RFID security /
Frank Thornton, Brad Haines...[et.al.].
- Rockland, MA : Syngress Media, 2006.
- xix, 448 p. ; 25 cm.
Discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. This work includes coverage of topics such as: security breaches for monetary gain; how to protect the supply chain; and how to protect personal privacy.
Chapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management.
1597490474
Radio frequency identification systems. Data transmission systems. Computers--Communications--Networking.