Foreword |
|
xxi | |
Preface |
|
xxv | |
Acknowledgments |
|
xlvii | |
|
|
1 | (176) |
|
Automatic Identification and Data Collection: What the Future Holds |
|
|
3 | (12) |
|
|
|
|
3 | (1) |
|
|
4 | (2) |
|
|
4 | (1) |
|
Magnetic Stripes and MICR |
|
|
5 | (1) |
|
Radio Frequency Identification |
|
|
5 | (1) |
|
The ``Industry'' That Isn't |
|
|
6 | (1) |
|
|
7 | (1) |
|
Clear and Present Benefits |
|
|
8 | (3) |
|
|
8 | (1) |
|
Distribution and Inventory |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (2) |
|
|
11 | (1) |
|
Pharmaceutical Authenticity |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
Understanding RFID Technology |
|
|
15 | (22) |
|
|
|
|
15 | (1) |
|
|
15 | (12) |
|
The Elements of an RFID System |
|
|
16 | (7) |
|
Coupling, Range, and Penetration |
|
|
23 | (4) |
|
|
27 | (8) |
|
Supply Chain Visibility and Inventory Management |
|
|
27 | (2) |
|
|
29 | (6) |
|
VeriChip and Mark of the Beast |
|
|
35 | (1) |
|
|
35 | (2) |
|
|
37 | (20) |
|
|
|
37 | (1) |
|
|
37 | (3) |
|
The Distributed Intelligent Systems Center |
|
|
38 | (1) |
|
Meanwhile, at Procter & Gamble |
|
|
39 | (1) |
|
A Mini-Lecture: The Supply Chain |
|
|
40 | (1) |
|
|
41 | (9) |
|
|
43 | (1) |
|
``Low-Cost'' RFID Protocols |
|
|
44 | (2) |
|
``Low-Cost'' Manufacturing |
|
|
46 | (1) |
|
The Software and the Network |
|
|
47 | (1) |
|
|
48 | (2) |
|
Summary: The Ultimate Systems Problem |
|
|
50 | (1) |
|
Harnessing the Juggernaut |
|
|
50 | (4) |
|
|
51 | (1) |
|
The Evolution of the Industry |
|
|
52 | (1) |
|
The Creation of EPCglobal |
|
|
53 | (1) |
|
|
54 | (3) |
|
RFID and Global Privacy Policy |
|
|
57 | (26) |
|
|
|
57 | (1) |
|
|
58 | (4) |
|
Definitions of Personal Information |
|
|
58 | (1) |
|
History of Current Privacy Paradigm |
|
|
59 | (3) |
|
Mapping the RFID Discovery Process |
|
|
62 | (3) |
|
Functions and Responsibilities for Chips, Readers, and Owners |
|
|
64 | (1) |
|
Privacy as a Fundamental Human Right |
|
|
65 | (4) |
|
|
68 | (1) |
|
Privacy Through Data Protection Law and Fair Information Practices |
|
|
69 | (11) |
|
|
69 | (2) |
|
|
71 | (1) |
|
Responsibility in Individual RFID Scenarios |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Limiting Use, Disclosure, and Retention |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (3) |
|
|
80 | (1) |
|
|
80 | (3) |
|
RFID, Privacy, and Regulation |
|
|
83 | (16) |
|
|
|
83 | (1) |
|
Some Current and Proposed RFID Applications |
|
|
84 | (2) |
|
Whither Item-Level Tagging? |
|
|
86 | (2) |
|
Understanding RFID's Privacy Threats |
|
|
88 | (4) |
|
|
92 | (7) |
|
RFID and the United States Regulatory Landscape |
|
|
99 | (38) |
|
|
|
99 | (2) |
|
Current State of RFID Policy |
|
|
101 | (4) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (6) |
|
|
105 | (3) |
|
Integrity and Security of the System |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Use of RFID Technology to Limit Product Functionality |
|
|
110 | (1) |
|
Government Versus Individual Context |
|
|
111 | (3) |
|
Business Versus Individual Context |
|
|
114 | (5) |
|
|
116 | (3) |
|
|
119 | (1) |
|
Options for Government Leadership |
|
|
120 | (4) |
|
|
120 | (2) |
|
|
122 | (2) |
|
