PDF Ebook RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg
Sooner you get guide RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg, faster you can delight in checking out the publication. It will certainly be your count on keep downloading and install the e-book RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg in supplied web link. In this means, you can truly decide that is worked in to obtain your personal e-book on-line. Right here, be the very first to obtain the book entitled RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg and also be the first to know exactly how the author implies the notification and also knowledge for you.
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg
PDF Ebook RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg
Some individuals may be laughing when taking a look at you checking out RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg in your spare time. Some might be admired of you. As well as some may desire resemble you who have reading pastime. What about your personal feel? Have you felt right? Reading RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg is a demand and also a pastime at once. This problem is the on that will make you really feel that you have to check out. If you know are looking for the book entitled RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg as the option of reading, you could find here.
As one of guide collections to propose, this RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg has some solid reasons for you to read. This book is really ideal with what you need currently. Besides, you will certainly additionally enjoy this publication RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg to review considering that this is among your referred books to review. When going to get something brand-new based upon encounter, enjoyment, and also various other lesson, you could use this book RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg as the bridge. Starting to have reading routine can be undertaken from numerous means as well as from alternative types of books
In reviewing RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg, currently you could not likewise do conventionally. In this contemporary age, device and also computer will certainly help you a lot. This is the time for you to open the gadget and also remain in this website. It is the ideal doing. You can see the connect to download this RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg below, cannot you? Simply click the web link as well as make a deal to download it. You could reach buy guide RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg by on-line as well as prepared to download and install. It is really different with the traditional method by gong to the book shop around your city.
However, checking out guide RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg in this website will certainly lead you not to bring the published book almost everywhere you go. Merely keep the book in MMC or computer disk and also they are available to review whenever. The flourishing air conditioner by reading this soft documents of the RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg can be leaded into something brand-new behavior. So now, this is time to confirm if reading can enhance your life or otherwise. Make RFID: Applications, Security, And Privacy, By Simson Garfinkel, Beth Rosenberg it surely function and also get all advantages.
“RFID is the first important technology of the twenty-first century. That’s an awesome responsibility. How can we know when and how RFID is being used? How can we make sure it is not misused? How can we exercise choice over how it affects us personally? How do we ensure it is safe? This book is a valuable contribution to the ongoing effort to find the answers.”
—From the Foreword by Kevin Ashton, cofounder and former executive director, Auto-ID Center; vice president, ThingMagic Corporation
Radio frequency identification (RFID) technology is rapidly becoming ubiquitous as businesses seek to streamline supply chains and respond to mandates from key customers. But RFID and other new wireless ID technologies raise unprecedented privacy issues. RFID: Applications, Security, and Privacy covers these issues from every angle and viewpoint.
Award-winning technology journalist and privacy expert Simson Garfinkel brings together contributions from every stakeholder community—from RFID suppliers to privacy advocates and beyond. His contributors introduce today’s leading wireless ID technologies, trace their evolution, explain their promise, assess their privacy risks, and evaluate proposed solutions—technical, business, and political. The book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet. Highlights include
- How RFID and other wireless ID technologies work
- RFID applications—from gas stations and pharmacies to the twenty-first century battlefield
- RFID, privacy, and the law—in the United States and around the world
- RFID, security, and industrial espionage
- How Bluetooth and Wi-Fi can track individuals, with or without their permission
- Technical solutions to wireless ID privacy concerns—their values and limitations
- Stakeholder perspectives from EPCglobal, Inc., Gemplus, The Procter & Gamble Company, and other industry leaders
- The future of citizen activism on privacy issues
Clear, balanced, and accessible, this is the indispensable primer for everyone involved in RFID: businesses implementing or evaluating RFID; technology suppliers responding to user concerns; and policymakers and privacy advocates who want a deeper understanding of the technology and its implications.
Includes contributions from
AIM Global, Inc.
CASPIAN
Center for Democracy and Technology
EPCglobal, Inc.
