RFID systems research trends and challenges /

In this book, the authors provide an insight into field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews various algorithms, protocols and design solutions that have been developed within the a...

Full description

Saved in:
Bibliographic Details
Group Author: Bolic, Miodrag.; Simplot-Ryl, David; Stojmenović, Ivan.
Published:
Literature type: Electronic eBook
Language: English
Series: Wiley online library.
Subjects:
Online Access: http://onlinelibrary.wiley.com/book/10.1002/9780470665251
Summary: In this book, the authors provide an insight into field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews various algorithms, protocols and design solutions that have been developed within the area, including most recent advances. In addition, the authors cover a wide range of recognized problems in the RFID industry, striking a balance between theoretical and practical coverage. Limitations of the technology and state-of-the-art solutions are identified and new research opportunities are addressed. The book is authored by experts and respected researchers in the field, and every chapter has been peer reviewed.
This book will be an invaluable guide for researchers and graduate students in electrical engineering and computer science, and researchers and developers in the telecommunications industry. --Book Jacket.
Item Description: Includes index.
Carrier Form: 1 online resource.
Bibliography: Includes bibliographical references and index.
ISBN: 9780470746028
0470746025
9780470665251
0470665254
Index Number: TK6570
CLC: TN911.23
Contents: Machine generated contents note: pt. I COMPONENTS OF RFID SYSTEMS AND PERFORMANCE METRICS -- 1. Performance of Passive UHF RFID Systems in Practice / Tzu Hao Li -- 1.1. Introduction -- 1.1.1. Overview -- 1.1.2. Background -- 1.2. Ideal RFID System -- 1.3. Practical RFID Systems -- 1.3.1.Complexity of RFID Systems -- 1.3.2. Single Reader, Single Tag -- 1.3.3. Single Readers, Single or Multiple Tags -- 1.3.4. Multiple Readers, Single or Multiple Tags -- 1.3.5. Mobile Readers and/or Mobile Tags -- 1.3.6. Large Deployments Including Many Readers and Tags -- 1.3.7. Other Desired Features of Practical RFID Systems -- 1.4. Overview of the Book -- 1.5. Conclusion -- References -- 2. Performance Metrics and Operational Parameters of RFID Systems / Abhiman Hande -- 2.1. Overview -- 2.2. Key Operational Parameters -- 2.2.1. Operating Distance -- 2.2.2. System Throughput -- 2.2.3. Localization -- 2.2.4. Impact of Materials -- 2.2.5. Other Factors Considered -- 2.3. Classification of Commercially Available Products -- 2.3.1. Near-Field Coupled Systems -- 2.3.2. Far-Field Propagating Systems -- 2.3.3. Ultra Wide-Band -- 2.3.4. Passive Solutions -- 2.3.5. Semi-Passive Architecturs -- 2.3.6. Far-Field Solutions -- 2.3.7. Near-Field Solutions -- 2.3.8. Active Architectures -- 2.4. Conclusion -- Problems -- References -- 3. UHF RFID Antennas / Daniel Deavours -- 3.1. Dipoles and Relatives -- 3.1.1. Dipole -- 3.1.2. Radiation -- 3.1.3. Impedance and Bandwidth -- 3.1.4. Radiating Resistance -- 3.1.5. Polarization -- 3.2.T-Match and Relatives -- 3.2.1. The Classic T-Match -- 3.2.2. The Modified T-Match -- 3.3. Putting it Together: Building an RFID Tag -- 3.4. The Environment -- 3.4.1. Dielectric Constant -- 3.4.2. Dielectric Loss -- 3.4.3. Metals -- 3.4.4. Propagation -- 3.4.5. Practical Steps to Overcome Environmental Challenges -- 3.5. Conclusions, Trends, and Challenges -- References -- 4. RFID Tag Chip Design / Qiang Li -- 4.1. Tag Architecture Systems -- 4.1.1. Tag Architecture -- 4.1.2. Design of High Effieciency Frontend Circuits -- 4.2. Memory in Standard CMOS Processes -- 4.2.1. Why Have a Standard CMOS eNVM? -- 4.2.2. Basic Cell Structure and Operation Mechanisms -- 4.2.3. Memory Architecture and Peripheral Circuits -- 4.2.4. Future Challengs -- 4.3. Baseband of RFID Tag -- 4.3.1. Introduction -- 4.3.2. Low Power Baseband Design -- 4.3.3. Clock Rate -- 4.3.4. Clock-Related Low-Power Techniques -- 4.3.5. Sub-Threshold