RFID Systems (eBook, ePUB)
Research Trends and Challenges
Redaktion: Bolic, Miodrag; Stojmenovic, Ivan; Simplot-Ryl, David
Alle Infos zum eBook verschenken
RFID Systems (eBook, ePUB)
Research Trends and Challenges
Redaktion: Bolic, Miodrag; Stojmenovic, Ivan; Simplot-Ryl, David
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews various algorithms, protocols and design solutions that have been developed within the area, including most recent advances. In addition, authors cover a wide range of recognized problems in RFID industry, striking a balance between theoretical and practical coverage. Limitations of…mehr
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 12.42MB
- Benny BingBroadband Wireless Multimedia Networks (eBook, ePUB)98,99 €
- Sasu TarkomaPublish / Subscribe Systems (eBook, ePUB)84,99 €
- Markus RuppEvaluation of HSDPA and LTE (eBook, ePUB)107,99 €
- Cooperative Networking (eBook, ePUB)98,99 €
- Cognitive Communications (eBook, ePUB)125,99 €
- E. Bryan CarneConnections for the Digital Age (eBook, ePUB)111,99 €
- Sudip MisraNetwork Routing (eBook, ePUB)90,99 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 576
- Erscheinungstermin: 8. September 2010
- Englisch
- ISBN-13: 9780470975664
- Artikelnr.: 37301334
- Verlag: John Wiley & Sons
- Seitenzahl: 576
- Erscheinungstermin: 8. September 2010
- Englisch
- ISBN-13: 9780470975664
- Artikelnr.: 37301334
SYSTEMS AND PERFORMANCE METRICS. 1 Performance of Passive UHF RFID Systems
in Practice (Miodrag Bolic, Akshay Athalye, and Tzu Hao Li). 1.1
Introduction. 1.2 Ideal RFID System. 1.3 Practical RFID Systems. 1.4
Overview of the Book. 1.5 Conclusion. References. 2 Performance Metrics and
Operational Parameters of RFID Systems (Raj Bridelall and Abhiman Hande).
2.1 Overview. 2.2 Key Operational Parameters. 2.3 Classification of
Commercially Available Products. 2.4 Conclusion. Problems. References. 3
UHF RFID Antennas (Daniel Deavours). 3.1 Dipoles and Relatives. 3.2 T-Match
and Relatives. 3.3 Putting it Together: Building an RFID Tag. 3.4 The
Environment. 3.5 Conclusions, Trends, and Challenges. References. 4 RFID
Tag Chip Design (Na Yan, Wenyi Che, Yuqing Yang, and Qiang Li). 4.1 Tag
Architecture Systems. 4.2 Memory in Standard CMOS Processes. 4.3 Baseband
of RFID Tag. 4.4 RFID Tag Performance Optimization. 4.5 Conclusion.
Problems. References. 5 Design of Passive Tag RFID Readers (Scott Chiu).
5.1 Overview. 5.2 Basics of Passive RFID Operation. 5.3 Passive RFID Reader
Designs. 5.4 Advanced Topics on RFID Reader Design. 5.5 Conclusion.
Problems. References. 6 RFID Middleware: Concepts and Architecture
(Nathalie Mitton, Loïc Schmidt, and David Simplot-Ryl). 6.1 Introduction.
6.2 Overview of an RFID Middleware Architecture. 6.3 Readers Management.
6.4 Data Management and Application-Level Events. 6.5 Store and Share Data.
6.6 Example. 6.7 Conclusion. Problems. References. Part II TAG
IDENTIFICATION PROTOCOLS. 7 Aloha-Based Protocols (Kwan-Wu Chin and Dheeraj
Klair). 7.1 Pure Aloha. 7.2 Slotted Aloha. 7.3 Framed Slotted Aloha. 7.4
Conclusion. Problems. References. 8 Tree-Based Anti-Collision Protocols for
RFID Tags (Petar Popovski). 8.1 Introduction. 8.2 Principles of Tree-Based
Anti-Collision Protocols. 8.3 Tree Protocols in the Existing RFID
Specifications. 8.4 Practical Issues and Transmission Errors. 8.5
Cooperative Readers and Generalized Arbitration Spaces. 8.6 Conclusion.