The Galecia Group
Gemplus
IDAT Consulting & Education
Institute for the Future
Matrics, Inc.
MIT Computer Science & Artificial Intelligence Laboratory
MIT Media Laboratory
OATSystems
Privacy Journal
The Privacy Rights Clearinghouse
The Procter & Gamble Company
RSA Laboratories
UCLA Department of Geography
Wayne State University Law School
- Sales Rank: #3338522 in Books
- Published on: 2005-07-16
- Original language: English
- Number of items: 1
- Dimensions: 9.44" h x 1.32" w x 7.18" l, 2.37 pounds
- Binding: Hardcover
- 608 pages
From the Back Cover
“RFID is the first important technology of the twenty-first century. That’s an awesome responsibility. How can we know when and how RFID is being used? How can we make sure it is not misused? How can we exercise choice over how it affects us personally? How do we ensure it is safe? This book is a valuable contribution to the ongoing effort to find the answers.”
—From the Foreword by Kevin Ashton, cofounder and former executive director, Auto-ID Center; vice president, ThingMagic Corporation
Radio frequency identification (RFID) technology is rapidly becoming ubiquitous as businesses seek to streamline supply chains and respond to mandates from key customers. But RFID and other new wireless ID technologies raise unprecedented privacy issues. RFID: Applications, Security, and Privacy covers these issues from every angle and viewpoint.
Award-winning technology journalist and privacy expert Simson Garfinkel brings together contributions from every stakeholder community—from RFID suppliers to privacy advocates and beyond. His contributors introduce today’s leading wireless ID technologies, trace their evolution, explain their promise, assess their privacy risks, and evaluate proposed solutions—technical, business, and political. The book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet. Highlights include
- How RFID and other wireless ID technologies work
- RFID applications—from gas stations and pharmacies to the twenty-first century battlefield
- RFID, privacy, and the law—in the United States and around the world
- RFID, security, and industrial espionage
- How Bluetooth and Wi-Fi can track individuals, with or without their permission
- Technical solutions to wireless ID privacy concerns—their values and limitations
- Stakeholder perspectives from EPCglobal, Inc., Gemplus, The Procter & Gamble Company, and other industry leaders
- The future of citizen activism on privacy issues
Clear, balanced, and accessible, this is the indispensable primer for everyone involved in RFID: businesses implementing or evaluating RFID; technology suppliers responding to user concerns; and policymakers and privacy advocates who want a deeper understanding of the technology and its implications.
Includes contributions from
AIM Global, Inc.
CASPIAN
Center for Democracy and Technology
EPCglobal, Inc.
The Galecia Group
Gemplus
IDAT Consulting & Education
Institute for the Future
Matrics, Inc.
MIT Computer Science & Artificial Intelligence Laboratory
MIT Media Laboratory
OATSystems
Privacy Journal
The Privacy Rights Clearinghouse
The Procter & Gamble Company
RSA Laboratories
UCLA Department of Geography
Wayne State University Law School
About the Author
Simson Garfinkel is a computer security researcher and an award-winning commentator on information technology. Among his twelve books are Database Nation: The Death of Privacy in the 21st Century (O’Reilly, 2001) and Practical UNIX and Internet Security, Third Edition (O’Reilly, 2003). A columnist for CSO magazine, Garfinkel’s columns earned the 2004 and 2005 Jesse H. Neal National Business Journalism Award. He recently received his Ph.D. in computer science from MIT.
Beth Rosenberg is a writer, editor, and journalist with fifteen years of experience in emerging technologies. She has written for the Boston Globe, Boston magazine, and the Christian Science Monitor, and edited a book for Harvard’s Kennedy School of Government.
Excerpt. © Reprinted by permission. All rights reserved.