Snapshot of Current Status |
|
|
124 | (2) |
|
|
126 | (4) |
|
The Case for, and Limits of, EPCglobal Leadership |
|
|
130 | (3) |
|
Other Industry Alternatives? |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (4) |
|
RFID and Authenticity of Goods |
|
|
137 | (12) |
|
|
|
137 | (1) |
|
A Few Important Concepts in Authentication |
|
|
138 | (2) |
|
Authentication Involves Secret Data |
|
|
138 | (1) |
|
The ``Key Distribution'' Problem |
|
|
139 | (1) |
|
Stolen Keys and Revocation |
|
|
139 | (1) |
|
Comment on Authentication Costs |
|
|
139 | (1) |
|
Authenticity of Tags and Authenticity of Goods |
|
|
140 | (1) |
|
Authenticity of Goods and Anticounterfeiting Measures |
|
|
141 | (3) |
|
Injection of Counterfeit Goods into the Supply Chain: Two Scenarios |
|
|
141 | (2) |
|
How Authenticatable Tags Could Help |
|
|
143 | (1) |
|
Switching the Security Burden |
|
|
143 | (1) |
|
Authentication of Readers |
|
|
144 | (1) |
|
Authenticating Readers to Tags |
|
|
144 | (1) |
|
Authenticating Readers Within an Enterprise |
|
|
145 | (1) |
|
Authentication of Users Across the Supply Chain (Federation) |
|
|
145 | (2) |
|
Burden on System Administrators |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (2) |
|
Location and Identity: A Brief History |
|
|
149 | (14) |
|
|
|
149 | (1) |
|
Place and Identity in a World of Habits and Symbols |
|
|
150 | (2) |
|
|
152 | (5) |
|
Ptolemy and the Development of Classified Space |
|
|
152 | (2) |
|
|
154 | (3) |
|
Rethinking Identity: Beyond Traits and Names |
|
|
157 | (3) |
|
|
160 | (1) |
|
|
161 | (2) |
|
Interaction Design for Visible Wireless |
|
|
163 | (14) |
|
|
|
|
|
163 | (1) |
|
The Role of Interaction Design |
|
|
164 | (1) |
|
|
164 | (2) |
|
Designing and Modifying WID Systems |
|
|
166 | (10) |
|
|
166 | (4) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (2) |
|
|
174 | (1) |
|
Physical Remedies to Opt Out |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (80) |
|
RFID Payments at ExxonMobil |
|
|
179 | (10) |
|
|
|
179 | (3) |
|
Interview with Joe Giordano, ExxonMobil Corporation |
|
|
182 | (7) |
|
Transforming the Battlefield with RFID |
|
|
189 | (12) |
|
|
|
189 | (1) |
|
Logistics and the Military |
|
|
190 | (8) |
|
|
198 | (3) |
|
RFID in the Pharmacy: Q&A with CVS |
|
|
201 | (10) |
|
|
|
|
|
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
205 | (1) |
|
Making RFID Work: The Back End |
|
|
205 | (6) |
|
|
211 | (18) |
|
|
|
|
211 | (1) |
|
|
212 | (4) |
|
Tracking People and Objects |
|
|
212 | (1) |
|
Safeguarding Equipment Use |
|
|
213 | (1) |
|
Assisting Medical Personnel |
|
|
214 | (2) |
|
|
216 | (5) |
|
Activity Monitoring and ``OKness'' Checking |
|
|
217 | (2) |
|
Criteria for Different Types of ``OKness'' Systems |
|
|
219 | (1) |
|
Applications for Assisting the Elderly |
|
|
220 | (1) |
|
|
221 | (5) |
|
Radio Frequency Health Issues |
|
|
221 | (2) |
|
|
223 | (1) |
|
Privacy, Security, and HIPAA |
|
|
223 | (3) |
|
|
226 | (3) |
|
Wireless Tracking in the Library: Benefits, Threats, and Responsibilities |
|
|
229 | (16) |
|
|
|
229 | (1) |
|
RFID System Components and Their Effects in Libraries |
|
|
