Applications
11(1)
1.3.7 RIDF and Smart Objects
12(1)
1.4 RFID System Overview
12(2)
1.5 RFID Construction Formats
14(2)
1.6 RFID Classifications
16(5)
1.6.1 Communication Mechanism
16(1)
1.6.2 Memory
17(1)
1.6.3 Operating Frequency
17(2)
1.6.4 Power Source
19(2)
1.7 How Passive RFID Tags Work
21(1)
1.8 RFID Systems Advantages and Challenges
22(2)
1.8.1 Advantages of RFID Systems
23(1)
1.8.2 Challenges to RFID Systems
23(1)
1.9 Book Organization
24(3)
References
25(2)
2 RFID Security Threats and Basic Solutions
27(16)
2.1 Security Attacks in RFID Systems
27(6)
2.1.1 Physical RFID Threats
28(1)
2.1.2 RFID Channel Threats
29(3)
2.1.3 System Threats
32(1)
2.2 RFID Security Measures and Defenses
33(6)
2.2.1 Physical Solutions for RFID Privacy Protection
34(4)
2.2.2 Authentication
38(1)
2.3 Concluding Remarks
39(4)
References
40(3)
3 Cryptography in RFID Systems
43(32)
3.1 Wireless Security Preliminaries
44(1)
3.2 Cryptography Overview
45(5)
3.2.1 Symmetric Private Key Encryption
45(1)
3.2.2 Asymmetric Public Key Encryption
46(2)
3.2.3 Hash Function
48(2)
3.3 Lightweight Cryptography
50(1)
3.4 Asymmetric Key Encryption Lightweight Cryptosystems
51(2)
3.4.1 Elliptical Curve Cryptography (ECC)
52(1)
3.5 Symmetric Key Encryption Lightweight Cryptosystems
53(14)
3.5.1 Block Ciphers
53(6)
3.5.2 Stream Ciphers
59(5)
3.5.3 Hybrid Ciphers
64(3)
3.6 Motivation for RBS Lightweight RFID Cryptosystems
67(2)
3.6.1 RBS Design Objectives
68(1)
3.7 Conclusion
69(6)
References
69(6)
Part II Lightweight RFID Redundant Bit Security
4 RBS Cryptosystem
75(26)
4.1 Key and Number of Redundant Bits
76(5)
4.1.1 Key Space
76(4)
4.1.2 Flexibility in Security Level
80(1)
4.2 Location of Redundant Bits
81(1)
4.3 Value of Redundant Bits
81(4)
4.3.1 Message Authentication and Data Integrity
82(2)
4.3.2 Message Authentication and Redundant Bits
84(1)
4.4 Plaintext Manipulation
85(2)
4.4.1 Direct Appearance Inside the Ciphertext
85(1)
4.4.2 Bitwise Addition with a Constant-Value Keystream
86(1)
4.4.3 Bitwise Addition with Variable-Value Keystream
86(1)
4.5 Implementation
87(11)
4.5.1 MAC Generator
87(2)
4.5.2 Chosen MAC Algorithm for RBS
89(3)
4.5.3 Adapting the Chosen MAC to RBS
92(2)
4.5.4 Encryption
94(1)
4.5.5 Decryption
95(1)
4.5.6 Reception/Transmission
95(3)
4.6 Overall RBS System
98(1)
4.7 Conclusion
98(3)
References
100(1)
5 RBS Security Analysis
101(16)
5.1 Security Model
101(1)
5.2 Mathematical Background
102(2)
5.3 RBS Security Against Common Attacks
104(11)
5.3.1 Brute Force Attack
104(1)
5.3.2 Known-Plaintext Attack
105(1)
5.3.3 Chosen-Plaintext Attack
105(1)
5.3.4 Chosen-Ciphertext Attack
106(1)
5.3.5 Differential Attack
107(2)
5.3.6 Substitution Attack
109(1)
5.3.7 Related Key Attack
109(2)
5.3.8 Linear Cryptanalysis
111(1)
5.3.9 Algebraic Attack
112(1)
5.3.10 Cube Attack
113(1)
5.3.11 Side Channel Attack
113(2)
5.4 Conclusion
115(2)
References
115(2)
6 RBS Performance Evaluation
117(30)
6.1 ASIC Implementation of RBS
118(2)
6.2 Comparison of Ciphers
120(20)
6.2.1 Area
123(2)
6.2.2 Performance
125(6)
6.2.3 Area-Time Product
131(2)
6.2.4 Hardware Efficiency
133(1)
6.2.5 Power
133(3)
6.2.6 Energy
136(1)
6.2.7 Energy-per-Bit
136(2)
6.2.8 Trade-offs
138(1)
6.2.9 Power-Area-Time Product
139(1)
6.3 Conclusions
140(7)
References
145(2)
7 RBS RFID Security and the Internet of Things
147(16)
7.1 RBS Characterizing Features
148(1)
7.2 RBS Future Extensions
149(1)
7.3 The Internet of Things (IoT)
150(4)
7.3.1 IoT History
151(2)
7.3.2 IoT Challenges
153(1)
7.3.3 Applications
154(1)
7.4 RFID Systems in Internet of Things (IoT)
154(3)
7.4.1 The Architecture of IoT Based on RFID
155(1)
7.4.2 IoT Additional Requirements from RFID Systems
156(1)
7.4.3 Security Issues with RFID-Based IoT Architectures
156(1)
7.5 Integrating RFID in IoT Applications
157(3)
7.5.1 RFID with Sensing Capabilities
157(1)
7.5.2 Integrating RFID in Sensor Node Architectures
157(2)
7.5.3 Integrating RFID Readers in Sensor Node Architectures
159(1)
7.5.4 Mixed RFID/WSN Architecture
160(1)
7.6 RFID-Based IoT Applications
160(3)
7.6.1 Health Care Applications
160(1)
7.6.2 Supply Chain Applications
161(1)
7.6.3 Battlefield Applications
161(1)
References
161(2)
Glossary 163(2)
About the Authors 165(4)
Index 169
Dr. Ahmed Khattab is currently an Assistant Professor in the Electronics and Electrical Communications Engineering Department at Cairo University. He received his Ph.D. in Computer Engineering from the Center for Advanced Computer Studies (CACS) at the University of Louisiana at Lafayette in 2011. He received a Master of Electrical Engineering degree from Rice University in 2009. He also received M.Sc. and B.Sc. (honors) degrees in Electrical Engineering from Cairo University, Cairo, Egypt, in 2004 and 2002, respectively. He is an Assistant Professor in the Electronics and Electrical Communications Engineering Department at Cairo University. He is also adjunct Assistant Professor in the American University in Cairo (AUC). He has authored/co-authored 2 books, a patent application and over 35 journal and conference publications. He serves as a reviewer in many IEEE transactions, journals and conferences, and is a member of the technical committee of severalprestigious conferences such as IEEE Globecom, IEEE ICCCN, and IEEE WF-IoT. He won the best student paper award from the IEEE Computer Society at the University of Louisiana at Lafayette chapter twice in 2010 and in 2011, and was a finalist in the best paper award contest in the IEEE ICCCN 2008 conference. He also received Texas Instruments Distinguished Endowed student fellowship in 2005.





