Analysis and Modeling

  • PDF / 5,681,758 Bytes
  • 275 Pages / 439.37 x 666.142 pts Page_size
  • 51 Downloads / 226 Views

DOWNLOAD

REPORT


Dirk Henrici

RFID Security and Privacy Concepts, Protocols, and Architectures

123

Dr. Dirk Henrici University of Kaiserslautern 67653 Kaiserslautern Germany [email protected]

ISBN: 978-3-540-79075-4

e-ISBN: 978-3-540-79076-1

Library of Congress Control Number: 2008924615 c 2008 Springer-Verlag Berlin Heidelberg  This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: eStudio Calamar S.L. Printed on acid-free paper 9 8 7 6 5 4 3 2 1 springer.com

Dedicated to all dear people accompanying me on the journey of life

Preface

In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better solutions.” I concerned myself with the topic in my spare time. After having developed my first solutions, I asked my supervisor, Prof. Dr. Paul M¨uller, whether I could write a paper about my results. As the topic did not fit into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security, privacy, and RFID systems. I wish the reader many new insights. There are many people I would like to thank. First of all, my thanks go to my supervisor, Prof. Dr. Paul M¨uller. He gave me room for creativity and plenty of rope to work on my own. Thereby, he always trusted in my skills, gave helpful hints, and his door stood open for me at all times. He also suggested the publication of this book. Thanks also go to various persons that supported me in finishing this work. As representatives for all of them, I’d like to mention Prof. Dr. Friedemann Mattern for spending his rare available time on rating my research and encouraging me to go on working, Prof. Dr. Karsten B