Chapter 1 RFID Tags |
|
1 | |
|
Peter J. Hawrylak, M.H. Mickle, and J.T. Cain |
|
|
|
|
2 | |
|
|
6 | |
|
1.1.2 Passive RFID Tag Basics |
|
|
6 | |
|
1.1.3 Active RFID Tag Basics |
|
|
7 | |
|
1.1.4 Semipassive RFID Tag Basics |
|
|
7 | |
|
1.1.5 Semiactive RFID Tag Basics |
|
|
8 | |
|
|
8 | |
|
1.2.1 How Backscatter Communication Works |
|
|
8 | |
|
1.2.2 Operating Frequencies: An Overview |
|
|
9 | |
|
1.2.3 Magnetic Coupling: Near-Field |
|
|
11 | |
|
1.2.4 Electromagnetic Coupling: Far-Field |
|
|
12 | |
|
1.2.5 Near-Field and Far-Field: Some Key Points |
|
|
12 | |
|
1.2.6 Manufacturing Issues with Passive RFID Tags |
|
|
15 | |
|
1.2.7 The EPC Gen-2 Protocol |
|
|
17 | |
|
1.2.8 Current Outstanding Issues with Passive RFID Tags |
|
|
19 | |
|
1.2.8.1 Reducing Tag Size |
|
|
19 | |
|
1.2.8.2 Lowering Tag Cost |
|
|
19 | |
|
1.2.8.3 Increasing Read Range |
|
|
19 | |
|
1.2.8.4 Increasing Read Rate |
|
|
20 | |
|
1.2.8.5 Improving Tag Security |
|
|
20 | |
|
|
21 | |
|
1.3.1 Active Communication Versus Backscatter Communication |
|
|
21 | |
|
1.3.2 Active Tags Conforming ISO 18000-7 |
|
|
21 | |
|
|
24 | |
|
|
25 | |
|
1.3.5 Increasing Battery Life |
|
|
26 | |
|
1.3.6 Current Outstanding Problems with Active RFID Tags |
|
|
27 | |
|
1.3.6.1 Low Power Communication |
|
|
27 | |
|
1.3.6.2 Lowering Energy Consumption When Dormant |
|
|
27 | |
|
1.3.6.3 Enhanced Security |
|
|
28 | |
|
1.4 Semipassive RFID Tags |
|
|
28 | |
|
1.4.1 Extending Read Range |
|
|
28 | |
|
1.4.2 Equipping with Sensors |
|
|
29 | |
|
1.4.3 Outstanding Issues with Semipassive Tags |
|
|
29 | |
|
|
29 | |
|
1.4.3.2 Lower Power Sensors |
|
|
30 | |
|
1.4.3.3 Passive Operation as a Fallback |
|
|
30 | |
|
|
30 | |
|
|
32 | |
Chapter 2 RFID Automatic Identification and Data Capture |
|
33 | |
|
Xiaoyong Su, Chi-Cheng Chu, B.S. Prabhu, and Rajit Gadh |
|
|
|
|
34 | |
|
2.2 Identification Automation Technologies |
|
|
35 | |
|
|
35 | |
|
|
35 | |
|
|
36 | |
|
2.2.1.3 The Advantages and Disadvantages of Barcodes |
|
|
36 | |
|
|
38 | |
|
|
38 | |
|
2.2.2.2 Existing RFID Technologies |
|
|
38 | |
|
2.2.2.3 A Basic RFID System |
|
|
41 | |
|
|
41 | |
|
2.2.2.5 Advantages and Disadvantages |
|
|
43 | |
|
2.2.3 Sensor Technologies |
|
|
44 | |
|
|
45 | |
|
2.3.1 Definitions and Components |
|
|
45 | |
|
2.3.2 Challenges of Creating RFID-Oriented AIDC Infrastructures |
|
|
47 | |
|
|
48 | |
|
|
49 | |
Chapter 3 RFID Data Warehousing and Analysis |
|
53 | |
|
Hector Gonzalez and Jiawei Han |
|
|
|
|
54 | |
|
3.1.1 Redundancy Elimination |
|
|
55 | |
|
3.1.2 Bulky Movement Compression |
|
|
55 | |
|
3.1.3 EPC List Compression |
|
|
56 | |
|
3.1.4 Aggregation Along Concept Hierarchies |
|
|
56 | |
|
|
57 | |
|
3.3 Architecture of the RFID Warehouse |
|
|
58 | |
|
3.3.1 Key Ideas of RFID Data Compression |
|
|
59 | |
|
3.3.1.1 Taking Advantage of Bulky Object Movements |
|
|
60 | |
|
