Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Networked RFID: Systems, Software and ServicesAugust 2008
Publisher:
  • Springer Publishing Company, Incorporated
ISBN:978-1-84800-152-7
Published:08 August 2008
Pages:
204
Skip Bibliometrics Section
Reflects downloads up to 25 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies. The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications such as e-passports, ticketing and supply-chain management throughout. The text explores RFID technology fundamentals, including operating principles, core system components and performance trade-offs involved in the selection of specific RFID platforms. The emphasis is on a practical approach, developing an arsenal of techniques and designs that can be mixed and matched to fit the needs of new systems and applications. Features Offers a practical approach, with specific RFID applications providing context for discussion Highlights the basics of RFID, including wireless energy transfer and communication by reflection. Presents the main ingredients for building complete network RFID systems Discusses the different types of readers and tags in detail making particular reference to common technologies used in real systems Explores how the different identifier systems encode unique serial codes for tagged entities, and how codes are assigned to particular organizations Describes the structure and functionality of modern RFID systems and middleware Considers different types of network services required for RFID support Debates the hot topics of privacy and security Looks at the future of RFID technology Allows readers to experiment via a supplementary website with operational instances of RFID network services: http://www.roussos.eu/rfid Written for IT professionals as well as students, this comprehensive and reader-friendly text discusses the current state-of-the-art in RFID platforms and architecture. It will be invaluable for anyone experienced in software development and involved with RFID technology, and will facilitate informed decision-making.

Contributors
  • Birkbeck, University of London

Reviews

Arun Ektare

Radio frequency identification (RFID) is now being accepted by the business community, despite the fact that it still has its challenges. It is being used to tag items in supply chain management (SCM), and by commuters who use public transportation. It is important for engineers to know about this technology, its implementation, and problems presented by RFID. This book promises to fill this gap, and it does so quite successfully. The book contains ten chapters, and two appendices containing acronyms and references. Chapter 1 traces the history of RFID, and briefly introduces the way RFID works. It explains how the tags, attached to objects, work, and how the tag reader works. Chapter 2 introduces readers to real-life implementations of RFID. This includes e-passports, the Oyster card used in England by commuters, and also applications in SCM. These applications are described in detail. Technological challenges and privacy issues are addressed, and solutions discussed. Some applications in asset management and electronic payments are briefly covered. The chapter ends with a discussion of standards set by the International Organization for Standardization (ISO). The implementations are discussed in later chapters. Chapter 3 addresses the issue of tags and tag readers. The author goes into detail on the technology behind readers, and their components. There is a description of a session with readers using commands. Tags using magnetic and capacitive coupling are described, and flowcharts of their sessions are discussed. Chapter 4 goes into the physics of RFID. There is a brief and to-the-point discussion about electromagnetic waves, inductive/capacitive systems, data encoding and modulation, antennas used, and errors encountered when using tags and readers. Chapter 5 discusses identifier systems. The identifiers, like bar codes, have been used for a long time. This chapter contains descriptions of many codes used in RFID. The most popular, the electronic product code (EPC), is detailed. This is followed by descriptions of ISO standards, universal ID, and universal resource identifiers (URIs). Using SCM as a motivating example, chapter 6 describes the connection between the RFID domain and Internet protocol (IP) based networks. The RFID processing pipeline is discussed in detail, and the system architecture for software and hardware is also described, including the RFID stack, the reader layer, the network layer, and the event manager (EM). The chapter ends with a discussion of how Oracle, IBM, Cisco and other companies implement EM. Chapter 7 is all about middleware. With the help of a program and unified modeling language (UML), the author describes an application. Chapter 8 details the process of connecting the tags to the location, and presents a detailed description of the object that the tag represents. This requires network services, database searches, and delivery of the data collected. The chapter addresses the issues of networking and event management. Chapter 9 goes into the security and privacy issues of RFID. The nature of possible attacks is described here, and cryptographic solutions are indicated. Legal issues are also addressed. Chapter 10 contains descriptions of newer technologies that will be useful in the future, including wireless sensor networks. The chapter ends with an application in retail business, called MyGrocer, which the author developed and successfully implemented. The book is very well written and illustrated. If you are new to RFID technology, this book may be a good start as an overview. Engineers will like this book. It is highly recommended. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations