|
![]() |
|||
|
||||
OverviewThe rapid growth of RFID use in various supply chain operations, which has arisen from the development of Electronic Product Code (EPC) technology, has created a need for the consideration of security issues in the adoption of that technology. As the originators of EPC technology, the Auto-ID Center laboratories, es- blished at MIT in 1999, and extended in subsequent years to become an assoc- tion of seven laboratories around the world, have taken a keen interest in the workings of EPC in practical applications. The laboratories, now called the Auto- ID Laboratories, have adopted all questions surrounding security of these appli- tions as a principal research interest. Their research has been primarily concerned with the ability of RFID to combat the widespread counterfeiting that has emerged in many supply chains and that is not adequately suppressed by non-RFID security technologies. This book is the outcome of that research. The Auto-ID Laboratories network, whose members have provided the ch- ters of this book, consist of laboratories at The Massachusetts Institute of Te- nology in the USA, Cambridge University in the UK, The University of Adelaide in Australia, Keio University in Japan, Fudan University in China, The University of St. Gallen and The Swiss Federal Institute of Technology in Switzerland, and The Information and Communications University in Korea. Together, they have been and continue to be engaged in assembling the building blocks needed to create an “Internet of things”. Full Product DetailsAuthor: Peter H. Cole , Damith C. RanasinghePublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: Softcover reprint of hardcover 1st ed. 2008 Dimensions: Width: 15.50cm , Height: 1.90cm , Length: 23.50cm Weight: 0.557kg ISBN: 9783642090790ISBN 10: 3642090796 Pages: 355 Publication Date: 15 October 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contentsfrom the editors.- from the editors.- Anti-counterfeiting and RFID.- Anti-Counterfeiting and Supply Chain Security.- Networked RFID Systems.- EPC Network Architecture.- A Security Primer.- Security and Privacy Current Status.- Addressing Insecurities and Violations of Privacy.- RFID Tag Vulnerabilities in RFID Systems.- An Evaluation Framework.- From Identification to Authentication – A Review of RFID Product Authentication Techniques.- Network Based Solutions.- EPC System for a Safe & Secure Supply Chain and How it is Applied.- The Potential of RFID and NFC in Anti-Counterfeiting.- Improving the Safety and Security of the Pharmaceutical Supply Chain.- Cryptographic Solutions.- Product Specific Security Based on RFID Technology.- Strengthening the Security of Machine-Readable Documents.- Enhancing Security of Class I Generation 2 RFID against Traceability and Cloning.- A Random Number Generator for Application in RFID Tags.- A Low Cost Solution to Cloning and Authentication Based on a Lightweight Primitive.- Lightweight Cryptography for Low Cost RFID.ReviewsFrom the reviews: ""Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting is written to introduce readers to the new, complex and sometimes shadowy world of RFID cryptography. The book is divided into four sections, covering key aspects of the field. … The articles … present a generally comprehensive view of the issues and challenges facing RFID cryptographic technology developers and users. … for any enterprise considering the adoption of counterfeit-fighting RFID technology, Networked RFID Systems and Lightweight Cryptography remains a valuable information resource."" (Radio Frequency Identification Journal, August, 2008) From the reviews: Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting is written to introduce readers to the new, complex and sometimes shadowy world of RFID cryptography. The book is divided into four sections, covering key aspects of the field. ! The articles ! present a generally comprehensive view of the issues and challenges facing RFID cryptographic technology developers and users. ! for any enterprise considering the adoption of counterfeit-fighting RFID technology, Networked RFID Systems and Lightweight Cryptography remains a valuable information resource. (Radio Frequency Identification Journal, August, 2008) Author InformationTab Content 6Author Website:Countries AvailableAll regions |