RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips.
Cited By
- Wang P, Yan Z and Zeng K (2022). BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications, IEEE Transactions on Information Forensics and Security, 17, (2818-2834), Online publication date: 1-Jan-2022.
- Mazumdar B, Ali S and Sinanoglu O (2016). A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities, ACM Transactions on Design Automation of Electronic Systems, 22:1, (1-26), Online publication date: 28-Dec-2016.
Index Terms
- RFID Security: Techniques, Protocols and System-On-Chip Design
Recommendations
A survey on RFID security and provably secure grouping-proof protocols
RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, we attempt to summarise current research in the ...
Security analysis of an RFID tag search protocol
Over the past decade, tag search protocols have been suggested to efficiently acquire a specific RFID tag among a large group of tags by an RFID reader. For instance, in a warehouse, where there are thousands of packages each having an RFID tag attached,...