RFID Middleware IntroductionElectronic Product Code System Network ArchitectureEPC Network Software Architecture ComponentsReadersRFID MiddlewareEPC Information ServiceObject Name ServiceONS Local CacheEPC Network Data StandardsEPCPMLRFID Middleware OverviewReader Layer—Operational OverviewSmoothing and Event Generation StageEvent Filter StageReport Buffer StageInteractions with Wireless LANs802.11 WLANAttacking Middleware with the Air InterfaceUnderstanding Security Fundamentals and Principles of ProtectionUnderstanding PKIs and Wireless NetworkingUnderstanding the Role of Encryption in RFID MiddlewareOverview of CryptographySymmetric CiphersAsymmetric CiphersElliptic Curve CiphersUnderstanding How a Digital Signature WorksBasic Digital Signature and Authentication ConceptsWhy a Signature Is Not a MACPublic and Private KeysWhy a Signature Binds Someone to a DocumentLearning the W3C XML Digital SignatureApplying XML Digital Signatures to SecurityUsing Advanced Encryption Standard for Encrypting RFID Data StreamsAddressing Common Risks and ThreatsExperiencing Loss of DataLoss of Data ScenarioThe Weaknesses in WEPCriticisms of the Overall DesignWeaknesses in the Encryption AlgorithmWeaknesses in Key ManagementSecuring RFID Data Using MiddlewareFieldsUsing DES in RFID Middleware for Robust EncryptionUsing Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data StreamsApplication Layer GatewayProviding Bulletproof Security Using Discovery, Resolution, and Trust Services in AdaptLink™Discovery ServiceResolution, ONS, and the EPC RepositoryEPC Trust ServicesSummary