There’s a school bus stopped outside a middle school Spring, Texas, a wealthy suburb on the northern edge of Houston’s metropolitan sprawl. Inside the bus several well-dressed and obviously well-off children stand in the aisle waiting to get off. Sandra Martinez, a 10-year-old with a thick brown braid and a charcoal grey blazer, pauses while she takes her ID card, hanging from a lanyard around her neck, and presses it against the large grey panel that’s mounted on the big padded barrier that divides the stairwell from the passenger compartment.
The panel beeps.
Sandra descends the school-bus steps and the next student fumbles for her ID card. Meanwhile, a computer onboard the bus is hard at work. First the computer takes a geospatial reading from the Global Positioning System receiver that’s mounted inside the bus. Next, the computer, using an onboard digital cell phone, sends to Spring Independent School District the precise time and location that Martinez left the bus using an onboard digital cell phone. This information is made instantly available on a Web site where it can be accessed by Martinez’s parents, the school administration, or anyone else with the appropriate access codes. The purpose of the system, which was installed at a cost of $180,000, is to let parents know precisely when and where their children get on or off the school bus. “If it works one time, finding a student who has been kidnapped, then the system has paid for itself,” Brian Weisinger, the head of transportation for the Spring district, told the New York Times.1
No student has ever been kidnapped in Spring, Texas.
A slightly different student tracking is in use at the Enterprise Charter School in Buffalo, New York. There, a pair of kiosks that were purchased at a cost of $40,000 read ID tags as students enter and exit the building. Mark Walter, head of technology for the Buffalo school, told the New York Times that initially, the system failed to register some students, but now it works pretty well. Advocates of the technology say that it just might even be expanded—for example, with readers placed on individual classroom doors to see if students are attending their classes.
Some students, of course, invariably forget their tags at home or lose them. Some might even purposely throw them away. Even for these students, technology has an answer: In late 2004, the U.S. Food and Drug Administration approved for general use a tiny radio tag that can be implanted under the skin. Similar technology has been used to track household pets since the 1990s.
Meanwhile, by the time this book is in print, the U.S. State Department will probably have started issuing passports that carry a tiny RFID chip that includes 64 kilobytes of memory and, alas, can be covertly read at a distance of 30 feet by anyone with a suitable reader and a good antenna.2 The State Department says that there’s no need to worry: The data on the chip will reportedly be encrypted, so anybody who reads it will only read gibberish.
The RFID Controversy and the Technology That Fuels ItRadio Frequency Identification—better known as RFID—is fast becoming one of the most controversial technologies of our era.
Proponents of RFID say that the tiny tags, made out of silicon chips and radio antennas, can stamp out counterfeit drugs, fight terrorism, and at the same time help Wal-Mart keep its shelves stocked. They say that widespread adoption of RFID will allow companies to improve efficiency, cut costs, and offer dramatic new products and services to their customers. Most proponents scoff that the technology has a downside at all—other than perhaps the cost of the tags, and the cost of tags is dropping fast.
But RFID has many critics. The most vocal are privacy activists who argue that the technology’s unprecedented ability to track the movement of individually serialized objects could be turned around and used to track the people carrying those objects. They worry that the RFID readers across the nation could report back to a single global network that could be used by the government as a kind of roving geographical wiretap.
Many critics argue that RFID is a threat not just to individuals, but to corporations and governments as well. In a few years, RFID readers at warehouse doors will allow companies to inventory the contents of cartons without opening them. But without the proper controls, the technology could also facilitate industrial espionage by giving competitors unprecedented access to a company’s inventory. And once you begin thinking about RFID as an offensive technology, a lot of possibilities start emerging. Just as toll roads can use RFID to read E-ZPass tags and automatically debit drivers’ accounts, an RFID-equipped bomb could wait patiently until it senses the tag of a particular individual driving above, and then detonate. Want to falsely implicate someone in a crime? Just clone one of their RFID tags and then arrange for it to pass by a particular reader just minutes before a murder.
