RFID Protocol Design, Optimization, and Security for the Internet of Things

Buy e-book PDF
(plus tax if applicable)
Buy print edition
image of RFID Protocol Design, Optimization, and Security for the Internet of Things
View affiliations
Publication Year: 2017

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promises a huge growth in RFID technology and usage. This book covers the topic of RFID protocol design, optimization, and security. RFID systems allow for a much easier and error free inventory management and tracking, but the probabilistic nature of RFID protocols makes the design and optimization complex and challenging. Most existing commercial RFID systems are not well designed. In this book, the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

Inspec keywords: cryptographic protocols; security of data; data privacy; Internet of Things; radiofrequency identification

Other keywords: RFID queries; RFID estimation; RFID protocol; RFID privacy; RFID detection; RFID identification; Internet of Things security; authentication protocols

Subjects: RFID systems; Computer communications; General and management topics; General electrical engineering topics; Protocols; Data security; Cryptography; Other computer networks

Related content

This is a required field
Please enter a valid email address