Muutke küpsiste eelistusi

Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems [Kõva köide]

Edited by , Edited by (Beijing University of Aeronautics & Astronautics, China), Edited by (St. Francis Xavier University, Canada), Edited by (Simula Research Laboratory, Lysaker, Norway)
Teised raamatud teemal:
Teised raamatud teemal:
The "Internet of things" refers to the emergence of radio frequency identification (RFID) and other related technologies, and how everyday objects will soon be able to communicate freely with wireless networks. Zhang, a research scientist in Norway, had edited this collection of articles on these new technologies along with colleagues Yan, Yang and Ning, with contributors focusing primarily on specific case studies, experience reports and best practice theories. While a few of these articles cover a very basic understanding of pervasive networked systems, appealing to engineering students, the majority of the information is directed at experienced installers in the field as well as research scientists. Annotation ©2008 Book News, Inc., Portland, OR (booknews.com)

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location, identity, and history over wireless connections.

Connectivity and Communication — Anything, Anywhere, and Anytime

An examination of the exciting expansion period in this research, The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive, technical, and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies, experience reports, and best practice, it contains information on emerging technologies, market opportunities, and policy implications.

Practical Guidance and Balanced Coverage

The first book of its kind to address major new technological developments and define the Internet of Things, this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs, itis a comprehensive technical and practical guide to recent advances in pervasive networked systems.

Chapter 1 RFID Tags 1
Peter J. Hawrylak, M.H. Mickle, and J.T. Cain
1.1 Introduction
2
1.1.1 RFID Basics
6
1.1.2 Passive RFID Tag Basics
6
1.1.3 Active RFID Tag Basics
7
1.1.4 Semipassive RFID Tag Basics
7
1.1.5 Semiactive RFID Tag Basics
8
1.2 Passive Tags
8
1.2.1 How Backscatter Communication Works
8
1.2.2 Operating Frequencies: An Overview
9
1.2.3 Magnetic Coupling: Near-Field
11
1.2.4 Electromagnetic Coupling: Far-Field
12
1.2.5 Near-Field and Far-Field: Some Key Points
12
1.2.6 Manufacturing Issues with Passive RFID Tags
15
1.2.7 The EPC Gen-2 Protocol
17
1.2.8 Current Outstanding Issues with Passive RFID Tags
19
1.2.8.1 Reducing Tag Size
19
1.2.8.2 Lowering Tag Cost
19
1.2.8.3 Increasing Read Range
19
1.2.8.4 Increasing Read Rate
20
1.2.8.5 Improving Tag Security
20
1.3 Active Tags
21
1.3.1 Active Communication Versus Backscatter Communication
21
1.3.2 Active Tags Conforming ISO 18000-7
21
1.3.3 Sensors
24
1.3.4 Security
25
1.3.5 Increasing Battery Life
26
1.3.6 Current Outstanding Problems with Active RFID Tags
27
1.3.6.1 Low Power Communication
27
1.3.6.2 Lowering Energy Consumption When Dormant
27
1.3.6.3 Enhanced Security
28
1.4 Semipassive RFID Tags
28
1.4.1 Extending Read Range
28