Problems. References. 9 A Comparison of TTF and RTF UHF RFID Protocols
(Alwyn Hoffman, Johann Holm, and Henri-Jean Marais). 9.1 Introduction. 9.2
Requirements for RFID Protocols. 9.3 Different Approaches Used in UHF
Protocols. 9.4 Description of Stochastic TTF Protocols. 9.5 Comparison
between ISO18000-6C and TTF Protocols. 9.6 Conclusion. Problems.
References. Part III READER INFRASTRUCTURE NETWORKING. 10 Integrating RFID
Readers in Enterprise IT (Christian Floerkemeier and Sanjay Sarma). 10.1
Related Work. 10.2 RFID System Services. 10.3 Reader Capabilities. 10.4
RFID System Architecture Taxonomy. 10.5 EPCglobal Standards. 10.6 Adoption
of High-Level Reader Protocols. 10.7 Potential Future Standardization
Activities. 10.8 Conclusion. Problems. References. 11 Reducing Interference
in RFID Reader Networks (Sung Won Kim and Gyanendra Prasad Joshi). 11.1
Introduction. 11.2 Interference Problem in RFID Reader Networks. 11.3
Access Mechanism, Regulations, Standards and Algorithms. 11.4 Comparison.
11.5 Conclusion. Problems. References. 12 Optimal Tag Coverage and Tag
Report Elimination (Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet
Koyuturk, Suresh Jagannathan, and Ananth Grama). 12.1 Introduction. 12.2
Overview of RFID Systems. 12.3 Tree Walking: An Algorithm for Detecting
Tags in the Presence of Collisions. 12.4 Reader Collision Avoidance. 12.5
Coverage Redundancy in RFID Systems: Comparison with Sensor Networks. 12.6
Network Model. 12.7 Optimal Tag Coverage and Tag Reporting. 12.8 Redundant
Reader Elimination Algorithms: A Centralized Heuristic. 12.9 RRE: A
Distributed Solution. 12.10 Adapting to Topological Changes. 12.11 The
Layered Elimination Optimization (LEO). 12.12 Related Work. 12.13
Conclusion. Problems. References. 13 Delay/Disruption-Tolerant Mobile RFID
Networks: Challenges and Opportunities (Hongyi Wu and Zhipeng Yang). 13.1
Motivation. 13.2 Overview of FINDERS. 13.3 General Feasibility Study. 13.4
Unique Challenges and Tactics. 13.5 Related Work. 13.6 Conclusion.
Problems. References. Part IV ADDRESSING OTHER CHALLENGES IN RFID SYSTEMS.
14 Improving Read Ranges and Read Rates for Passive RFID Systems (Zhiguang
Fan, Fazhong Shen, Jianhua Shen, and Lixin Ran). 14.1 Introduction. 14.2
Signal Descriptions and Formulations for Passive Backscatter RFID Systems.
14.3 Improving the Read Range of a Passive RFID System. 14.4 Improving the
Read Rate of a Passive RFID System. 14.5 Two Design Examples for RFID
System. 14.6 Conclusion. Problems. References. 15 Principles and Techniques
of RFID Positioning (Yimin Zhang, Xin Li, and Moeness Amin). 15.1
Introduction. 15.2 Tag Range Estimation Techniques. 15.3 DOA Estimation
Techniques. 15.4 RFID Positioning Techniques. 15.5 Improving Positioning
Accuracy. 15.6 Conclusion. Problems. References. 16 Towards Secure and
Privacy-Enhanced RFID Systems (Heiko Knospe and Kerstin Lemke-Rust). 16.1
Introduction. 16.2 Security and Privacy. 16.3 Classification of RFID
Systems. 16.4 Attacks on RFID Systems and Appropriate Countermeasures. 16.5
Lightweight Cryptography for RFID. 16.6 Conclusion. Problems. References.
17 Cryptographic Approaches for Improving Security and Privacy Issues of
RFID Systems (Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita). 17.1
Introduction. 17.2 Threats against the RFID System. 17.3 Required
Properties. 17.4 Cryptographic Protocols for Identification with Privacy.
17.5 Cryptographic Protocols for Authentication without Privacy. 17.6
Cryptographic Protocols for Privacy and Other Requirements. 17.7
Implementation. 17.8 Real Systems and Attacks. 17.9 Conclusion. Problems.