3.3.1.2 Taking Advantage of Data Generalization |
|
|
60 | |
|
3.3.1.3 Taking Advantage of the Merge or Collapse of Path Segments |
|
|
60 | |
|
|
61 | |
|
3.3.2.1 Information Table |
|
|
61 | |
|
|
62 | |
|
|
63 | |
|
3.3.3 Lattice of RFID-Cuboids |
|
|
64 | |
|
3.4 Construction of an RFID Warehouse |
|
|
65 | |
|
3.4.1 Construction of Higher Level RFID-CUBOIDs from Lower Level Ones |
|
|
66 | |
|
|
68 | |
|
|
68 | |
|
|
68 | |
|
|
69 | |
|
|
69 | |
|
3.5.2 Path Query Processing |
|
|
69 | |
|
|
71 | |
|
|
72 | |
|
3.6.2 RFID-Cuboid Compression |
|
|
72 | |
|
|
74 | |
|
|
76 | |
|
|
77 | |
|
|
77 | |
|
3.7.2.1 Incremental Update |
|
|
78 | |
|
3.7.2.2 Construction of a Fading RFID Warehouse Model |
|
|
78 | |
|
3.7.2.3 Data Mining in the RFID Warehouse |
|
|
78 | |
|
3.7.2.4 Warehousing Scattered Movement Data |
|
|
79 | |
|
|
79 | |
|
|
79 | |
Chapter 4 RFID Data Management: Issues, Solutions, and Directions |
|
81 | |
|
Quan Z. Sheng, Kerry L. Taylor, Zakaria Maamar, and Paul Brebner |
|
|
|
|
82 | |
|
4.2 Overview of RFID Frameworks |
|
|
84 | |
|
4.2.1 Architecture of an RFID System |
|
|
84 | |
|
4.2.2 Dimensions for RFID Data Processing |
|
|
85 | |
|
4.2.3 Dimensions for RFID Data Integration |
|
|
86 | |
|
4.3 State-of-the-Art Technologies for RFID Data Management |
|
|
88 | |
|
4.3.1 Siemens RFID Middleware |
|
|
88 | |
|
|
89 | |
|
4.3.3 Oracle's EPC Bitmap |
|
|
90 | |
|
|
90 | |
|
4.3.5 Evaluations and Open Issues |
|
|
91 | |
|
4.4 RFID Integration Platforms |
|
|
93 | |
|
|
93 | |
|
4.4.2 Siemens RFID Middleware |
|
|
94 | |
|
4.4.3 SAP Auto-ID Infrastructure |
|
|
94 | |
|
4.4.4 Sun Java System RFID Software |
|
|
95 | |
|
|
95 | |
|
|
96 | |
|
4.4.7 Evaluations and Open Issues |
|
|
97 | |
|
|
101 | |
|
|
101 | |
Chapter 5 RFID Security Threats and Solutions |
|
107 | |
|
Nicolas Sklavos and Vishal Agarwal |
|
|
|
|
108 | |
|
5.1.1 RFID Tag (or Transponder) |
|
|
110 | |
|
5.1.2 RFID Tag Reader (or Transceiver) |
|
|
111 | |
|
|
111 | |
|
|
111 | |
|
5.3 Introduction to Security Risks and Threats |
|
|
112 | |
|
5.3.1 Spoofing Identity (or Cloning) |
|
|
113 | |
|
|
113 | |
|
|
114 | |
|
|
114 | |
|
|
114 | |
|
|
114 | |
|
5.3.7 Denial of Service (DoS) |
|
|
114 | |
|
5.3.8 Falsification of Identity |
|
|
114 | |
|
5.3.9 Falsification of Contents |
|
|
115 | |
|
|
115 | |
|
5.4.1 Tag Killing Command or Permanent Deactivation |
|
|
116 | |
|
5.4.2 A Faraday Cage or Jamming Approach |
|
|
116 | |
|
5.4.3 Use of Blocker Tags |
|
|
116 | |
|
|
116 | |
|
|
116 | |
|
5.4.6 Minimalist Cryptography or Pseudonymization |
|
|
117 | |
|
|
117 | |
|
5.4.8 Solutions Based on Hash Functions |
|
|
117 | |
|
|
117 | |
|
5.4.8.2 Randomized Hash Lock |
|
|
118 | |
|
5.4.8.3 Hash Chain Scheme |
|
|
119 | |
|
5.4.8.4 Tree-Based Algorithm |
|
|
119 | |
|
5.4.9 Scheme by Henrici and Muller |
|
|
119 | |
|
5.4.10 RFID Bill of Rights |
|
|
120 | |
|
5.4.11 RFID Guardian or Firewall |
|
|
120 | |
|