This book is the first of its kind to explore the wide range of security and privacy issues that are being raised by RFID technology. It is the first book to bring together advocates and opponents from across the RFID spectrum. In its pages you will find chapters from companies that are producing RFID readers; from companies that are busy putting products with embedded RFID-tags on their shelves; and from the very privacy activists who are trying to stop them. Bringing together this diverse group of individuals and organizations has taken a lot of time and work. The result is the most balanced and accurate discussion you will find of RFID technology and its attendant controversy anywhere on the planet.
RFID: What Is It?As its name implies, the term RFID is generally used to describe any technology that uses radio signals to identify specific objects. In practice, this means any technology that transmits specific identifying numbers using radio. Electronic Article Surveillance (EAS) systems, used by many clothing and music stores to set off an alarm when a shoplifter steals an item, are not RFID because the EAS tags do not have individual codes or serial numbers that can be read remotely. The Mobil Speedpass system used to pay for gas is an RFID system: Each Speedpass tag contains a unique serial number that is used to identify the tag’s owner.
Each RFID tag consists of a silicon chip, an antenna, and some kind of housing. The tags come in sizes as large as a paperback book and smaller than a grain of rice. So-called active tags contain batteries, while passive tags are powered directly by the radio frequencies used to read them. The reading range of a tag depends on many factors, including the tag’s electronics, its antenna, the reader, the radio frequencies used, and decisions made at the time the system is deployed. It is therefore inaccurate to state a “typical tag’s” read range without first specifying what kind of tag you are using. (I explain these technical issues and others in Chapter 2, Understanding RFID Technology.)
Already, RFID technology is broadly deployed within the United States. Between the “proximity cards” used to unlock many office doors, and the automobile “immobilizer chips” built into many modern car keys, it’s estimated that roughly 40 million Americans carry some form of RFID device in their pocket every day. I have two: Last year MIT started putting RFID chips into the school’s identity cards, and there is a Philips immobilizer chip inside the black case of my Honda Pilot car keys.
Many of today’s media accounts of RFID aren’t about these proprietary devices or RFID in general, but the standardized Electronic Product Code (EPC) chips that were developed by the Auto-ID Center and are now being overseen by EPCglobal, a trade organization. RFID systems have been around for more than thirty years, opening office doors and tagging laboratory animals, but when the EPC was introduced, these systems were too expensive for mass deployment. By standardizing on a simple chip design and over-the-air protocol, EPC is able to take advantage of mass production’s efficiencies.
EPC tags are designed to replace today’s ubiquitous Universal Product Code (UPC) bar codes, except instead of identifying the maker and kind of product, the 96-bit EPC code will give every package of razors, box of pancake mix, and pair of sneakers its own unique serial number. The tags, which operate in the unlicensed radio spectrum between 868 MHz and 965 MHz, can be read at a distance of many feet and through paper, fabric, and some plastics. And although the tags can cost as much as a 40 cents today, when purchased by the millions, the cost rapidly decreases to 10 cents per tag or less. (Sanjay Sarma, one of the founders of the Auto-ID center, explains the birth of the Auto-ID center and the EPC in Chapter 3, A History of the EPC.)
RFID Comes of AgeI had my first experience with RFID technology in January 1984. I was a freshman at the Massachusetts Institute of Technology and had just taken a job at one of MIT’s new biology labs. For added security, the lab had installed a keyless entry system. The lab gave me thick blue card to put in my wallet. To get into the secure area, all I had to do was wave my wallet in front of a special reader. Within a few days I learned that I could just bump against the reader, leaving my wallet in my pocket. It was very cool and high-tech and allegedly very secure.
After a few weeks in my wallet, the top layer of the card’s plastic was starting to peel away. And a few days after I quit that job, I ripped open the card to see how it worked. Underneath the laminate I found a printed circuit board, a chip that was the size of a postage stamp, and a dozen or so metal pads, some of them shorted together with a dab of solder.
Most helpful customer reviews
6 of 6 people found the following review helpful.
Excellent Survey of RFID; present and future issues.
