© 2008

RFID Security and Privacy

Concepts, Protocols, and Architectures


  • Follows the items from the basics to the frontiers of research

  • Modular Structure: The Reader can pick out the interesting items of the content

  • Includes introduction into all necessary items - no deep background knowledge required


Part of the Lecture Notes Electrical Engineering book series (LNEE, volume 17)

Table of contents

  1. Front Matter
    Pages I-2
  2. Dirk Henrici
    Pages 3-6
  3. Dirk Henrici
    Pages 7-56
  4. Dirk Henrici
    Pages 57-80
  5. Dirk Henrici
    Pages 81-144
  6. Dirk Henrici
    Pages 145-179
  7. Dirk Henrici
    Pages 181-197
  8. Dirk Henrici
    Pages 199-246
  9. Back Matter
    Pages 247-269

About this book


RFID technology is already used widely and is increasingly becoming a part of daily life. However, issues regarding security and privacy with respect to RFID technology have not been resolved satisfactorily. The challenges which must be overcome to resolve RFID security and privacy issues are immense; primarily because of the many constraints attached to the provision of security and privacy in RFID systems. These challenges are chiefly technical and economic in nature but also include ethical and social issues. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long lasting.

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and discusses the goals and attacker models. This is followed by an introduction to state-of-the-art of RFID security and privacy systems technology. The concepts which underlie the proposed protocols are highlighted, explained, and illustrated using examples. For building open, inter-organizational RFID systems, the classic RFID model is extended and considerations in new directions are explored. RFID systems are then integrated into other parts of the pervasive computing vision. Among the current research results presented in this book, a new comprehensive framework, including required protocols for operation, is introduced. It can be used economically on a global scope, supports inter-organizational cooperation and data sharing, and adheres to all the architectural guidelines derived in this work.


CompTIA RFID+ Protection communication privacy radio-frequency identification (RFID) security

Authors and affiliations

  1. 1.University of Kaiserslautern67653 KaiserslauternGermany

Bibliographic information

Industry Sectors
IT & Software
Oil, Gas & Geosciences