5.4.12 Digital Signature-Based Scheme |
|
|
120 | |
|
5.4.13 Layered RFID Security Solution |
|
|
120 | |
|
5.4.14 Detection Units and Screaming Tags |
|
|
121 | |
|
5.4.15 Some other New Approaches |
|
|
121 | |
|
5.4.16 Tag/Reader Deactivation Using Induced Fields |
|
|
121 | |
|
5.4.17 Direction Sensitive Tag Entry |
|
|
121 | |
|
|
122 | |
|
5.6 Conclusions and Outlook |
|
|
123 | |
|
|
123 | |
|
|
124 | |
Chapter 6 RFID Specification Revisited |
|
127 | |
|
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda |
|
|
|
|
128 | |
|
6.2 Generation-2 Versus Generation-1 |
|
|
131 | |
|
6.2.1 Read and Write Speed |
|
|
131 | |
|
6.2.2 Robust Tag Counting |
|
|
131 | |
|
6.2.3 Dense Reader Operation |
|
|
132 | |
|
|
132 | |
|
6.3 EPC Class-1 Generation-2 Specification |
|
|
132 | |
|
|
133 | |
|
6.3.2 Tag Identification Layer |
|
|
133 | |
|
|
133 | |
|
6.3.4 Tag States and Slot Counter |
|
|
135 | |
|
6.3.5 Managing Tag Populations |
|
|
137 | |
|
|
137 | |
|
6.5 Cryptographic Primitives |
|
|
138 | |
|
|
138 | |
|
|
139 | |
|
6.5.3 Pseudorandom Number Generators |
|
|
139 | |
|
6.6 Security Analysis and Open Issues |
|
|
140 | |
|
6.6.1 Inventory Procedure |
|
|
140 | |
|
|
142 | |
|
6.6.2.1 Write, Kill, and Access Commands |
|
|
142 | |
|
|
144 | |
|
|
144 | |
|
6.6.2.4 BlockWrite and BlockErase Commands |
|
|
146 | |
|
6.7 EPC Class-1 Generation-2+ |
|
|
147 | |
|
6.7.1 Strengthening EPC Tags |
|
|
147 | |
|
6.7.1.1 Basic TagAuth Protocol |
|
|
148 | |
|
6.7.1.2 Enhanced TagAuth Protocol |
|
|
148 | |
|
6.7.2 Shoehorning Security into the EPC Standard |
|
|
149 | |
|
6.7.3 Enhancing Security of EPC-C1G2 |
|
|
149 | |
|
6.7.4 Mutual Authentication Protocol |
|
|
151 | |
|
6.7.4.1 Initialization Phase |
|
|
151 | |
|
6.7.4.2 The (n+1) Authentication Phase |
|
|
151 | |
|
|
152 | |
|
|
153 | |
Chapter 7 RFIG: Geometric Context of Wireless Tags |
|
157 | |
|
Ramesh Raskar, Paul Beardsley, Paul Dietz, and Jeroen van Baar |
|
|
|
7.1 Geometric Context of Wireless Tags |
|
|
157 | |
|
|
159 | |
|
|
159 | |
|
|
163 | |
|
|
164 | |
Chapter 8 RFID Application in Animal Monitoring |
|
165 | |
|
Vasileios Ntafis, Charalampos Z. Patrikakis, Eirini G. Fragkiadaki, and Eftychia M. Xylouri-Fragkiadaki |
|
|
|
|
166 | |
|
8.1.1 Systems of Identification and Traceability |
|
|
167 | |
|
8.2 Specific Requirements for Use of RFID Technologies in Animals |
|
|
168 | |
|
8.2.1 Means of Identification |
|
|
168 | |
|
8.2.2 Standards Regarding the Use of RFIDs: ISO 11784 and ISO 11785 and the Role of ICAR |
|
|
168 | |
|
8.2.3 Evaluation of Current Electronic Means of Identification with Emphasis on RFID |
|
|
170 | |
|
|
171 | |
|
8.2.3.2 Electronic Ear Tags |
|
|
172 | |
|
8.2.3.3 Injectable Capsules |
|
|
172 | |
|
|
173 | |
|
8.2.4 Comparison of the Electronic Means of Identification |
|
|
173 | |
|
|
174 | |
|
8.4 Systems Using Electronic Identification Devices and Electronic Data Transfer |
