Chapter
Chapter 1: Physics, Math, and RFID: Mind the Gap
Some Bare-Bones Physics Concepts
Understanding Electricity
Understanding Electromagnetism
Types of Electromagnetic Waves
The Electromagnetic Spectrum
An Overview of RFID: How It Works
Chapter 2: The Physics of RFID
Understanding Radio Frequency Communication
Elements of Radio Frequency Communication
Modulation: Don't Leave Antenna Without It
Frequency Bands in Modulation
Understanding Modulation Types
Amplitude Modulation and Amplitude Shift Keying
Frequency Modulation and Frequency Shift Keying
Phase Modulation and Phase Shift Keying
RFID Communication Techniques
Communication Through Coupling
Communication Through Backscattering
Understanding Performance Characteristics of an RFID System
The Voltage Standing Wave Ratio
Performing Antenna Power Calculations
The Travel Adventures of RF Waves
Chapter 3: Working with RFID Tags
Operating Tag Frequencies
Labeling and Placing a Tag
Pressure-Sensitive Labels
Selecting Adhesive Types for Tags
Tag Placement and Orientation
Polarization and Orientation
Orientation in Inductive Coupling
Chapter 4: Working with Interrogation Zones
Understanding an Interrogator
What an Interrogator Is Made Of
Fixed-Mount Interrogators
Vehicle-Mount Interrogators
What an Interrogator Is Good For
Communication With the Host Computer
Communication With the Tags
Communicating With the Host
Dealing With Dense Environments
Configuring Interrogation Zones
Configuring Interrogator Commands
Configuring Interrogator Settings
Optimizing Interrogation Zones
Reader-to-Reader Interference
System Performance and Tuning
Chapter 5: Working with Regulations and Standards
Understanding Regulations and Standards
Regulating Frequency Usage
Air Interface and Tag Data Standards
Impact of Regulations and Standards
Advantages of Regulations
Disadvantages of Regulations and Standards
Regulatory and Standards Bodies
Chapter 6: Selecting the RFID System Design
Understanding RFID Frequency Ranges
RFID Frequency Ranges and Performance
The Low-Frequency (LF) Range
The High-Frequency (HF) Range
Ultra High Frequency (UHF) Range
Selecting Operating Frequency
Understanding Antenna Types
Linearly Polarized Antenna
Circularly Polarized Antennas
Selecting Transmission Lines
Mounting Equipment for RFID Systems
Chapter 7: Performing Site Analysis
Planning the Site Analysis
Performing a Physical Environmental Analysis
Harsh Environmental Conditions
Performing an RF Environmental Analysis
Determining the Ambient EM Noise
Analyzing the Electrical Environmental Conditions
Protecting the RFID System from Interference and Noise
Preparing Your Own Blueprints
Using the Results of Your Experiment
Chapter 8: Performing Installation
Preparing for Installation
Putting Together an RFID Solution
Considering Power Sources
Uninterruptible Power Supplies
The Standard Installation Process and Practices
Testing During Installation
Application Integration Tests
Equipment Safety from the Environment
Working With Various Installation Scenarios
Setting Up Stationary Portals
Setting Up a Conveyor Portal
Setting Up a Dock Door Portal
Setting Up a Shelf Portal
Setting Up Mobile Portals
Handheld Interrogator Portals
Chapter 9: Working With RFID Peripherals
Smart Labels: Where RFID Meets Barcode
Working With RFID Printers
Understanding RFID Printers
Installing the RFID Printer
Configuring the RFID Printer
Troubleshooting the RFID Printer
Understanding Ancillary Devices and Concepts
Encoders and Label Applicators
Automated Label Applicators
Pneumatic Piston Label Applicators
Wipe-On Label Applicators
Real-Time Location Systems
Chapter 10: Monitoring and Troubleshooting RFID Systems
Monitoring an RFID System
Understanding Root-Cause Analysis
Monitoring and Troubleshooting Interrogation Zones
Mean Time Between Failures (MTBF)
Average Tag Traffic Volume
Actual Versus Predicted Traffic Rate
Read Errors to Total Reads Rate
Monitoring and Troubleshooting Tags
Identifying Improperly Tagged Items
Identifying Reasons for Tag Failures
Management Prior to Applying Tags
Management During Application
Management After Applying the Tags/During Tracking
Monitoring and Troubleshooting Hardware
Understanding the Causes of Hardware Failures
Diagnosing RFID Hardware Failures
Standard Troubleshooting Procedure
Chapter 11: Threat and Target Identification
Radio Frequency Manipulation
Chapter 12: RFID Attacks: Tag Encoding Attacks
Case Study: John Hopkins vs. SpeedPass
Chapter 13: RFID Attacks: Tag Application Attacks
Chip Clones - Fraud and Theft
Tracking: Passports/Clothing
Chapter 14: RFID Attacks: Securing Communications Using RFID Middleware
RFID Middleware Introduction
Electronic Product Code System Network Architecture
EPC Network Software Architecture Components
EPC Network Data Standards
Reader Layer-Operational Overview
Smoothing and Event Generation Stage
Interactions with Wireless LANs
Attacking Middleware with the Air Interface
Understanding Security Fundamentals and Principles of Protection
Understanding PKIs and Wireless Networking
Understanding the Role of Encryption in RFID Middleware
Understanding How a Digital Signature Works
Basic Digital Signature and Authentication Concepts
Why a Signature Is Not a MAC
Why a Signature Binds Someone to a Document
Learning the W3C XML Digital Signature
Applying XML Digital Signatures to Security
Using Advanced Encryption Standard for Encrypting RFID Data Streams
Addressing Common Risks and Threats
Experiencing Loss of Data
Criticisms of the Overall Design
Weaknesses in the Encryption Algorithm
Weaknesses in Key Management
Securing RFID Data Using Middleware
Using DES in RFID Middleware for Robust Encryption
Using Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data Streams
Application Layer Gateway
Providing Bulletproof Security Using Discovery, Resolution, and Trust Services in AdaptLink(tm)
Resolution, ONS, and the EPC Repository
Chapter 15: RFID Security: Attacking the Backend
Overview of Backend Systems
Purposeful Tag Duplication
Problem 1 (Database Components)
Problem 2 (Web-based Components)
Problem 3 (Web-based Components)
Problem 4 (Buffer Overflow)
RFID Data Collection Tool - Backend Communication Attacks
Chapter 16: Management of RFID Security
Risk and Vulnerability Assessment