References. 18 Novel RFID Technologies: Energy Harvesting for Self-Powered
Autonomous RFID Systems (Raj Bridelall and Abhiman Hande). 18.1
Introduction. 18.2 Novel Low Power Architectures. 18.3 Energy Harvesting
Optimized for RFID. 18.4 Future Trends in Energy Harvesting. 18.5
Conclusion. Problems. References. 19 Simulators and Emulators for Different
Abstraction Layers of UHF RFID Systems (Christian Steger, Alex Janek,
Reinhold Weiß, Vojtech Derbek, Manfred Jantscher, Josef Preishuber-Pfluegl,
and Markus Pistauer). 19.1 Introduction. 19.2 The Simulation/Emulation
Platforms. 19.3 UHF RFID Simulation Platform. 19.4 Real-Time
HIL-Verification and Emulation Platform. 19.5 Higher Class Tag Architecture
Based on Energy Harvesting. 19.6 Conclusion. Problems. References. Index.
SYSTEMS AND PERFORMANCE METRICS. 1 Performance of Passive UHF RFID Systems
in Practice (Miodrag Bolic, Akshay Athalye, and Tzu Hao Li). 1.1
Introduction. 1.2 Ideal RFID System. 1.3 Practical RFID Systems. 1.4
Overview of the Book. 1.5 Conclusion. References. 2 Performance Metrics and
Operational Parameters of RFID Systems (Raj Bridelall and Abhiman Hande).
2.1 Overview. 2.2 Key Operational Parameters. 2.3 Classification of
Commercially Available Products. 2.4 Conclusion. Problems. References. 3
UHF RFID Antennas (Daniel Deavours). 3.1 Dipoles and Relatives. 3.2 T-Match
and Relatives. 3.3 Putting it Together: Building an RFID Tag. 3.4 The
Environment. 3.5 Conclusions, Trends, and Challenges. References. 4 RFID
Tag Chip Design (Na Yan, Wenyi Che, Yuqing Yang, and Qiang Li). 4.1 Tag
Architecture Systems. 4.2 Memory in Standard CMOS Processes. 4.3 Baseband
of RFID Tag. 4.4 RFID Tag Performance Optimization. 4.5 Conclusion.
Problems. References. 5 Design of Passive Tag RFID Readers (Scott Chiu).
5.1 Overview. 5.2 Basics of Passive RFID Operation. 5.3 Passive RFID Reader
Designs. 5.4 Advanced Topics on RFID Reader Design. 5.5 Conclusion.
Problems. References. 6 RFID Middleware: Concepts and Architecture
(Nathalie Mitton, Loïc Schmidt, and David Simplot-Ryl). 6.1 Introduction.
6.2 Overview of an RFID Middleware Architecture. 6.3 Readers Management.
6.4 Data Management and Application-Level Events. 6.5 Store and Share Data.
6.6 Example. 6.7 Conclusion. Problems. References. Part II TAG
IDENTIFICATION PROTOCOLS. 7 Aloha-Based Protocols (Kwan-Wu Chin and Dheeraj
Klair). 7.1 Pure Aloha. 7.2 Slotted Aloha. 7.3 Framed Slotted Aloha. 7.4
Conclusion. Problems. References. 8 Tree-Based Anti-Collision Protocols for
RFID Tags (Petar Popovski). 8.1 Introduction. 8.2 Principles of Tree-Based
Anti-Collision Protocols. 8.3 Tree Protocols in the Existing RFID
Specifications. 8.4 Practical Issues and Transmission Errors. 8.5
Cooperative Readers and Generalized Arbitration Spaces. 8.6 Conclusion.
Problems. References. 9 A Comparison of TTF and RTF UHF RFID Protocols
(Alwyn Hoffman, Johann Holm, and Henri-Jean Marais). 9.1 Introduction. 9.2
Requirements for RFID Protocols. 9.3 Different Approaches Used in UHF
Protocols. 9.4 Description of Stochastic TTF Protocols. 9.5 Comparison
between ISO18000-6C and TTF Protocols. 9.6 Conclusion. Problems.
References. Part III READER INFRASTRUCTURE NETWORKING. 10 Integrating RFID
Readers in Enterprise IT (Christian Floerkemeier and Sanjay Sarma). 10.1
Related Work. 10.2 RFID System Services. 10.3 Reader Capabilities. 10.4
RFID System Architecture Taxonomy. 10.5 EPCglobal Standards. 10.6 Adoption
of High-Level Reader Protocols. 10.7 Potential Future Standardization
Activities. 10.8 Conclusion. Problems. References. 11 Reducing Interference
in RFID Reader Networks (Sung Won Kim and Gyanendra Prasad Joshi). 11.1
Introduction. 11.2 Interference Problem in RFID Reader Networks. 11.3
Access Mechanism, Regulations, Standards and Algorithms. 11.4 Comparison.