Digital Circuit -- 4.3.6. Adiabatic Circuti -- 4.4. RFID Tag Performance Optimization -- 4.4.1. Low Power -- 4.4.2. Low Cost -- 4.5. Conclusion -- Problems -- References -- 5. Design of Passive Tag RFID Readers / Scott Chiu -- 5.1. Overview -- 5.2. Basics of Passive RFID Operation -- 5.2.1. An Introduction to ISO 18000-6C Air Interface -- 5.2.2. Tag Singulation and Access -- 5.3. Passive RFID Reader Designs -- 5.3.1. RFID Reader Read Range and Transmitted Power -- 5.3.2. RFID Reader Implementation -- 5.4. Advanced Topics on RFID Reader Design -- 5.4.1. Integrated Transceiver -- 5.4.2. Cancellation of Transmitted Carrier Leakage -- 5.4.3. Dense Reader Operations -- 5.5. Conclusion -- Problems -- References -- 6. RFID Middleware: Concepts and Architecture / David Simplot-Ryl -- 6.1. Introduction -- 6.2. Overview of an RFID Middleware Architecture -- 6.2.1. The Need for a Middleware -- 6.2.2. Architecture -- 6.3. Readers Management -- 6.3.1. Reader Protocol/Interface -- 6.3.2. Manage and Monitor -- 6.4. Data Management and Application-Level Events -- 6.4.1. Data Management and ALE Functionalities -- 6.4.2. Specs and Reports -- 6.4.3. Reserch Challenges -- 6.5. Store and Share Data -- 6.5.1. EPC Information Services -- 6.5.2. Object Naming Service -- 6.5.3. Discovery Services -- 6.6. Example -- 6.7. Conclusion -- Problems -- References -- pt. II TAG IDENTIFICATION PROTOCOLS -- 7. Aloha-Based Protocols / Dheeraj Klair -- 7.1. Pure Aloha -- 7.2. Slotted Aloha -- 7.2.1. Pure versus Slotted Aloha Variants -- 7.3. Framed Slotted Aloha -- 7.3.1. Basic -- 7.3.2. Dynamic -- 7.3.3. Enhanced/Hybrid -- 7.4. Conclusion -- Problems -- References -- 8. Tree-Based Anti-Collision Protocols for RFID Tags / Petar Popovski -- 8.1. Introduction -- 8.2. Principles of Tree-Based Anti-Collision Protocols -- 8.2.1. System Model -- 8.2.2. Basic Tree Protocols -- 8.2.3. Improvements to the Basic Tree Protocol -- 8.2.4. General Arbitration Framework for Tree-Based Protocols -- 8.2.5. Numerical Illustration -- 8.3. Tree Protocols in the Existing RFID Specifications -- 8.3.1. Tree Protocol for EPCglobal Class 0 -- 8.3.2. Tree Protocol for EPCglobal Class 1 -- 8.4. Practical Issues and Transmission Errors -- 8.4.1. Token Generation -- 8.4.2. Transmission Errors -- 8.4.3. Dealing with Moving Tags -- 8.5. Cooperative Readers and Generalized Arbitration Spaces -- 8.5.1. Two-Dimensional Arbitration Space -- 8.5.2. Further Remarks and Multi-Dimensional Arbitration -- 8.6. Conclusion -- Problems -- References -- 9.A Comparison of TTF and RTF
15. Principles and Techniques of RFID Positioning / Moeness Amin -- 15.1. Introduction -- 15.2. Tag Range Estimation Techniques -- 15.2.1. RSS-Based Techniques -- 15.2.2. Phase-Based Techniques -- 15.2.3. Time-Based Techniques -- 15.3. DOA Estimation Techniques -- 15.3.1. Directional Antenna -- 15.3.2. Phased Array -- 15.3.3. Smart Antenna -- 15.4. RFID Positioning Techniques -- 15.4.1. Trilateration/Multilateration -- 15.4.2. Triangulation -- 15.4.3. Hybrid Direction/Range Methods -- 15.4.4. Radio Map Matching Methods -- 15.4.5. Proximity -- 15.5. Improving Positioning Accuracy -- 15.6. Conclusion -- Problems -- References -- 16. Towards Secure and Privacy-Enhanced RFID Systems / Kerstin Lemke-Rust -- 16.1. Introduction -- 16.2. Security and Privacy -- 16.3. Classification of RFID Systems -- 16.4. Attacks on RFID Systems and Appropriate Countermeasures -- 16.4.1. Eavesdropping of Messages -- 16.4.2. Denial-of-Service -- 16.4.3. Manipulation of Message -- 16.4.4. Generation of Messages -- 16.4.5. Relay of Messages -- 16.4.6. Tracking and Hotlisting -- 16.4.7. Cloning of Transponders -- 16.4.8. Cryptanalytic Attacks -- 16.4.9. Physical Implementation Attacks -- 16.5. Lightweight Cryptography for RFID -- 16.5.1. Random Number Generators -- 16.5.2. Block Ciphers -- 16.5.3. Stream Ciphers -- 16.5.4. Hash Functions -- 16.5.5. Public-Key Cryptography -- 16.6. Conclusion -- Problems -- References -- 17. Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems / Shingo Kinoshita -- 17.1. Introduction.