Dr. Zahra Jeddi is a System Validation Engineer at Intel Corporation.





Dr. Esmaeil Amini is a Senior Software Engineer at Yahoo Corporation.





Dr. Magdy A. Bayoumi is Director of The Center for Advanced Computer Studies (CACS), and Department Head of the Computer Science Department at the University of Louisiana at Lafayette (UL Lafayette). He is also the Z.L. Loflin Eminent Scholar Endowed Chair Professor in Computer Science.  Dr. Bayoumi has been a faculty member in CACS since 1985.  He received B.Sc. and M.Sc. degrees inElectrical Engineering from Cairo University, Egypt; M.Sc. degree in Computer Engineering from Washington University, St. Louis; and Ph.D. degree in Electrical Engineering from the University of Windsor, Canada. Dr. Bayoumi is the recipient of the 2009 IEEE Circuits and Systems Meritorious Service Award. Dr. Bayoumi is the recipient of the IEEE Circuits and Systems Society 2003 Education Award, and he is an IEEE Fellow.  He was on the governor's commission for developing a comprehensive energy policy for the State of Louisiana.  He represented the CAS Society on the IEEE National Committee on Engineering R&D policy, IEEE National Committee on Communication and Information Policy, and IEEE National Committee on Energy Policy. He is also active in the Renewable & Green Energy and Globalization: Technology, Economic and Culture fields.