1.4.2 Equipping with Sensors
29
1.4.3 Outstanding Issues with Semipassive Tags
29
1.4.3.1 Cost
29
1.4.3.2 Lower Power Sensors
30
1.4.3.3 Passive Operation as a Fallback
30
1.5 Future of RFID
30
References
32
Chapter 2 RFID Automatic Identification and Data Capture 33
Xiaoyong Su, Chi-Cheng Chu, B.S. Prabhu, and Rajit Gadh
2.1 Introduction
34
2.2 Identification Automation Technologies
35
2.2.1 Barcode Technology
35
2.2.1.1 History
35
2.2.1.2 Symbology
36
2.2.1.3 The Advantages and Disadvantages of Barcodes
36
2.2.2 RFID Technologies
38
2.2.2.1 History
38
2.2.2.2 Existing RFID Technologies
38
2.2.2.3 A Basic RFID System
41
2.2.2.4 Standards
41
2.2.2.5 Advantages and Disadvantages
43
2.2.3 Sensor Technologies
44
2.3 AIDC Infrastructure
45
2.3.1 Definitions and Components
45
2.3.2 Challenges of Creating RFID-Oriented AIDC Infrastructures
47
2.4 Summary
48
References
49
Chapter 3 RFID Data Warehousing and Analysis 53
Hector Gonzalez and Jiawei Han
3.1 Introduction
54
3.1.1 Redundancy Elimination
55
3.1.2 Bulky Movement Compression
55
3.1.3 EPC List Compression
56
3.1.4 Aggregation Along Concept Hierarchies
56
3.2 RFID Data
57
3.3 Architecture of the RFID Warehouse
58
3.3.1 Key Ideas of RFID Data Compression
59
3.3.1.1 Taking Advantage of Bulky Object Movements
60
3.3.1.2 Taking Advantage of Data Generalization
60
3.3.1.3 Taking Advantage of the Merge or Collapse of Path Segments
60
3.3.2 RFID-CUBOID
61
3.3.2.1 Information Table
61
3.3.2.2 Stay Table
62
3.3.2.3 Map Table
63
3.3.3 Lattice of RFID-Cuboids
64
3.4 Construction of an RFID Warehouse
65
3.4.1 Construction of Higher Level RFID-CUBOIDs from Lower Level Ones
66
3.5 Query Processing
68
3.5.1 OLAP
68
3.5.1.1 Rollup
68
3.5.1.2 Drill Down
69
3.5.1.3 Slice and Dice
69
3.5.2 Path Query Processing
69
3.6 Performance Study
71
3.6.1 Data Synthesis
72
3.6.2 RFID-Cuboid Compression
72
3.6.3 Query Processing
74
3.7 Discussion
76
3.7.1 Related Work
77
3.7.2 Open Issues
77
3.7.2.1 Incremental Update
78
3.7.2.2 Construction of a Fading RFID Warehouse Model
78
3.7.2.3 Data Mining in the RFID Warehouse
78
3.7.2.4 Warehousing Scattered Movement Data
79
3.8 Conclusions
79
References
79
Chapter 4 RFID Data Management: Issues, Solutions, and Directions 81
Quan Z. Sheng, Kerry L. Taylor, Zakaria Maamar, and Paul Brebner
4.1 Introduction
82
4.2 Overview of RFID Frameworks
84
4.2.1 Architecture of an RFID System
84
4.2.2 Dimensions for RFID Data Processing
85
4.2.3 Dimensions for RFID Data Integration
86
4.3 State-of-the-Art Technologies for RFID Data Management
88
4.3.1 Siemens RFID Middleware
88
4.3.2 ESP
89
4.3.3 Oracle's EPC Bitmap
90
4.3.4 RFID Warehouse
90
4.3.5 Evaluations and Open Issues
91
4.4 RFID Integration Platforms
93
4.4.1 UCLA WinRFID
93
4.4.2 Siemens RFID Middleware
94
4.4.3 SAP Auto-ID Infrastructure
94
4.4.4 Sun Java System RFID Software
95
4.4.5 EPCglobal Network
95
4.4.6 Other Platforms
96
4.4.7 Evaluations and Open Issues
97
4.5 Conclusion
101
Reference
101
Chapter 5 RFID Security Threats and Solutions 107
Nicolas Sklavos and Vishal Agarwal
5.1 Introduction
108
5.1.1 RFID Tag (or Transponder)
110
5.1.2 RFID Tag Reader (or Transceiver)
111
5.1.3 Backend Database
