did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470665275

RFID Systems : Research Trends and Challenges

by ; ;
  • ISBN13:

    9780470665275

  • ISBN10:

    0470665270

  • Format: eBook
  • Copyright: 2010-07-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $145.00
We're Sorry.
No Options Available at This Time.

Summary

This book provides an insight into the ls"hotrs" field of Radio Frequency Identification (RFID) SystemsIn this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews various algorithms, protocols and design solutions that have been developed within the area, including most recent advances. In addition, authors cover a wide range of recognized problems in RFID industry, striking a balance between theoretical and practical coverage. Limitations of the technology and state-of-the-art solutions are identified and new research opportunities are addressed. Finally, the book is authored by experts and respected researchers in the field and every chapter is peer reviewed. Key Features: Provides the most comprehensive analysis of networking aspects of RFID systems, including tag identification protocols and reader anti-collision algorithms Covers in detail major research problems of passive UHF systems such as improving reading accuracy, reading range and throughput Analyzes other "hot topics" including localization of passive RFID tags, energy harvesting, simulator and emulator design, security and privacy Discusses design of tag antennas, tag and reader circuits for passive UHF RFID systems Presents EPCGlobal architecture framework, middleware and protocols Includes an accompanying website with PowerPoint slides and solutions to the problems (http://www.wiley.com/go/bolic-rfid) This book will be an invaluable guide for researchers and graduate students in electrical engineering and computer science, and researchers and developers in telecommunication industry.

Table of Contents

About the Editors
Preface
Acknowledgements
Components of Rfid Systems and Performance Metrics
Performance of Passive UHF RFID Systems in Practice
Introduction
Ideal RFID System
Practical RFID Systems
Overview of the Book
Conclusion
References
Performance Metrics and Operational Parameters of RFID Systems
Overview
Key Operational Parameters
Classification of Commercially Available Products
Conclusion
Problems
References
UHF RFID Antennas
Dipoles and Relatives
T-Match and Relatives
Putting it Together: Building an RFID Tag
The Environment
Conclusions, Trends, and Challenges
RFID Tag Chip Design
Tag Architecture Systems
Memory in Standard CMOS Processes
Baseband of RFID Tag
RFID Tag Performance Optimization
Conclusion
Design of Passive Tag RFID Readers
Overview
Basics of Passive RFID Operation
Passive RFID Reader Designs
Advanced Topics on RFID Reader Design
Conclusion
RFID Middleware: Concepts and Architecture
Introduction
Overview of an RFID Middleware Architecture
Readers Management
Data Management and Application-Level Events
Store and Share Data
Example
Conclusion
Tag Identification Protocols
Aloha-Based Protocols
Pure Aloha
Slotted Aloha
Framed Slotted Aloha
Conclusion
Tree-Based Anti-Collision Protocols for RFID Tags
Introduction
Principles of Tree-Based Anti-Collision Protocols
Tree Protocols in the Existing RFID Specifications
Practical Issues and Transmission Errors
Cooperative Readers and Generalized Arbitration Spaces
Conclusion
A Comparison of TTF and RTF UHF RFID Protocols
Introduction
Requirements for RFID Protocols
Different Approaches Used in UHF Protocols
Description of Stochastic TTF Protocols
Comparison between ISO18000-6C and TTF Protocols
Conclusion
Reader Infrastructure Networking
Integrating RFID Readers in Enterprise IT
Related Work
RFID System Services
Reader Capabilities
RFID System Architecture Taxonomy
EPCglobal Standards
Adoption of High-Level Reader Protocols
Potential Future Standardization Activities
Conclusion
Reducing Interference in RFID Reader Networks
Introduction
Interference Problem in RFID Reader Networks
Access Mechanism, Regulations, Standards and Algorithms
Comparison
Conclusion
Optimal Tag Coverage and Tag Report Elimination
Introduction
Overview of RFID Systems
Tree Walking: An Algorithm for Detecting Tags in the Presence of Collisions
Reader Collision Avoidance
Coverage Redundancy in RFID Systems: Comparison with Sensor Networks
Network Model
Optimal Tag Coverage and Tag Reporting
Redundant Reader Elimination Algorithms: A Centralized Heuristic
RRE: A Distributed Solution
Adapting to Topological Changes
The Layered Elimination Optimization (LEO)
Related Work
Conclusion
Delay/Disruption-Tolerant Mobile RFID Networks: Challenges and Opportunities
Motivation
Overview of FINDERS
General Feasibility Study
Unique Challenges and Tactics
Related Work
Conclusion
Addressing Other Challenges in Rfid Systems
Improving Read Ranges and Read Rates for Passive RFID Systems
Introduction
Signal Descriptions and Formulations for Passive Backscatter RFID Systems
Improving the Read Range of a Passive RFID System
Improving the Read Rate of a Passive RFID System
Two Design Examples for RFID System
Conclusion
Principles and Techniques of RFID Positioning
Introduction
Tag Range Estimation Techniques
DOA Estimation Techniques
RFID Positioning Techniques
Improving Positioning Accuracy
Conclusion
Towards Secure and Privacy-Enhanced RFID Systems
Introduction
Security and Privacy
Classification of RFID Systems
Attacks on RFID Systems and Appropriate Countermeasures
Lightweight Cryptography for RFID
Conclusion
Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems
Introduction
Threats against the RFID System
Required Properties
Cryptographic Protocols for Identification with Privacy
Cryptographic Protocols for Authentication without Privacy
Cryptographic Protocols for Privacy and Other Requirements
Implementation
Real Systems and Attacks
Conclusion
Novel RFID Technologies: Energy Harvesting for Self-Powered Autonomous RFID Systems
Introduction
Novel Low Power Architectures
Energy Harvesting Optimized for RFID
Future Trends in Energy Harvesting
Conclusion
Simulators and Emulators for Different Abstraction Layers of UHF RFID Systems
Introduction
The Simulation/Emulation Platforms
UHF RFID Simulation Platform
Real-Time HIL-Verification and Emulation Platform
Higher Class Tag Architecture Based on Energy Harvesting
Conclusion
Problems
References
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program