|
Part I RFID Security Preliminaries |
|
|
|
|
3 | (24) |
|
1.1 Automatic Identification |
|
|
4 | (2) |
|
1.2 RFID History and Standardization |
|
|
6 | (1) |
|
|
7 | (5) |
|
1.3.1 Logistics and Supply Chain Management |
|
|
8 | (2) |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.3.4 Security and Identification |
|
|
11 | (1) |
|
1.3.5 Toll Systems and Payment Applications |
|
|
11 | (1) |
|
1.3.6 Tacking Applications |
|
|
11 | (1) |
|
1.3.7 RIDF and Smart Objects |
|
|
12 | (1) |
|
|
12 | (2) |
|
1.5 RFID Construction Formats |
|
|
14 | (2) |
|
|
16 | (5) |
|
1.6.1 Communication Mechanism |
|
|
16 | (1) |
|
|
17 | (1) |
|
1.6.3 Operating Frequency |
|
|
17 | (2) |
|
|
19 | (2) |
|
1.7 How Passive RFID Tags Work |
|
|
21 | (1) |
|
1.8 RFID Systems Advantages and Challenges |
|
|
22 | (2) |
|
1.8.1 Advantages of RFID Systems |
|
|
23 | (1) |
|
1.8.2 Challenges to RFID Systems |
|
|
23 | (1) |
|
|
24 | (3) |
|
|
25 | (2) |
|
2 RFID Security Threats and Basic Solutions |
|
|
27 | (16) |
|
2.1 Security Attacks in RFID Systems |
|
|
27 | (6) |
|
2.1.1 Physical RFID Threats |
|
|
28 | (1) |
|
2.1.2 RFID Channel Threats |
|
|
29 | (3) |
|
|
32 | (1) |
|
2.2 RFID Security Measures and Defenses |
|
|
33 | (6) |
|
2.2.1 Physical Solutions for RFID Privacy Protection |
|
|
34 | (4) |
|
|
38 | (1) |
|
|
39 | (4) |
|
|
40 | (3) |
|
3 Cryptography in RFID Systems |
|
|
43 | (32) |
|
3.1 Wireless Security Preliminaries |
|
|
44 | (1) |
|
3.2 Cryptography Overview |
|
|
45 | (5) |
|
3.2.1 Symmetric Private Key Encryption |
|
|
45 | (1) |
|
3.2.2 Asymmetric Public Key Encryption |
|
|
46 | (2) |
|
|
48 | (2) |
|
3.3 Lightweight Cryptography |
|
|
50 | (1) |
|
3.4 Asymmetric Key Encryption Lightweight Cryptosystems |
|
|
51 | (2) |
|
3.4.1 Elliptical Curve Cryptography (ECC) |
|
|
52 | (1) |
|
3.5 Symmetric Key Encryption Lightweight Cryptosystems |
|
|
53 | (14) |
|
|
53 | (6) |
|
|
59 | (5) |
|
|
64 | (3) |
|
3.6 Motivation for RBS Lightweight RFID Cryptosystems |
|
|
67 | (2) |
|
3.6.1 RBS Design Objectives |
|
|
68 | (1) |
|
|
69 | (6) |
|
|
69 | (6) |
|
Part II Lightweight RFID Redundant Bit Security |
|
|
|
|
75 | (26) |
|
4.1 Key and Number of Redundant Bits |
|
|
76 | (5) |
|
|
76 | (4) |
|
4.1.2 Flexibility in Security Level |
|
|
80 | (1) |
|
4.2 Location of Redundant Bits |
|
|
81 | (1) |
|
4.3 Value of Redundant Bits |
|
|
81 | (4) |
|
4.3.1 Message Authentication and Data Integrity |
|
|
82 | (2) |
|
4.3.2 Message Authentication and Redundant Bits |
|
|
84 | (1) |
|
4.4 Plaintext Manipulation |
|
|
85 | (2) |
|
4.4.1 Direct Appearance Inside the Ciphertext |
