RFID : Applications, Security, and Privacy (Hardcover)
暫譯: RFID:應用、安全性與隱私(精裝版)

Simson Garfinkel, Beth Rosenberg

  • 出版商: Addison Wesley
  • 出版日期: 2005-07-16
  • 定價: $2,100
  • 售價: 8.0$1,680
  • 語言: 英文
  • 頁數: 608
  • 裝訂: Hardcover
  • ISBN: 0321290968
  • ISBN-13: 9780321290960
  • 相關分類: RFID資訊安全
  • 立即出貨(限量) (庫存=9)

買這商品的人也買了...

商品描述

Description:

Radio frequency identification (RFID) technology is rapidly becoming ubiquitous as businesses seek to streamline supply chains and respond to mandates from key customers. But RFID and other new wireless ID technologies raise unprecedented privacy issues. RFID: Applications, Security, and Privacy covers these issues from every angle and viewpoint.

Award-winning technology journalist and privacy expert Simson Garfinkel brings together contributions from every stakeholder community—from RFID suppliers to privacy advocates and beyond. His contributors introduce today’s leading wireless ID technologies, trace their evolution, explain their promise, assess their privacy risks, and evaluate proposed solutions—technical, business, and political. The book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet. Highlights include

  • How RFID and other wireless ID technologies work
  • RFID applications—from gas stations and pharmacies to the twenty-first century battlefield
  • RFID, privacy, and the law—in the United States and around the world
  • RFID, security, and industrial espionage
  • How Bluetooth and Wi-Fi can track individuals, with or without their permission
  • Technical solutions to wireless ID privacy concerns—their values and limitations
  • Stakeholder perspectives from EPCglobal, Inc., Gemplus, The Procter & Gamble Company, and other industry leaders
  • The future of citizen activism on privacy issues

Clear, balanced, and accessible, this is the indispensable primer for everyone involved in RFID: businesses implementing or evaluating RFID; technology suppliers responding to user concerns; and policymakers and privacy advocates who want a deeper understanding of the technology and its implications.

 

Table of Contents:

Foreword.

Preface.

Acknowledgments.

I: PRINCIPLES.

1. Automatic Identification and Data Collection: What the Future Holds.

    Introduction

    A Brief History of AIDC

    The "Industry" That Isn't

    The Interconnected World

    Clear and Present Benefits

    Future Applications

    Conclusions

2. Understanding RFID Technology.

    Introduction

    RFID Technology

    RFID Applications

    Conclusions

3. A History of the EPC.

    Introduction

    The Beginning

    A Mini-Lecture: The Supply Chain

    The Auto-ID Center

    Harnessing the Juggernaut

    Conclusions

4. RFID and Global Privacy Policy.

    Introduction

    Definitions of Privacy

    Mapping the RFID Discovery Process

    Privacy as a Fundamental Human Right

    Privacy Through Data Protection Law and Fair Information Practices

    Conclusions

5. RFID, Privacy, and Regulation.

    Introduction

    Some Current and Proposed RFID Applications

    Whither Item-Level Tagging?

    Understanding RFID's Privacy Threats

    Conclusions

6. RFID and the United States Regulatory Landscape.

    Introduction

    Current State of RFID Policy

    RFID Policy Issues

    Government Versus Individual Context

    Business Versus Individual Context

    Industry Leadership

    Options for Government Leadership

    Snapshot of Current Status

    Policy Prescriptions

    The Case for, and Limits of, EPCglobal Leadership

    Conclusions

7. RFID and Authenticity of Goods.

    Introduction

    A Few Important Concepts in Authentication

    Authenticity of Tags and Authenticity of Goods

    Authenticity of Goods and Anticounterfeiting Measures

    Authentication of Readers

    Authentication of Users Across the Supply Chain (Federation)

    Conclusions

8. Location and Identity: A Brief History.

    Introduction

    Place and Identity in a World of Habits and Symbols

    Locational Technologies

    Rethinking Identity: Beyond Traits and Names

    On RFID

    Conclusions

9. Interaction Design for Visible Wireless.

    Introduction

    The Role of Interaction Design

    A Common Vocabulary

    Designing and Modifying WID Systems

    Conclusions

II: APPLICATIONS.

