|
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world`s largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it poses.
The RFID Handbook provides an overview of RFID technology, its associated security and privacy risks, and recommended practices that will enable organizations to realize productivity improvements while also protecting sensitive information and the privacy of individuals.
Expert contributors present a host of applications including RFID enabled automated receiving, triage with RFID for massive incidents, RFID and NFC in relation to mobile phones, and RFID technologies for communication robots and a privacy preserving video surveillance system. The unprecedented coverage also includes detailed descriptions of adaptive splitting protocols as well as tree-based and probabilistic anti-collision protocols. Drawing on its distinguished editors and world-renowned contributors, this one-of-a-kind handbook serves as the ultimate reference on RFID, from basic research concepts to future applications.Contents Section I: Introduction, 1. Physics and Geometry of RFID, 2. EPC global Network, 3. Design Automation for RFID Tags and Systems, 4. Far Field Tag Antenna Design Methodology, 5. Contemporary RFID Reader Architecture, 6. Progress in RFID Education, Section II: TECHNOLOGY, 7. RFID Reader Synchronization, 8. Adaptive Tag Anti Collision Protocols for RFID Passive Tags, 9. Comparative Performance Analysis of Anti-Collision Algorithms in RFID Networks, 10. Maximizing Read Accuracy by Optimally Locating RFID Interrogators, 11. Minimum Energy/Power Considerations, 12. Electomagnetic Coupling in RFID, 13. RFID Tags for Metallic Object Identification, 14. WISP: A Passively Powered UHF RFID Tag with Sensing and Computation, Section III: APPLICATIONS, 15. From Automatic Identification and Data Capture (AIDC) to Smart Business Process: Preparing for a Pilot Integrating RFID, 16. Technological Requirements and Derived Benefits from RFID Enabled receiving in a Supply Chain, 17. A Prototype on RFID and Sensor Networks for Elder Health Care, 18. Triage with RFID tags for Massive Incidents, 19. RFID Tagging and the Design of Place, 20. Photosensing RFID Tags for Precise Location and Geometry Queries, 21. RFID and NFC on Mobile Phones, 22. Applying RFID Techniques for the Next-Generation Automotive Services, 23. Application of RFID Technologies for Communication Robots, 24. Browsing the World with RFID Tags, 25. RFID-Enabled Pr ivacy-Preserving Video Surveillance: A Case Study, Section IV: SECURITY AND PRIVACY, 26. Is RFID technology Secure and Private? 27. Privacy and Personal Information Protection in RFID Systems, 28. Multilateral Approaches for Reliable Mobile RFID Service Systems, 29. ONS Security, 30. Practical Steps for Securing RFID Systems, 31. Lightweight Cryptography for Low Cost RFID: A New Direction in Cryptography, 32. Low Overheard RFID Security, 33. Layers of Security for Active RFID Tags, 34. Cryptographic Approaches to RFID Security and Privacy, 35. RFID Authentication: Reconciling Anonymity and Availability, 36. Security and Privacy of RFID for Biomedical Applications: A Survey. ISBN 9781420054996
|