Muutke küpsiste eelistusi

Security in RFID and Sensor Networks [Pehme köide]

Edited by (Hellenic Open University, Patras, Greece)
  • Formaat: Paperback / softback, 556 pages, kõrgus x laius: 254x178 mm, kaal: 1043 g
  • Ilmumisaeg: 23-Sep-2019
  • Kirjastus: CRC Press
  • ISBN-10: 0367385767
  • ISBN-13: 9780367385767
  • Formaat: Paperback / softback, 556 pages, kõrgus x laius: 254x178 mm, kaal: 1043 g
  • Ilmumisaeg: 23-Sep-2019
  • Kirjastus: CRC Press
  • ISBN-10: 0367385767
  • ISBN-13: 9780367385767

In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies.



Exposes Security Risks





The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications.



Offers Viable Solutions





In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.



Editors ix
Contributors xi
PART I Security in RFID
Chapter 1 Multi-Tag RFID Systems
3(26)
Leonid Bolotnyy
Gabriel Robins
Chapter 2 Attacking RFID Systems
29(20)
Pedro Peris-Lopez
Julio Cesar Hernandez-Castro
Juan M. Estevez-Tapiador
Arturo Ribagorda
Chapter 3 RFID Relay Attacks: System Analysis, Modeling, and Implementation
49(28)
Augusto Lima
Ali Miri
Monica Nevins
Chapter 4 Physical Privacy and Security in RFID Systems
77(22)
Leonid Bolotnyy
Gabriel Robins
Chapter 5 Authentication Protocols in RFID Systems
99(22)
Goran Pantelic
Slobodan Bojanic
Violeta Tomasevic
Chapter 6 Lightweight Cryptography for Low-Cost RFID Tags
121(30)
Pedro Peris-Lopez
Julio Cesar Hernandez-Castro
Juan M. Estevez-Tapiador
Arturo Ribagorda
Chapter 7 Distance-Bounding Protocols for RFID
151(20)
Jorge Munilla Fajardo
Alberto Peinado Dominguez
Chapter 8 Secure Proximity Identification for RFID
171(24)
Gerhard P. Hancke
Saar Drimer
Chapter 9 Public Key in RFIDs: Appeal for Asymmetry
195(22)
Erwing R. Sanchez
Filippo Gandino
Bartolomeo Montrucchio
Maurizio Rebaudengo
Chapter 10 Scalable RFID Privacy Protecting Schemes
217(20)
Sepideh Fouladgar
Hossam Afifi
Chapter 11 A Secure RFID Access Control Mechanism
237(18)
Dijiang Huang
Zhibin Zhou
Chapter 12 Threat Modeling in EPC-Based Information Sharing Networks
255(18)
Alexander Ilic
Trevor Burbridge
Andrea Soppera
Florian Michahelles
Elgar Fleisch
Chapter 13 RFID-Based Secure DVD Content Distribution
273(20)
Shiguo Lian
Zhongxuan Liu
PART II Security in Wireless Sensor Networks
Chapter 14 A Survey on Security in Wireless Sensor Networks
293(28)
Qinghua Wang
Tingting Zhang
Chapter 15 Intrusion Detection in Wireless Sensor Networks
321(20)
Thanassis Giannetsos
Ioannis Krontiris
Tassos Dimitriou
Felix C. Freiling
Chapter 16 Key Establishment in Wireless Sensor Networks
341(20)
Ioannis Chatzigiannakis
Elisavet Konstantinou
Chapter 17 Malicious Node Detection in Wireless Sensor Networks
361(14)
Yu Chen
Hao Chen
Wei-Shinn Ku
Chapter 18 Jamming in Wireless Sensor Networks
375(24)
Aristides Mpitziopoulos
Damianos Gavalas
Charalampos Konstantopoulos
Grammati Pantziou
Chapter 19 Concealed Data Aggregation for Wireless Sensor Networks
399(20)
Aldar C.-F. Chan
Chapter 20 Message Authentication in Surveillance Networks
419(26)
Raymond Sbrusch
T. Andrew Yang
Chapter 21 A Broadcasting Authentication Protocol with DoS and Fault Tolerance for Wireless Ad Hoc Networks
445(24)
Yixin Jiang
Minghui Shi
Xuemin (Sherman) Shen
Chuang Lin
Xiaowen Chu
PART III Security in Integerated RFID and WSN
Chapter 22 Threats and Vulnerabilities of RFID and Beyond
469(20)
Jaap-Henk Hoepman
Thijs Veugen
Chapter 23 Finite Field Arithmetic for RFID and Sensor Networks
489(20)
Jose L. Imaha
Chapter 24 Designing Secure Wireless Embedded Systems
509(16)
Ilker Onat
Ali Miri
Index 525
Yan Zhang, Paris Kitsos