230 | (3) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (5) |
|
|
234 | (1) |
|
Library Problems Addressed by RFID |
|
|
234 | (1) |
|
Cost of Implementing RFID System in Libraries |
|
|
235 | (1) |
|
|
236 | (1) |
|
Privacy Protections for RFID by Industry and the Government |
|
|
237 | (2) |
|
Best-Practices Guidelines for Library Use of RFID |
|
|
239 | (2) |
|
|
240 | (1) |
|
|
241 | (4) |
|
Tracking Livestock with RFID |
|
|
245 | (12) |
|
|
|
245 | (2) |
|
|
247 | (1) |
|
|
248 | (1) |
|
RFID and Livestock Marketing |
|
|
249 | (4) |
|
Traceback and RFID Standardization with Livestock |
|
|
250 | (1) |
|
Auction Markets: A Critical Component |
|
|
251 | (2) |
|
RFID World Livestock Roundup |
|
|
253 | (4) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (70) |
|
RFID: The Doomsday Scenario |
|
|
259 | (16) |
|
|
|
259 | (1) |
|
RFID Tags and the EPC Code |
|
|
260 | (3) |
|
A Ubiquitous RFID Reader Network |
|
|
263 | (2) |
|
Watching Everything: RFID and the Four Databases It Will Spawn |
|
|
265 | (6) |
|
Database #1: The ``Where-Did-This-Come-From?'' Manufacturer's Database |
|
|
266 | (1) |
|
Database #2: The ``What-Is-This?'' EPC Database |
|
|
267 | (1) |
|
Database #3: The ``Who-Bought-It?'' Point-of-Sale Database |
|
|
268 | (2) |
|
Database #4: The ``Where-Has-It-Been-Seen?'' Post-Sale Surveillance Database |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (2) |
|
Multiple Scenarios for Private-Sector Use of RFID |
|
|
275 | (8) |
|
|
|
|
275 | (2) |
|
Scenario 1: ``No One Wins'' |
|
|
277 | (1) |
|
Scenario 2: ``Shangri-La'' |
|
|
278 | (1) |
|
Scenario 3: ``The Wild West'' |
|
|
279 | (1) |
|
Scenario 4: ``Trust but Verify'' |
|
|
280 | (1) |
|
|
281 | (2) |
|
Would Macy's Scan Gimbels?: Competitive Intelligence and RFID |
|
|
283 | (8) |
|
|
|
283 | (1) |
|
|
283 | (3) |
|
Consumer Technology as a Means of Intelligence Gathering |
|
|
284 | (1) |
|
Other Sources of Competitive Intelligence |
|
|
285 | (1) |
|
|
286 | (4) |
|
The Value of Functional Tags on the Shelves |
|
|
286 | (2) |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
291 | (12) |
|
|
|
291 | (1) |
|
Reverse-Engineering the Protocol |
|
|
292 | (3) |
|
|
294 | (1) |
|
|
295 | (2) |
|
Protecting Against These Types of Attacks |
|
|
297 | (3) |
|
|
300 | (3) |
|
|
303 | (24) |
|
|
|
|
|
303 | (1) |
|
|
303 | (13) |
|
|
306 | (3) |
|
|
309 | (3) |
|
Untrusted Versus Trusted Pairing and Discoverability |
|
|
312 | (3) |
|
Current and Speculative Bluetooth Implementations |
|
|
315 | (1) |
|
Bluetooth Security and Privacy Attacks |
|
|
316 | (9) |
|
|
317 | (5) |
|
|
322 | (1) |
|
|
323 | (2) |
|
|
325 | (2) |
|
Part IV Technical Solutions |
|
|
327 | (30) |
|
Technological Approaches to the RFID Privacy Problem |
|
|
329 | (12) |
|
|
|
329 | (2) |
|
The Technical Challenges of RFID Privacy |
|
|
331 | (1) |
|
|
332 | (3) |
|
|
335 | (1) |
|
Signal-to-Noise Measurement |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (3) |
|
Randomization: Another Approach to Robust RFID Security |
|
|
341 | (6) |
|
|
|
|
341 | (1) |
|
The Problems in RFID Security |
|
|
341 | (2) |
|
|
343 | (4) |
|
Killing, Recoding, and Beyond |
|
|
347 | (10) |
|
|
|
|
|
347 | (2) |
|