111
5.2 RFID Applications
111
5.3 Introduction to Security Risks and Threats
112
5.3.1 Spoofing Identity (or Cloning)
113
5.3.2 Physical Attacks
113
5.3.3 Data Tempering
114
5.3.4 Deactivation
114
5.3.5 Detaching the Tag
114
5.3.6 Eavesdropping
114
5.3.7 Denial of Service (DoS)
114
5.3.8 Falsification of Identity
114
5.3.9 Falsification of Contents
115
5.4 Security Measures
115
5.4.1 Tag Killing Command or Permanent Deactivation
116
5.4.2 A Faraday Cage or Jamming Approach
116
5.4.3 Use of Blocker Tags
116
5.4.4 Encryption
116
5.4.5 Rewriting
116
5.4.6 Minimalist Cryptography or Pseudonymization
117
5.4.7 Re-encryption
117
5.4.8 Solutions Based on Hash Functions
117
5.4.8.1 Hash Lock
117
5.4.8.2 Randomized Hash Lock
118
5.4.8.3 Hash Chain Scheme
119
5.4.8.4 Tree-Based Algorithm
119
5.4.9 Scheme by Henrici and Muller
119
5.4.10 RFID Bill of Rights
120
5.4.11 RFID Guardian or Firewall
120
5.4.12 Digital Signature-Based Scheme
120
5.4.13 Layered RFID Security Solution
120
5.4.14 Detection Units and Screaming Tags
121
5.4.15 Some other New Approaches
121
5.4.16 Tag/Reader Deactivation Using Induced Fields
121
5.4.17 Direction Sensitive Tag Entry
121
5.5 Challenges
122
5.6 Conclusions and Outlook
123
References
123
Further Reading
124
Chapter 6 RFID Specification Revisited 127
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda
6.1 Introduction
128
6.2 Generation-2 Versus Generation-1
131
6.2.1 Read and Write Speed
131
6.2.2 Robust Tag Counting
131
6.2.3 Dense Reader Operation
132
6.2.4 Parallel Counting
132
6.3 EPC Class-1 Generation-2 Specification
132
6.3.1 Physical Layer
133
6.3.2 Tag Identification Layer
133
6.3.3 Tag Memory
133
6.3.4 Tag States and Slot Counter
135
6.3.5 Managing Tag Populations
137
6.4 Risks and Threats
137
6.5 Cryptographic Primitives
138
6.5.1 Hash Functions
138
6.5.2 Ciphers
139
6.5.3 Pseudorandom Number Generators
139
6.6 Security Analysis and Open Issues
140
6.6.1 Inventory Procedure
140
6.6.2 Access Procedures
142
6.6.2.1 Write, Kill, and Access Commands
142
6.6.2.2 Read Command
144
6.6.2.3 Lock Command
144
6.6.2.4 BlockWrite and BlockErase Commands
146
6.7 EPC Class-1 Generation-2+
147
6.7.1 Strengthening EPC Tags
147
6.7.1.1 Basic TagAuth Protocol
148
6.7.1.2 Enhanced TagAuth Protocol
148
6.7.2 Shoehorning Security into the EPC Standard
149
6.7.3 Enhancing Security of EPC-C1G2
149
6.7.4 Mutual Authentication Protocol
151
6.7.4.1 Initialization Phase
151
6.7.4.2 The (n+1) Authentication Phase
151
6.8 Conclusions
152
References
153
Chapter 7 RFIG: Geometric Context of Wireless Tags 157
Ramesh Raskar, Paul Beardsley, Paul Dietz, and Jeroen van Baar
7.1 Geometric Context of Wireless Tags
157
7.1.1 How It Works
159
7.1.2 Applications
159
Discussion
163
References
164
Chapter 8 RFID Application in Animal Monitoring 165
Vasileios Ntafis, Charalampos Z. Patrikakis, Eirini G. Fragkiadaki, and Eftychia M. Xylouri-Fragkiadaki
8.1 Introduction
166
8.1.1 Systems of Identification and Traceability
167
8.2 Specific Requirements for Use of RFID Technologies in Animals
168
8.2.1 Means of Identification
168
8.2.2 Standards Regarding the Use of RFIDs: ISO 11784 and ISO 11785 and the Role of ICAR