By Stuart Gardner
This is a compilation of papers from numerous organisations with diverse opinions on how this technology will develop. RFID presents opportunities for great improvement in business efficiencies for corporations and better service for customers and consumers. The flip side is that RFID has the potential to negatively impact individual privacy more than most technologies.
What sets this book apart is that it covers both sides of the argument. The chapters authors represent most perspectives on this emerging technology:
- RFID Hardware and Software Vendors
- Organisations that have deployed RFID
- Privacy Advocates
The cases for and against RFID are both well made. RFID can make shopping easier, stock processing more efficient, speed up payment and aid loss prevention. An excellent example of where privacy concerns are outweighed by convenience is highway tolls.
At the same time, security flaws will likely become evident and individuals, organizations and governments could misuse the very same technology. RFID has the potential to be more invasive than video surveillance.
Papers within the book cover include current real world illustrations and how the technology may develop. Most importantly, this is the most comprehensive survey to date. If anyone can suggest a better one, please do write a review and refernce.
This is not a "how to" book. It does not delve into the technology or provide a detailed methodology. Given the diversity of perspectives and content it couldn't be.
This book is a must read if you want to be informed on a key emerging technology. The issues and rewards of RFID will increase as the processing power of RFID chips increase. Increase in processing power is nearly a given.
In isolation the individual papers (chapters) are good. But this is a clear instance of the the sum being greater than the parts. For my two cents, this book will have a long and useful shelf life.
0 of 0 people found the following review helpful.
speculative deployment
By W Boudville
The chapters are written by different authors, concerning various aspects about RFID. The topics give an idea of the scope of RFID deployment. None of the chapters would be considered technical. You are not required to be an electrical engineer to follow any chapter.
One chapter talks about inserting RFID tags into livestock. In part to combat the age old problem of rustling, which still exists. The chapter has an engagingly termed section "World Livestock Roundup", which showcases RFID in livestock in several countries. The deployment is quite advanced. Already, the EU and New Zealand mandate it for all livestock, and have done so for over 5 years. Given the cost of a cow or sheep, the tags are quite affordable. This chapter is significant. Unlike virtually the rest of the book, it demonstrates RFID as already existing in a mature deployment, and not as blue sky musings.
Other chapters are more speculative. In part because when the tags might be associated with or carried by people, serious issues of privacy arise. Some deployments are described under the rubric of enhancing child safety. But the extension to adults is highly contentious. Even more so when one considers not the carrying of a tag, but the insertion of a tag into a person's skin. In the US, we can readily envisage deep discontent over this, from libertarians to the religious right.
It turns out that many of the suggested difficulties are not primarily technical. Rather, they exist in the business or social realm, and may be harder to solve.
4 of 6 people found the following review helpful.
Too important to be ignored!
By CS Calude
RFID, radio frequency identification, is one the first major
technology of the new century. After building machines
capable of doing things (nineteenth century) and machines
that can mimic thinking (twentieth century), time has come
to have machines to perceive.
The book edited by S. Garfinkel, B. Rosenberg is a balanced,
comprehensive, and digestible presentation of RFID. RFID is
not a Devil plot on spying on everyone, and it is not a
technological form of totalitarism (although there is a
potential to become each of them). RFID is a form of
enabling machines to sense. Warehouses will sense whether
they become low on stock or, perhaps, overstocked, luggage
will be routed automatically from airport to airport;
healthcare, libraries, energy, will be all influenced if
not changed by RFID. Benefits are potentially immense, but
so are the risks.
One (almost) certainty: like or not, this technology is
going to stay, so we cannot afford to ignore it. The book is
an important step towards an informed debated about its
future.
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg PDF
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg EPub
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg Doc
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg iBooks
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg rtf
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg Mobipocket
RFID: Applications, Security, and Privacy, by Simson Garfinkel, Beth Rosenberg Kindle
Tidak ada komentar:
Posting Komentar