RFID Recoding and Infomediaries |
|
|
349 | (3) |
|
Applications Prevented by Killing |
|
|
349 | (1) |
|
Recoding and Electronic Product Codes |
|
|
350 | (2) |
|
|
352 | (3) |
|
Protecting the Kill Switch |
|
|
352 | (1) |
|
Recoding, Rewritable Tags, and Vandalism |
|
|
353 | (1) |
|
The ``Subthreshold'' Retailer |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
355 | (2) |
|
Part V Stakeholder Perspectives |
|
|
357 | (122) |
|
Texas Instruments: Lessons from Successful RFID Applications |
|
|
359 | (8) |
|
|
|
359 | (1) |
|
Toll Tracking: Who Knows Where You Are Going? |
|
|
360 | (1) |
|
Contactless Payment: Are Safeguards Already in Place? |
|
|
361 | (2) |
|
RFID and Automotive Anti-Theft: Staying Ahead of the Security Curve |
|
|
363 | (1) |
|
How and What We Communicate |
|
|
364 | (2) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
Gemplus: Smart Cards and Wireless Cards |
|
|
367 | (14) |
|
|
|
367 | (1) |
|
|
367 | (3) |
|
Smart Card Communication and Command Format |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
Protocols and Secure Communication Schemes |
|
|
374 | (1) |
|
Constraints of Contactless Products |
|
|
375 | (2) |
|
Speed and Working Distance |
|
|
376 | (1) |
|
|
376 | (1) |
|
Contactless Products and the Contact Interface |
|
|
377 | (3) |
|
|
377 | (2) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (16) |
|
|
|
381 | (1) |
|
|
381 | (2) |
|
|
382 | (1) |
|
|
382 | (1) |
|
Inventory Management Applications |
|
|
383 | (6) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
Cost and Installation Limitations |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (3) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
393 | (2) |
|
|
395 | (2) |
|
P&G: RFID and Privacy in the Supply Chain |
|
|
397 | (16) |
|
|
|
397 | (1) |
|
Procter & Gamble's Position |
|
|
398 | (1) |
|
RFID Technology and the Supply Chain |
|
|
399 | (9) |
|
|
406 | (1) |
|
|
406 | (1) |
|
Supply Chain Dependencies |
|
|
407 | (1) |
|
Global Guidelines for EPC Usage |
|
|
408 | (4) |
|
|
408 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
Record Use, Retention, and Security |
|
|
411 | (1) |
|
|
412 | (1) |
|
Citizens: Getting at Our Real Concerns |
|
|
413 | (18) |
|
|
|
|
413 | (1) |
|
Prior to the Point of Sale |
|
|
414 | (1) |
|
After the Point of Sale: Nonconsumer Goods |
|
|
414 | (1) |
|
After the Point of Sale: Consumer Goods |
|
|
415 | (1) |
|
After the Point of Sale: Privacy Interests |
|
|
416 | (3) |
|
|
418 | (1) |
|
Eliminating the RFID Threats to Privacy |
|
|
419 | (9) |
|
Mitigating the Threats: ``Continue Activation'' as the Default for Nonconsumer Goods |
|
|
420 | (1) |
|
Mitigating the Threats: ``Continue Activation'' as the Default for Certain Consumer Goods |
|
|
421 | (1) |
|
Mitigating the Threats: ``Deactivation'' as the Default for Sensitive Products |
|
|
422 | (1) |
|
|
422 | (1) |
|
Enforcing This Scheme by Law |
|
|
423 | (1) |
|
|
423 | (2) |
|
On the Other Hand: The Electronic-Funds Experience |
|
|
425 | (1) |
|
Mitigating the Threats: Different Frequencies |
|
|
426 | (1) |
|
An Additional Consideration: Chip Security |
|
|
427 | (1) |
|
|
428 | (3) |
|
