Skip to main content
  • Book
  • © 2008

Networked RFID Systems and Lightweight Cryptography

Raising Barriers to Product Counterfeiting

  • Highlighting advanced RFID systems

  • Presenting the use of lightweight cryptography to address security and privacy related issues

  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 chapters)

  1. Front Matter

    Pages I-VIII
  2. Introduction from the editors

    1. Introduction from the editors

      • Peter H. Cole, Damith C. Ranasinghe
      Pages 1-30
  3. Anti-counterfeiting and RFID

    1. Front Matter

      Pages 31-31
    2. Anti-Counterfeiting and Supply Chain Security

      • Thorsten Staake, Florian Michahelles, Elgar Fleisch, John R. Williams, Hao Min, Peter H. Cole et al.
      Pages 33-43
    3. Networked RFID Systems

      • Damith C. Ranasinghe, Peter H. Cole
      Pages 45-58
    4. EPC Network Architecture

      • Damith C. Ranasinghe, Mark Harrison, Peter H. Cole
      Pages 59-78
    5. A Security Primer

      • Manfred Jantscher, Raja Ghosal, Alfio Grasso, Peter H. Cole
      Pages 79-98
  4. Security and Privacy Current Status

    1. Front Matter

      Pages 99-99
    2. Addressing Insecurities and Violations of Privacy

      • Damith C. Ranasinghe, Peter H. Cole
      Pages 101-145
    3. RFID Tag Vulnerabilities in RFID Systems

      • Behnam Jamali, Peter H. Cole, Daniel Engels
      Pages 147-155
    4. An Evaluation Framework

      • Damith C. Ranasinghe, Peter H. Cole
      Pages 157-167
    5. From Identification to Authentication – A Review of RFID Product Authentication Techniques

      • Mikko Lehtonen, Thorsten Staake, Florian Michahelles
      Pages 169-187
  5. Network Based Solutions

    1. Front Matter

      Pages 189-189
    2. The Potential of RFID and NFC in Anti-Counterfeiting

      • Mikko Lehtonen, Thorsten Staake, Florian Michahelles, Elgar Fleisch
      Pages 211-222
  6. Cryptographic Solutions

    1. Front Matter

      Pages 247-247
    2. Product Specific Security Based on RFID Technology

      • Thorsten Staake, Zoltan Nochta, Elgar Fleisch
      Pages 249-252
    3. Strengthening the Security of Machine-Readable Documents

      • Mikko Lehtonen, Thorsten Staake, Florian Michahelles, Elgar Fleisch
      Pages 253-267
    4. Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning

      • Dang Nguyen Duc, Hyunrok Lee, Kwangjo Kim
      Pages 269-277

About this book

The rapid growth of RFID use in various supply chain operations, which has arisen from the development of Electronic Product Code (EPC) technology, has created a need for the consideration of security issues in the adoption of that technology. As the originators of EPC technology, the Auto-ID Center laboratories, es- blished at MIT in 1999, and extended in subsequent years to become an assoc- tion of seven laboratories around the world, have taken a keen interest in the workings of EPC in practical applications. The laboratories, now called the Auto- ID Laboratories, have adopted all questions surrounding security of these appli- tions as a principal research interest. Their research has been primarily concerned with the ability of RFID to combat the widespread counterfeiting that has emerged in many supply chains and that is not adequately suppressed by non-RFID security technologies. This book is the outcome of that research. The Auto-ID Laboratories network, whose members have provided the ch- ters of this book, consist of laboratories at The Massachusetts Institute of Te- nology in the USA, Cambridge University in the UK, The University of Adelaide in Australia, Keio University in Japan, Fudan University in China, The University of St. Gallen and The Swiss Federal Institute of Technology in Switzerland, and The Information and Communications University in Korea. Together, they have been and continue to be engaged in assembling the building blocks needed to create an “Internet of things”.

Reviews

From the reviews:

"Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting is written to introduce readers to the new, complex and sometimes shadowy world of RFID cryptography. The book is divided into four sections, covering key aspects of the field. … The articles … present a generally comprehensive view of the issues and challenges facing RFID cryptographic technology developers and users. … for any enterprise considering the adoption of counterfeit-fighting RFID technology, Networked RFID Systems and Lightweight Cryptography remains a valuable information resource." (Radio Frequency Identification Journal, August, 2008)

Editors and Affiliations

  • School of Electrical and Electronic Engineering, University of Adelaide, Adelaide, Australia

    Peter H. Cole, Damith C. Ranasinghe

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access