168
8.2.3 Evaluation of Current Electronic Means of Identification with Emphasis on RFID
170
8.2.3.1 Ruminal Bolus
171
8.2.3.2 Electronic Ear Tags
172
8.2.3.3 Injectable Capsules
172
8.2.3.4 Tag Attachment
173
8.2.4 Comparison of the Electronic Means of Identification
173
8.3 Legislation
174
8.4 Systems Using Electronic Identification Devices and Electronic Data Transfer
176
8.4.1 Databases: Opening Up a New Prospect
177
8.4.1.1 Holding Animals Identification Parameters
178
8.4.1.2 Animal Movement Parameters
178
8.4.1.3 Productive and Reproductive Data
179
8.4.1.4 Animal Health Parameters Per Individual
179
8.5 Recorded Parameters in Domestic and Wildlife Animals
180
8.5.1 Domestic Animals
180
8.5.1.1 Farm Animals
180
8.5.1.2 Companion Animals
181
8.5.2 Nondomestic Animals
181
8.5.2.1 Wild Animals
181
8.5.2.2 Animals in Captivity
181
8.6 Open Issues
182
References
183
Chapter 9 RFID Applications in Assets and Vehicles Tracking 185
Wei Liu, Zhao Peng, Wenqing Cheng, Jianhua He, and Yan Zhang
9.1 Introduction
186
9.2 Problems
187
9.2.1 The Model for RFID-Based Tracking
187
9.2.2 Technical Challenges
189
9.2.2.1 How to Achieve Mobility and Portability Requirements for RFID Applications
189
9.2.2.2 How to Seamlessly Integrate an Enterprise System
190
9.3 Technical Solution
190
9.3.1 Wireless Intelligent Terminal
190
9.3.1.1 System Framework of WIT
191
9.3.1.2 Hardware Design of WIT
191
9.3.1.3 Software Design of WIT
192
9.3.2 Smart RFID Middleware Systems
193
9.3.2.1 System Architecture of Smart RFID Middleware
194
9.3.2.2 Event Filtering
194
9.4 Application Cases
197
9.4.1 Warehouse Management
198
9.4.2 Automatic Vehicle Identification
202
9.5 Conclusion
204
References
204
Chapter 10 RFID Enabled Logistics Services 207
Zongwei Luo, Edward C. Wong, C.J. Tan, S.J. Zhou, William Cheung, and Jiming Liu
10.1 Introduction
208
10.2 Pervasive Services Trend
210
10.3 Open Issues and Opportunities
211
10.3.1 Trustworthiness Research
211
10.3.2 Issues and Opportunities
213
10.4 Trustworthy SOA
213
10.4.1 Trustworthy Service Framework
214
10.4.2 Design Rationale
214
10.4.3 Pervasive Logistics Services Enabling Capabilities
215
10.5 Case Study: RFID-Enabled Logistics Services
216
10.5.1 Resource Constraint
216
10.5.2 Implementation Hardship
217
10.5.3 Privacy Concerns
217
10.5.4 Data Collision
217
10.5.5 Our Demonstration
218
10.6 Mutual Authentication for Mutual Trust
218
10.6.1 Lightweight Mutual Authentication ProtocolI241
219
10.6.1.1 Initialization
219
10.6.1.2 Protocol Procedures
220
10.6.2 Related Work
220
10.6.3 Further Discussion
221
10.7 Data Collision and Dependability
222
10.7.1 Dense RFID Reader Environment
222
10.7.2 Data Collision Problem
222
10.7.3 Proposed Anticollision Schemes
223
10.7.4 Establishing the Collision Model
225
10.7.5 Modeling the Collision States
226
10.7.6 The Anticollision Solution
227
10.8 Conclusion
228
References
228
Chapter 11 Location Tracking in an Office Environment: The Nationwide Case Study 233
Irene Lopez de Vallejo, Stephen Hailes, Ruth Conroy-Dalton, and Alan Penn
11.1 Introduction
234
11.2 The Case Study: Nationwide Headquarters, Swindon
235