11.5 Conclusion. Problems. References. 12 Optimal Tag Coverage and Tag
Report Elimination (Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet
Koyuturk, Suresh Jagannathan, and Ananth Grama). 12.1 Introduction. 12.2
Overview of RFID Systems. 12.3 Tree Walking: An Algorithm for Detecting
Tags in the Presence of Collisions. 12.4 Reader Collision Avoidance. 12.5
Coverage Redundancy in RFID Systems: Comparison with Sensor Networks. 12.6
Network Model. 12.7 Optimal Tag Coverage and Tag Reporting. 12.8 Redundant
Reader Elimination Algorithms: A Centralized Heuristic. 12.9 RRE: A
Distributed Solution. 12.10 Adapting to Topological Changes. 12.11 The
Layered Elimination Optimization (LEO). 12.12 Related Work. 12.13
Conclusion. Problems. References. 13 Delay/Disruption-Tolerant Mobile RFID
Networks: Challenges and Opportunities (Hongyi Wu and Zhipeng Yang). 13.1
Motivation. 13.2 Overview of FINDERS. 13.3 General Feasibility Study. 13.4
Unique Challenges and Tactics. 13.5 Related Work. 13.6 Conclusion.
Problems. References. Part IV ADDRESSING OTHER CHALLENGES IN RFID SYSTEMS.
14 Improving Read Ranges and Read Rates for Passive RFID Systems (Zhiguang
Fan, Fazhong Shen, Jianhua Shen, and Lixin Ran). 14.1 Introduction. 14.2
Signal Descriptions and Formulations for Passive Backscatter RFID Systems.
14.3 Improving the Read Range of a Passive RFID System. 14.4 Improving the
Read Rate of a Passive RFID System. 14.5 Two Design Examples for RFID
System. 14.6 Conclusion. Problems. References. 15 Principles and Techniques
of RFID Positioning (Yimin Zhang, Xin Li, and Moeness Amin). 15.1
Introduction. 15.2 Tag Range Estimation Techniques. 15.3 DOA Estimation
Techniques. 15.4 RFID Positioning Techniques. 15.5 Improving Positioning
Accuracy. 15.6 Conclusion. Problems. References. 16 Towards Secure and
Privacy-Enhanced RFID Systems (Heiko Knospe and Kerstin Lemke-Rust). 16.1
Introduction. 16.2 Security and Privacy. 16.3 Classification of RFID
Systems. 16.4 Attacks on RFID Systems and Appropriate Countermeasures. 16.5
Lightweight Cryptography for RFID. 16.6 Conclusion. Problems. References.
17 Cryptographic Approaches for Improving Security and Privacy Issues of
RFID Systems (Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita). 17.1
Introduction. 17.2 Threats against the RFID System. 17.3 Required
Properties. 17.4 Cryptographic Protocols for Identification with Privacy.
17.5 Cryptographic Protocols for Authentication without Privacy. 17.6
Cryptographic Protocols for Privacy and Other Requirements. 17.7
Implementation. 17.8 Real Systems and Attacks. 17.9 Conclusion. Problems.
References. 18 Novel RFID Technologies: Energy Harvesting for Self-Powered
Autonomous RFID Systems (Raj Bridelall and Abhiman Hande). 18.1
Introduction. 18.2 Novel Low Power Architectures. 18.3 Energy Harvesting
Optimized for RFID. 18.4 Future Trends in Energy Harvesting. 18.5
Conclusion. Problems. References. 19 Simulators and Emulators for Different
Abstraction Layers of UHF RFID Systems (Christian Steger, Alex Janek,
Reinhold Weiß, Vojtech Derbek, Manfred Jantscher, Josef Preishuber-Pfluegl,
and Markus Pistauer). 19.1 Introduction. 19.2 The Simulation/Emulation
Platforms. 19.3 UHF RFID Simulation Platform. 19.4 Real-Time
HIL-Verification and Emulation Platform. 19.5 Higher Class Tag Architecture
Based on Energy Harvesting. 19.6 Conclusion. Problems. References. Index.