10. RFID Payments at ExxonMobil.

    Introduction

    Interview with Joe Giordano, ExxonMobil Corporation

11. Transforming the Battlefield with RFID.

    Introduction

    Logistics and the Military

    Conclusions

12. RFID in the Pharmacy: Q&A with CVS.

    Introduction

    CVS and Auto-ID

    Project Jump Start

    RFID in the Store

    Making RFID Work: The Back End

13. RFID in Healthcare.

    Introduction

    Home Eldercare

    Challenges

    Conclusions

14. Wireless Tracking in the Library: Benefits, Threats, and Responsibilities.

    Introduction

    RFID System Components and Their Effects in Libraries

    RFID Standards

    RFID in U.S. Libraries

    Best-Practices Guidelines for Library Use of RFID

    Conclusions

15. Tracking Livestock with RFID.

    Introduction

    RFID Has to Prove Itself

    Putting RFID to Work

    RFID and Livestock Marketing

    RFID World Livestock Roundup

III: THREATS.

16. RFID: The Doomsday Scenario.

    Introduction

    RFID Tags and the EPC Code

    A Ubiquitous RFID Reader Network

    Watching Everything: RFID and the Four Databases It Will Spawn

    Corporate Abuse

    Government Abuse

    Conclusions

17. Multiple Scenarios for Private-Sector Use of RFID.

    Introduction

    Scenario 1: "No One Wins"

    Scenario 2: "Shangri-La"

    Scenario 3: "The Wild West"

    Scenario 4: "Trust but Verify"

    Conclusions

18. Would Macy's Scan Gimbels?: Competitive Intelligence and RFID.

    Introduction

    In-Store Scenarios

    So, Who Wants to Know?

    Conclusions

19. Hacking the Prox Card.

    Introduction

    Reverse-Engineering the Protocol

    Security Implications

    Protecting Against These Types of Attacks

    Conclusions

20. Bluejacked!

    Introduction

    Bluetooth

    Bluetooth Security and Privacy Attacks

    Conclusions

IV: TECHNICAL SOLUTIONS.

21. Technological Approaches to the RFID Privacy Problem.

    Introduction

    The Technical Challenges of RFID Privacy

    Blocker Tags

    Soft Blocking

    Signal-to-Noise Measurement

    Tags with Pseudonyms

    Corporate Privacy

    Technology and Policy

    Conclusions

22. Randomization: Another Approach to Robust RFID Security.

    Introduction

    The Problems in RFID Security

    Conclusions

23. Killing, Recoding, and Beyond.

    Introduction

    RFID Recoding and Infomediaries

    Infrastructure Issues

    Conclusions

V: STAKEHOLDER PERSPECTIVES.

24. Texas Instruments: Lessons from Successful RFID Applications.

    Introduction

    Toll Tracking: Who Knows Where You Are Going?

    Contactless Payment: Are Safeguards Already in Place?

    RFID and Automotive Anti-Theft: Staying Ahead of the Security Curve

    How and What We Communicate

    Conclusions

25. Gemplus: Smart Cards and Wireless Cards.

    Introduction

    What Is a Smart Card?

    Smart Card Communication and Command Format

    Card Life Cycle

    Smart Card Applications

     "Contactless" Cards

    Protocols and Secure Communication Schemes

    Constraints of Contactless Products

    Contactless Products and the Contact Interface

    Conclusions

26. NCR: RFID in Retail.

    Introduction

    Payment Applications

    Inventory Management Applications

    Hybrid Scanners

    Privacy Concerns

    RFID Portal

    Conclusions

27. P&G: RFID and Privacy in the Supply Chain.

    Introduction

    Procter & Gamble's Position

    RFID Technology and the Supply Chain

    Global Guidelines for EPC Usage

    Conclusions

28. Citizens: Getting at Our Real Concerns.

    Introduction

    Prior to the Point of Sale

    After the Point of Sale: Nonconsumer Goods

    After the Point of Sale: Consumer Goods

    After the Point of Sale: Privacy Interests

    Eliminating the RFID Threats to Privacy

    Conclusions

29. Activists: Communicating with Consumers, Speaking Truth to Policy Makers.

    Introduction

    RFID Characteristics That Threaten Privacy

    Proposed Technology-Based Solutions

    Is Consumer Education the Answer?