|
|
85 | (1) |
|
4.4.2 Bitwise Addition with a Constant-Value Keystream |
|
|
86 | (1) |
|
4.4.3 Bitwise Addition with Variable-Value Keystream |
|
|
86 | (1) |
|
|
87 | (11) |
|
|
87 | (2) |
|
4.5.2 Chosen MAC Algorithm for RBS |
|
|
89 | (3) |
|
4.5.3 Adapting the Chosen MAC to RBS |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
95 | (1) |
|
4.5.6 Reception/Transmission |
|
|
95 | (3) |
|
|
98 | (1) |
|
|
98 | (3) |
|
|
100 | (1) |
|
|
101 | (16) |
|
|
101 | (1) |
|
5.2 Mathematical Background |
|
|
102 | (2) |
|
5.3 RBS Security Against Common Attacks |
|
|
104 | (11) |
|
|
104 | (1) |
|
5.3.2 Known-Plaintext Attack |
|
|
105 | (1) |
|
5.3.3 Chosen-Plaintext Attack |
|
|
105 | (1) |
|
5.3.4 Chosen-Ciphertext Attack |
|
|
106 | (1) |
|
5.3.5 Differential Attack |
|
|
107 | (2) |
|
5.3.6 Substitution Attack |
|
|
109 | (1) |
|
|
109 | (2) |
|
5.3.8 Linear Cryptanalysis |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
5.3.11 Side Channel Attack |
|
|
113 | (2) |
|
|
115 | (2) |
|
|
115 | (2) |
|
6 RBS Performance Evaluation |
|
|
117 | (30) |
|
6.1 ASIC Implementation of RBS |
|
|
118 | (2) |
|
6.2 Comparison of Ciphers |
|
|
120 | (20) |
|
|
123 | (2) |
|
|
125 | (6) |
|
|
131 | (2) |
|
6.2.4 Hardware Efficiency |
|
|
133 | (1) |
|
|
133 | (3) |
|
|
136 | (1) |
|
|
136 | (2) |
|
|
138 | (1) |
|
6.2.9 Power-Area-Time Product |
|
|
139 | (1) |
|
|
140 | (7) |
|
|
145 | (2) |
|
7 RBS RFID Security and the Internet of Things |
|
|
147 | (16) |
|
7.1 RBS Characterizing Features |
|
|
148 | (1) |
|
7.2 RBS Future Extensions |
|
|
149 | (1) |
|
7.3 The Internet of Things (IoT) |
|
|
150 | (4) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
154 | (1) |
|
7.4 RFID Systems in Internet of Things (IoT) |
|
|
154 | (3) |
|
7.4.1 The Architecture of IoT Based on RFID |
|
|
155 | (1) |
|
7.4.2 IoT Additional Requirements from RFID Systems |
|
|
156 | (1) |
|
7.4.3 Security Issues with RFID-Based IoT Architectures |
|
|
156 | (1) |
|
7.5 Integrating RFID in IoT Applications |
|
|
157 | (3) |
|
7.5.1 RFID with Sensing Capabilities |
|
|
157 | (1) |
|
7.5.2 Integrating RFID in Sensor Node Architectures |
|
|
157 | (2) |
|
7.5.3 Integrating RFID Readers in Sensor Node Architectures |
|
|
159 | (1) |
|
7.5.4 Mixed RFID/WSN Architecture |
|
|
160 | (1) |
|
7.6 RFID-Based IoT Applications |
|
|
160 | (3) |
|
7.6.1 Health Care Applications |
|
|
160 | (1) |
|
7.6.2 Supply Chain Applications |
|
|
161 | (1) |
|
7.6.3 Battlefield Applications |
|
|
161 | (1) |
|
|
161 | (2) |
Glossary |
|
163 | (2) |
About the Authors |
|
165 | (4) |
Index |
|
169 | |