Book description
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA."
For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book!
* For most business organizations, adopting RFID is a matter of when
* The RFID services market is expected to reach $4 billion by 2008
* Covers vulnerabilities and personal privacy--topics identified by major companies as key RFID issues
Table of contents
- Copyright
- Technical Editors
- Contributing Authors
- 1. Physics, Math, and RFID: Mind the Gap
- 2. The Physics of RFID
- 3. Working with RFID Tags
- 4. Working with Interrogation Zones
- 5. Working with Regulations and Standards
- 6. Selecting the RFID System Design
- 7. Performing Site Analysis
- 8. Performing Installation
- 9. Working With RFID Peripherals
- 10. Monitoring and Troubleshooting RFID Systems
- 11. Threat and Target Identification
- 12. RFID Attacks: Tag Encoding Attacks
- 13. RFID Attacks: Tag Application Attacks
-
14. RFID Attacks: Securing Communications Using RFID Middleware
- RFID Middleware Introduction
- Attacking Middleware with the Air Interface
-
Understanding Security Fundamentals and Principles of Protection
- Understanding PKIs and Wireless Networking
- Understanding the Role of Encryption in RFID Middleware
- Symmetric Ciphers
-
Understanding How a Digital Signature Works
- Basic Digital Signature and Authentication Concepts
- Why a Signature Is Not a MAC
- Public and Private Keys
- Why a Signature Binds Someone to a Document
- Learning the W3C XML Digital Signature
- Applying XML Digital Signatures to Security
- Using Advanced Encryption Standard for Encrypting RFID Data Streams
- Addressing Common Risks and Threats
- Experiencing Loss of Data
- The Weaknesses in WEP
- Criticisms of the Overall Design
- Weaknesses in the Encryption Algorithm
- Weaknesses in Key Management
- Securing RFID Data Using Middleware
- Using DES in RFID Middleware for Robust Encryption
- Using Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data Streams
- Providing Bulletproof Security Using Discovery, Resolution, and Trust Services in AdaptLink™
- Summary
- 15. RFID Security: Attacking the Backend
- 16. Management of RFID Security
Product information
- Title: How to Cheat at Deploying and Securing RFID
- Author(s):
- Release date: April 2011
- Publisher(s): Syngress
- ISBN: 9780080556895
You might also like
book
RFID For Dummies®
Many companies have asked suppliers to begin using RFID (radio frequency identification) tags by 2006 RFID …
book
RFID Field Guide: Deploying Radio Frequency Identification Systems
The Practical RFID Deployment Guide Whatever your industry or application, RFID Field Guide is your comprehensive …
book
UHF RFID Technologies for Identification and Traceability
UHF Radio Frequency Identification (RFID) is an electronic tagging technology that allows an object, place or …
book
Getting Started with RFID
If you want to experiment with radio frequency identification (RFID), this book is the perfect place …