    Calling for a Technology Assessment

    Conclusions

30. Experimenting on Humans Using Alien Technology.

    Introduction

    The Surveillance Society: It's Already Here

    A Trick to Overcome Resistance

    Constituents to Change-and to Stasis

    Privacy Advocates Own This Story

    Privacy, Change, and Language

    How to Make Consumers Demand Change (and RFID)

    Conclusions

31. Asia: Billions Awaken to RFID.

    Introduction

    Factors Separating Western and Asian RFID Experience

    The Extant Paper Database and Electronic Credit Card Systems

    RFID in India

    RFID Across Asia

    Conclusions

32. Latin America: Wireless Privacy, Corporations, and the Struggle for Development.

    Introduction

    An Overview of Wireless Services Penetration into Central America

    Pervasiveness of Telecommunications in Central America

    Privacy Concerns

    An Overview of Privacy Across Latin America

    Conclusions: Privacy, Poverty, and the Future

APPENDIXES.

Appendix A: Position Statement on the Use of RFID on Consumer Products.

Appendix B: RFID and the Construction of Privacy: Why Mandatory Kill Is Necessary.

Appendix C: Guidelines for Privacy Protection on Electronic Tags of Japan.

Appendix D: Adapting Fair Information Practices to Low-Cost RFID Systems.

Appendix E: Guidelines on EPC for Consumer Products.

Appendix F: Realizing the Mandate: RFID at Wal-Mart.

Index.

商品描述(中文翻譯)

描述:
無線射頻識別(RFID)技術正迅速普及,因為企業尋求簡化供應鏈並回應主要客戶的要求。然而,RFID和其他新型無線識別技術引發了前所未有的隱私問題。《RFID:應用、安全與隱私》從各個角度和觀點探討了這些問題。

獲獎的科技記者和隱私專家Simson Garfinkel匯集了來自各利益相關者社群的貢獻——從RFID供應商到隱私倡導者及其他。貢獻者介紹了當今領先的無線識別技術,追溯其演變,解釋其潛力,評估其隱私風險,並評估提出的解決方案——技術、商業和政治方面。本書還超越RFID,回顧Wi-Fi、藍牙、智慧卡、生物識別、新型手機網絡以及不斷演變的互聯網的隱私影響。重點包括:

- RFID和其他無線識別技術的運作方式
- RFID應用——從加油站和藥房到21世紀的戰場
- RFID、隱私與法律——在美國及全球的情況
- RFID、安全與工業間諜活動
- 藍牙和Wi-Fi如何追蹤個人,無論是否獲得其許可
- 無線識別隱私問題的技術解決方案——其價值和限制
- 來自EPCglobal, Inc.、Gemplus、寶潔公司及其他行業領導者的利益相關者觀點
- 公民在隱私問題上的未來行動主義

清晰、平衡且易於理解,這是每位參與RFID的人士不可或缺的入門書:實施或評估RFID的企業;回應用戶關切的技術供應商;以及希望深入了解技術及其影響的政策制定者和隱私倡導者。

目錄:
前言
序言
致謝
I:原則
1. 自動識別與數據收集:未來的展望
- 介紹
- 自動識別數據收集的簡史
- 不存在的「行業」
- 互聯網世界
- 明確且當前的好處
- 未來應用
- 結論
2. 理解RFID技術
- 介紹
- RFID技術
- RFID應用
- 結論
3. EPC的歷史
- 介紹
- 開端
- 小型講座:供應鏈
- 自動識別中心
- 駕馭巨獸
- 結論
4. RFID與全球隱私政策
- 介紹
- 隱私的定義
- RFID發現過程的映射
- 隱私作為基本人權
- 通過數據保護法和公平信息實踐來保障隱私
- 結論
5. RFID、隱私與監管
- 介紹
- 一些當前和提議的RFID應用
- 物品級標籤的未來?
- 理解RFID的隱私威脅
- 結論
6. RFID與美國的監管環境
- 介紹
- RFID政策的當前狀態
- RFID政策問題
- 政府與個人背景
- 商業與個人背景
- 行業領導
- 政府領導的選擇
- 當前狀態的快照
- 政策建議
- EPCglobal領導的理由及其限制
- 結論
7. RFID與商品的真實性
- 介紹
- 認證中的幾個重要概念
- 標籤的真實性與商品的真實性
- 商品的真實性與防偽措施
- 讀取器的認證
- 整個供應鏈中用戶的認證(聯邦制)
- 結論
8. 位置與身份:簡史
- 介紹
- 在習慣與符號的世界中,地點與身份