Activists: Communicating with Consumers, Speaking Truth to Policy Makers |
|
|
431 | (8) |
|
|
|
431 | (1) |
|
RFID Characteristics That Threaten Privacy |
|
|
432 | (1) |
|
Proposed Technology-Based Solutions |
|
|
433 | (1) |
|
Is Consumer Education the Answer? |
|
|
434 | (1) |
|
Calling for a Technology Assessment |
|
|
434 | (3) |
|
|
437 | (2) |
|
Experimenting on Humans Using Alien Technology |
|
|
439 | (12) |
|
|
|
439 | (1) |
|
The Surveillance Society: It's Already Here |
|
|
440 | (1) |
|
A Trick to Overcome Resistance |
|
|
440 | (2) |
|
Constituents to Change---and to Stasis |
|
|
442 | (2) |
|
Privacy Advocates Own This Story |
|
|
444 | (1) |
|
Privacy, Change, and Language |
|
|
444 | (3) |
|
How to Make Consumers Demand Change (and RFID) |
|
|
447 | (1) |
|
|
448 | (3) |
|
Asia: Billions Awaken to RFID |
|
|
451 | (16) |
|
|
|
451 | (1) |
|
Factors Separating Western and Asian RFID Experience |
|
|
451 | (4) |
|
Privacy: Western Luxury or Western Construct? |
|
|
452 | (1) |
|
RFID as the Lightning Rod of Privacy Activists |
|
|
453 | (1) |
|
The Indian Perspective on Personal Privacy |
|
|
453 | (1) |
|
Other Asian Countries' Views on Privacy |
|
|
454 | (1) |
|
The Extant Paper Database and Electronic Credit Card Systems |
|
|
455 | (1) |
|
A Cultural Predisposition to Technology Adoption? |
|
|
455 | (1) |
|
Establishment of National Identities |
|
|
455 | (1) |
|
A Complex Interplay of Social Systems and Technology |
|
|
456 | (1) |
|
|
456 | (5) |
|
Local Deployments of RFID in India |
|
|
457 | (1) |
|
A Positive Outlook for Retail and Industry |
|
|
458 | (1) |
|
E-Governance Applications |
|
|
458 | (1) |
|
|
459 | (1) |
|
Government Adoption, Not Regulation, for RFID |
|
|
459 | (1) |
|
India-Specific RFID Deployment Concerns |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
461 | (4) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
465 | (2) |
|
Latin America: Wireless Privacy, Corporations, and the Struggle for Development |
|
|
467 | (12) |
|
|
|
467 | (1) |
|
An Overview of Wireless Services Penetration into Central America |
|
|
468 | (2) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
Pervasiveness of Telecommunications in Central America |
|
|
470 | (3) |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (2) |
|
Old Assumptions in a New World |
|
|
473 | (1) |
|
The Author's Experience Living in El Salvador |
|
|
474 | (1) |
|
An Overview of Privacy Across Latin America |
|
|
475 | (2) |
|
A Word on the U.S.-Mexican Border |
|
|
476 | (1) |
|
What About the United States? |
|
|
477 | (1) |
|
Conclusions: Privacy, Poverty, and the Future |
|
|
477 | (2) |
|
|
479 | (56) |
|
Appendix A Position Statement on the Use of RFID on Consumer Products |
|
|
481 | (16) |
|
Appendix B RFID and the Construction of Privacy: Why Mandatory Kill Is Necessary |
|
|
497 | (10) |
|
Appendix C Guidelines for Privacy Protection on Electronic Tags of Japan |
|
|
507 | (8) |
|
|
Appendix D Adapting Fair Information Practices to Low-Cost RFID Systems |
|
|
515 | (10) |
|
|
Appendix E Guidelines on EPC for Consumer Products |
|
|
525 | (4) |
|
Appendix F Realizing the Mandate: RFID at Wal-Mart |
|
|
529 | (6) |
|
|
Index |
|
535 | |