|
Preface |
6 |
|
|
Contents |
8 |
|
|
Outline |
11 |
|
|
1 Motivation and Vision |
13 |
|
|
2 Fundamentals |
17 |
|
|
2.1 Radio-Frequency Identification |
17 |
|
|
2.2 Security |
33 |
|
|
2.3 Privacy |
37 |
|
|
2.4 Cryptographic Primitives |
55 |
|
|
2.5 Summary |
65 |
|
|
3 Analysis and Modeling |
67 |
|
|
3.1 Motivating Examples |
68 |
|
|
3.2 Threats |
70 |
|
|
3.3 Goals |
74 |
|
|
3.4 Challenges |
75 |
|
|
3.5 Attacker Capabilities |
77 |
|
|
3.6 Attacks on RFID Systems |
83 |
|
|
3.7 Current Situation |
85 |
|
|
3.8 Assessment of RFID Security and Privacy |
89 |
|
|
3.9 Summary |
90 |
|
|
4 Securing RFID Systems |
91 |
|
|
4.1 Data Management |
92 |
|
|
4.2 Discussion of Security and Privacy Goals |
93 |
|
|
4.3 Overview of Functionality Regarding Tags |
96 |
|
|
4.4 Implementation Considerations |
97 |
|
|
4.5 Discussion of Basic Functionality |
100 |
|
|
4.6 Additional Building Blocks |
130 |
|
|
4.7 Evaluation Criteria |
134 |
|
|
4.8 Hash-based ID Variation |
138 |
|
|
4.9 Summary |
153 |
|
|
5 Pseudonymization Infrastructures |
155 |
|
|
5.1 Motivation |
155 |
|
|
5.2 Basic Idea for Addressing the Problem |
156 |
|
|
5.3 Pseudonymization: Introduction and Related Work |
157 |
|
|
5.4 Definition of Requirements and Common Concepts |
161 |
|
|
5.5 Attack Targets and Attacker Capabilities |
163 |
|
|
5.6 Approach Based on Asymmetric Encryption |
165 |
|
|
5.7 Basic Approach Based on Hash Functions |
170 |
|
|
5.8 Advanced Approach Based on Hash Functions |
177 |
|
|
5.9 Hash Collisions and Pseudonym Shortening in Hash-Based Approaches |
186 |
|
|
5.10 Summary and Research Directions |
188 |
|
|
6 Extending the RFID System Model |
190 |
|
|
6.1 Classic RFID Model |
191 |
|
|
6.2 Untrusted Reading Entities |
192 |
|
|
6.3 Tag Bearer as Additional Entity |
196 |
|
|
6.4 Personal Manager |
199 |
|
|
6.5 Assembling the Building Blocks |
203 |
|
|
6.6 Summary |
205 |
|
|
7 Current Research |
207 |
|
|
7.1 Partial Solutions |
207 |
|
|
7.2 ID-Zone Architecture |
221 |
|
|
7.3 Summary |
253 |
|
|
List of Figures |
255 |
|
|
List of Tables |
258 |
|
|
References |
259 |
|
|
Index |
271 |
|