You are previewing Advanced RFID Systems, Security, and Applications.
O'Reilly logo
Advanced RFID Systems, Security, and Applications

Book Description

As modern technologies continue to transform and impact our society, Radio Frequency Identification has emerged as one of the top areas of study to do just that. Using its wireless data capturing technique and incredible capabilities such as automatic identification, tracking, handling large amounts of data, and flexibility in operation, RFID aims to revamp the new millennium. Advanced RFID Systems, Security, and Applications features a comprehensive collection of research provided by leading experts in both academia and industries. This leading reference source provides state-of-the- art development on RFID and its contents will be of the upmost use to students and researchers at all levels as well as technologists, planners, and policy makers. RFID technology is progressing into a new phase of development.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. EDITORIAL ADVISORY BOARD
    2. LIST OF REVIEWERS
  5. Dedication
  6. Preface
  7. Section 1: Security
    1. Chapter 1: Security Risks/Vulnerability in a RFID System and Possible Defenses
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CASE STUDY TO UNDERSTAND SECURITY RISKS/VULNERABILITIES FOR A RFID SYSTEM AND POSSIBLE DEFENCES
      5. RECOMMENDATIONS AND FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 2: Security and Privacy in RFID Systems
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. RFID SYSTEM
      4. 3. SECURITY AND PRIVACY REQUIREMENTS
      5. 4. SECURITY AND PRIVACY THREATS IN RFID SYSTEM
      6. 5. RFID SECURITY PROTOCOLS
      7. 6. RESEARCH CHALLENGES IN RFID SECURITY
      8. 7. CONCLUSION
    3. Chapter 3: The Evolution of Intelligent Classifiers into an Integrated Approach to Correct RFID Anomalies
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FALSE-NEGATIVE MANAGEMENT
      5. FALSE-POSITIVE MANAGEMENT
      6. INTEGRATED CLASSIFIER
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    4. Chapter 4: Near Field Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. NF-COA TECHNOLOGY
      5. THE NEAR-FIELD CERTIFICATE OF AUTHENTICITY
      6. THE NF-COA READER
      7. PERFORMANCE EVALUATION
      8. COA VERIFICATION
      9. WITHSTANDING POTENTIAL ATTACKS
      10. APPLICATIONS
      11. CONCLUSION
  8. Section 2: Middleware
    1. Chapter 5: Edgeware in RFID Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. EVOLUTION OF EDGEWARE
      4. THE VALUE OF EDGEWARE
      5. METHODOLOGY: HOW TO IMPLEMENT EDGEWARE
      6. RFID PROJECT IMPLEMENTATION
      7. SUMMARY
    2. Chapter 6: Design and Implementation of an Event-Based RFID Middleware
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE EVENT-BASED RFID MIDDLEWARE
      5. ARCHITECTURE DESCRIPTION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
  9. Section 3: Anti-Collision Protocol
    1. Chapter 7: RFID Tag Anti-Collision Protocols
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. ANTI-COLLISION PROTOCOL
      4. 3. SOME QT-BASED PROTOCOLS
      5. 4. THE PROPOSED TAG ANTI-COLLISION PROTOCOLS
      6. 5. FUTURE RESEARCH DIRECTIONS
      7. 6. CONCLUSION
    2. Chapter 8: Managing Tag Collision in RFID Data Streams using Smart Tag Anti-Collision Techniques
      1. ABSTRACT
      2. INTRODUCTION
      3. COLLISION HANDLING IN RFID DATA STREAMS
      4. DETERMINISTIC ANTI-COLLISION TECHNIQUES
      5. PROBABILISTIC ANTI-COLLISION TECHNIQUE
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
  10. Section 4: Applications
    1. Chapter 9: Passive UHF RFID Technology Applied to Automatic Vehicle Identification
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. ACTIVE AND PASSIVE UHF RFID TAG TECHNOLOGIES
      4. 3. ANTENNAS FOR PASSIVE RFID TAGS AT UHF FREQUENCY BAND
      5. 4. THE PROPAGATION MODEL IN RFID SYSTEMS APPLIED TO VEHICULAR IDENTIFICATION
      6. 5. ELECTROMAGNETIC COMPATIBILITY ASPECTS
      7. 6. CONCLUDING REMARKS
    2. Chapter 10: Exploring Value-Added Applications of Chipless RFID Systems to Enhance Wider Adoption
      1. ABSTRACT
      2. INTRODUCTION
      3. CHIPLESS RFID
      4. THE EXISTING APPLICATIONS OF CHIPLESS RFID
      5. VALUE-ADDED APPLICATIONS OF CHIPLESS RFID
      6. CONCLUDING REMARKS AND FUTURE DEVELOPMENT
    3. Chapter 11: Potential Impact of RFID-Based Tracing Systems on the Integrity of Pharmaceutical Products
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. EXPERIMENTAL ASSESSMENT OF RFID-RELATED RISK: THE IMPORTANCE OF A MULTIDISCIPLINARY STRATEGY
      5. MATERIALS
      6. METHODS
      7. EXPERIMENTAL RESULTS
      8. CONCLUSION AND FUTURE WORKS
    4. Chapter 12: 5.8 GHz Portable Wireless Monitoring System for Sleep Apnea Diagnosis in Wireless Body Sensor Network (WBSN) Using Active RFID and MIMO Technology
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. A PORTABLE WIRELESS MONITORING SYSTEM FOR SLEEP APNEA DIAGNOSIS
      5. 4. 5.8 GHZ CIRCULAR PATCH ANTENNA TAG AND PROPAGATION CHARACTERISTICS OF 5.8 GHZ RADIO WAVE IN WIRELESS BODY SENSOR NETWORK ENVIRONMENT
      6. 5. MIMO APPLICATION IN WBSN
      7. 6. CONCLUSION
    5. Chapter 13: Chipless RFID Sensor for High Voltage Condition Monitoring
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. DESIGN
      5. 4. RESULTS
      6. 5. CONCLUSION
    6. Chapter 14: Recent Advancements in Smart Sensors and Sensing Technology
      1. ABSTRACT
      2. INTRODUCTION
      3. DESIGN ISSUES TOWARDS A LOW COST SENSING SYSTEM
      4. SMART SENSING SYSTEM FOR DIFFERENT APPLICATIONS
      5. TOWARDS AN INTELLIGENT SENSING SYSTEM
      6. CONCLUSION AND FUTURE WORKS
  11. Compilation of References
  12. About the Contributors