About the Editors | |
Preface | |
Acknowledgements | |
Components of Rfid Systems and Performance Metrics | |
Performance of Passive UHF RFID Systems in Practice | |
Introduction | |
Ideal RFID System | |
Practical RFID Systems | |
Overview of the Book | |
Conclusion | |
References | |
Performance Metrics and Operational Parameters of RFID Systems | |
Overview | |
Key Operational Parameters | |
Classification of Commercially Available Products | |
Conclusion | |
Problems | |
References | |
UHF RFID Antennas | |
Dipoles and Relatives | |
T-Match and Relatives | |
Putting it Together: Building an RFID Tag | |
The Environment | |
Conclusions, Trends, and Challenges | |
RFID Tag Chip Design | |
Tag Architecture Systems | |
Memory in Standard CMOS Processes | |
Baseband of RFID Tag | |
RFID Tag Performance Optimization | |
Conclusion | |
Design of Passive Tag RFID Readers | |
Overview | |
Basics of Passive RFID Operation | |
Passive RFID Reader Designs | |
Advanced Topics on RFID Reader Design | |
Conclusion | |
RFID Middleware: Concepts and Architecture | |
Introduction | |
Overview of an RFID Middleware Architecture | |
Readers Management | |
Data Management and Application-Level Events | |
Store and Share Data | |
Example | |
Conclusion | |
Tag Identification Protocols | |
Aloha-Based Protocols | |
Pure Aloha | |
Slotted Aloha | |
Framed Slotted Aloha | |
Conclusion | |
Tree-Based Anti-Collision Protocols for RFID Tags | |
Introduction | |
Principles of Tree-Based Anti-Collision Protocols | |
Tree Protocols in the Existing RFID Specifications | |
Practical Issues and Transmission Errors | |
Cooperative Readers and Generalized Arbitration Spaces | |
Conclusion | |
A Comparison of TTF and RTF UHF RFID Protocols | |
Introduction | |
Requirements for RFID Protocols | |
Different Approaches Used in UHF Protocols | |
Description of Stochastic TTF Protocols | |
Comparison between ISO18000-6C and TTF Protocols | |
Conclusion | |
Reader Infrastructure Networking | |
Integrating RFID Readers in Enterprise IT | |
Related Work | |
RFID System Services | |
Reader Capabilities | |
RFID System Architecture Taxonomy | |
EPCglobal Standards | |
Adoption of High-Level Reader Protocols | |
Potential Future Standardization Activities | |
Conclusion | |
Reducing Interference in RFID Reader Networks | |
Introduction | |
Interference Problem in RFID Reader Networks | |
Access Mechanism, Regulations, Standards and Algorithms | |
Comparison | |
Conclusion | |
Optimal Tag Coverage and Tag Report Elimination | |
Introduction | |
Overview of RFID Systems | |
Tree Walking: An Algorithm for Detecting Tags in the Presence of Collisions | |
Reader Collision Avoidance | |
Coverage Redundancy in RFID Systems: Comparison with Sensor Networks | |
Network Model | |
Optimal Tag Coverage and Tag Reporting | |
Redundant Reader Elimination Algorithms: A Centralized Heuristic | |
RRE: A Distributed Solution | |
Adapting to Topological Changes | |
The Layered Elimination Optimization (LEO) | |
Related Work | |
Conclusion | |
Delay/Disruption-Tolerant Mobile RFID Networks: Challenges and Opportunities | |
Motivation | |
Overview of FINDERS | |
General Feasibility Study | |
Unique Challenges and Tactics | |
Related Work | |
Conclusion | |
Addressing Other Challenges in Rfid Systems | |
Improving Read Ranges and Read Rates for Passive RFID Systems | |
Introduction | |
Signal Descriptions and Formulations for Passive Backscatter RFID Systems | |
Improving the Read Range of a Passive RFID System | |
Improving the Read Rate of a Passive RFID System | |
Two Design Examples for RFID System | |
Conclusion | |
Principles and Techniques of RFID Positioning | |
Introduction | |
Tag Range Estimation Techniques | |
DOA Estimation Techniques | |
RFID Positioning Techniques | |
Improving Positioning Accuracy | |
Conclusion | |
Towards Secure and Privacy-Enhanced RFID Systems | |
Introduction | |
Security and Privacy | |
Classification of RFID Systems | |
Attacks on RFID Systems and Appropriate Countermeasures | |
Lightweight Cryptography for RFID | |
Conclusion | |
Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems | |
Introduction | |
Threats against the RFID System | |
Required Properties | |
Cryptographic Protocols for Identification with Privacy | |
Cryptographic Protocols for Authentication without Privacy | |
Cryptographic Protocols for Privacy and Other Requirements | |
Implementation | |
Real Systems and Attacks | |
Conclusion | |
Novel RFID Technologies: Energy Harvesting for Self-Powered Autonomous RFID Systems | |
Introduction | |
Novel Low Power Architectures | |
Energy Harvesting Optimized for RFID | |
Future Trends in Energy Harvesting | |
Conclusion | |
Simulators and Emulators for Different Abstraction Layers of UHF RFID Systems | |
Introduction | |
The Simulation/Emulation Platforms | |
UHF RFID Simulation Platform | |
Real-Time HIL-Verification and Emulation Platform | |
Higher Class Tag Architecture Based on Energy Harvesting | |
Conclusion | |
Problems | |
References | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.