E-Book, Englisch, 560 Seiten
E-Book, Englisch, 560 Seiten
Reihe: Wireless Networks and Mobile Communications
ISBN: 978-1-4200-6840-5
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Exposes Security Risks
The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications.
Offers Viable Solutions
In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.
Zielgruppe
Undergraduate students, postgraduate students, scientists, researchers, engineers, research strategists, developers consultants, technical managers, and network engineers developing RFID, WSNs, and integrated RFID and WSNs.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Security in RFID
Multi-Tag RFID Systems, L. Bolotnyy and G. Robins
Attacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda
RFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. Nevins
Physical Privacy and Security in RFID Systems, L. Bolotnyy and G. Robins
Authentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. Tomaševic
Lightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda
Distance-Bounding Protocols for RFID, J.M. Fajardo and A.P. Domínguez
Secure Proximity Identification for RFID, G.P. Hancke and S. Drimer
Public Key in RFIDs: Appeal for Asymmetry, E.R. Sanchez, F. Gandino, B. Montrucchio, and M. Rebaudengo
Scalable RFID Privacy Protecting Schemes, S. Fouladgar and H. Afifi
A Secure RFID Access Control Mechanism, D. Huang and Z. Zhou
Threat Modeling in EPC-Based Information Sharing Networks, A. Ilic, T. Burbridge, A. Soppera, F. Michahelles, and E. Fleisch
RFID-Based Secure DVD Content Distribution, S. Lian and Z. Liu
Security in Wireless Sensor Networks
A Survey on Security in Wireless Sensor Networks, Q. Wang and T. Zhang
Intrusion Detection in Wireless Sensor Networks, T. Giannetsos, I. Krontiris, T. Dimitriou, and F.C. Freiling
Key Establishment in Wireless Sensor Networks, I. Chatzigiannakis and E. Konstantinou
Malicious Node Detection in Wireless Sensor Networks, Y. Chen, H. Chen, and W.-S. Ku
Jamming in Wireless Sensor Networks, A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou
Concealed Data Aggregation for Wireless Sensor Networks, A.C.-F. Chan
Message Authentication in Surveillance Networks, R. Sbrusch and T.A. Yang
A Broadcasting Authentication Protocol with DoS and Fault Tolerance For Wireless Ad Hoc Networks, Y. Jiang, M. Shi, X. (S.) Shen, C. Lin, and X. Chu
Security in Integerated RFID and WSN
Threats and Vulnerabilities of RFID and Beyond, J.-H. Hoepman and T. Veugen
Finite Field Arithmetic for RFID and Sensor Networks, J.L. Imaña
Designing SecureWireless Embedded Systems, I. Onat and A. Miri
Index