11.2.1 Nationwide House and the Office Environment
236
11.2.2 The Technology
238
11.2.3 Communication Strategy
241
11.3 Studying the Pilot
243
11.3.1 Objectives
243
11.3.2 Methods
243
11.4 Results of the Technology Pilot
245
11.5 Results of the Study
247
11.5.1 Understanding and Communication
247
11.5.2 The Temporary Nature of the Deployment
248
11.5.3 Privacy and Intrusion
248
11.5.4 Attitudes and Organizational Culture
249
11.6 Conclusions
250
11.6.1 Conclusions Regarding the Pilot
250
11.6.2 Conclusions Regarding the Study of the Pilot
251
11.6.3 Conclusions Regarding the Approach to the Study of the Pilot
253
11.7 Open Issues
253
Acknowledgments
254
Bibliography
254
Chapter 12 Pervasive Computing Security: Bluetooth® Example 257
Giorgos Kostopoulos, Paris Kitsos, and Odysseas Koufopavlou
12.1 Introduction
258
12.2 Bluetooth Security Layer Specification Description
260
12.2.1 Key Management
261
12.2.2 Authentication
262
12.2.3 Encryption
263
12.3 Bluetooth Security Layer Architectures and Implementations
264
12.4 Hardware Implementation of the Bluetooth Security Specifications
264
12.4.1 SAFER+ Block Cipher Hardware Architecture
265
12.4.2 The Link Key Generation Function E2
267
12.4.3 The E1/E3 Function Architecture
268
12.4.4 The E0 Unit Architecture
268
12.5 Bluetooth Enhanced Security Layer (ESL) Hardware Implementation
270
12.5.1 Enhanced Security Layer (ESL)
271
12.5.2 Enhanced Security Design
272
12.5.3 ESL Entities
274
12.5.4 Prototype Architecture
275
12.5.5 Security Processing Hardware
276
12.5.6 Communication
278
12.5.7 Software Interfaces
279
12.6 Bluetooth Security Implementation Based on Software-Oriented Hardware—Software Partition
280
12.6.1 Constructing Block Ciphering Functions in Software
280
12.6.2 Timing Analysis of Block Ciphering Functions
281
12.6.3 Timing Constraint of Block Ciphering Functions
281
12.6.4 Timing Measurement of Block Ciphering Functions in Embedded MCU
282
12.6.5 Constructing and Analysis of Stream Ciphering Function
282
12.6.6 Implementation Results
283
12.7 Conclusion
284
References
285
Chapter 13 Internet of Things: A Context-Awareness Perspective 287
Davy Preuveneers and Yolande Berbers
13.1 Introduction
288
13.1.1 Software Architecture and the Internet of Things
288
13.1.2 Context Awareness and the Internet of Things
289
13.1.3 Convergence as a Key Enabler for the Internet of Things
290
13.2 State-of-the-Art on Context-Aware Computing for Nonintrusive Behavior
290
13.2.1 A Definition of Context
291
13.2.2 Using RF1D to Sense Context
291
13.2.3 Requirements for Representing and Exchanging Context
292
13.3 Trends in Context-Aware Computing within Service Orientation
294
13.3.1 Context-Enabled Service Oriented Architecture and the Semantic Web
296
13.3.2 Context-Enabled Service Delivery Platforms
297
13.4 Service Provision in a Context-Aware, Converged Service Architecture
299
13.4.1 Context Management as an Enabling Service
300
13.4.2 Conveying Context and Distributed Storage
301
13.5 Context Awareness from RFID to the End-User in the Internet of Things
303
13.6 Conclusions
304
13.7 Open Issues
305
References
305
Index 309
Lu Yan, Yan Zhang, Laurence T. Yang