|
|
176 | |
|
8.4.1 Databases: Opening Up a New Prospect |
|
|
177 | |
|
8.4.1.1 Holding Animals Identification Parameters |
|
|
178 | |
|
8.4.1.2 Animal Movement Parameters |
|
|
178 | |
|
8.4.1.3 Productive and Reproductive Data |
|
|
179 | |
|
8.4.1.4 Animal Health Parameters Per Individual |
|
|
179 | |
|
8.5 Recorded Parameters in Domestic and Wildlife Animals |
|
|
180 | |
|
|
180 | |
|
|
180 | |
|
8.5.1.2 Companion Animals |
|
|
181 | |
|
8.5.2 Nondomestic Animals |
|
|
181 | |
|
|
181 | |
|
8.5.2.2 Animals in Captivity |
|
|
181 | |
|
|
182 | |
|
|
183 | |
Chapter 9 RFID Applications in Assets and Vehicles Tracking |
|
185 | |
|
Wei Liu, Zhao Peng, Wenqing Cheng, Jianhua He, and Yan Zhang |
|
|
|
|
186 | |
|
|
187 | |
|
9.2.1 The Model for RFID-Based Tracking |
|
|
187 | |
|
9.2.2 Technical Challenges |
|
|
189 | |
|
9.2.2.1 How to Achieve Mobility and Portability Requirements for RFID Applications |
|
|
189 | |
|
9.2.2.2 How to Seamlessly Integrate an Enterprise System |
|
|
190 | |
|
|
190 | |
|
9.3.1 Wireless Intelligent Terminal |
|
|
190 | |
|
9.3.1.1 System Framework of WIT |
|
|
191 | |
|
9.3.1.2 Hardware Design of WIT |
|
|
191 | |
|
9.3.1.3 Software Design of WIT |
|
|
192 | |
|
9.3.2 Smart RFID Middleware Systems |
|
|
193 | |
|
9.3.2.1 System Architecture of Smart RFID Middleware |
|
|
194 | |
|
|
194 | |
|
|
197 | |
|
9.4.1 Warehouse Management |
|
|
198 | |
|
9.4.2 Automatic Vehicle Identification |
|
|
202 | |
|
|
204 | |
|
|
204 | |
Chapter 10 RFID Enabled Logistics Services |
|
207 | |
|
Zongwei Luo, Edward C. Wong, C.J. Tan, S.J. Zhou, William Cheung, and Jiming Liu |
|
|
|
|
208 | |
|
10.2 Pervasive Services Trend |
|
|
210 | |
|
10.3 Open Issues and Opportunities |
|
|
211 | |
|
10.3.1 Trustworthiness Research |
|
|
211 | |
|
10.3.2 Issues and Opportunities |
|
|
213 | |
|
|
213 | |
|
10.4.1 Trustworthy Service Framework |
|
|
214 | |
|
|
214 | |
|
10.4.3 Pervasive Logistics Services Enabling Capabilities |
|
|
215 | |
|
10.5 Case Study: RFID-Enabled Logistics Services |
|
|
216 | |
|
10.5.1 Resource Constraint |
|
|
216 | |
|
10.5.2 Implementation Hardship |
|
|
217 | |
|
|
217 | |
|
|
217 | |
|
|
218 | |
|
10.6 Mutual Authentication for Mutual Trust |
|
|
218 | |
|
10.6.1 Lightweight Mutual Authentication ProtocolI241 |
|
|
219 | |
|
|
219 | |
|
10.6.1.2 Protocol Procedures |
|
|
220 | |
|
|
220 | |
|
10.6.3 Further Discussion |
|
|
221 | |
|
10.7 Data Collision and Dependability |
|
|
222 | |
|
10.7.1 Dense RFID Reader Environment |
|
|
222 | |
|
10.7.2 Data Collision Problem |
|
|
222 | |
|
10.7.3 Proposed Anticollision Schemes |
|
|
223 | |
|
10.7.4 Establishing the Collision Model |
|
|
225 | |
|
10.7.5 Modeling the Collision States |
|
|
226 | |
|
10.7.6 The Anticollision Solution |
|
|
227 | |
|
|
228 | |
|
|
228 | |
Chapter 11 Location Tracking in an Office Environment: The Nationwide Case Study |
|
233 | |
|
Irene Lopez de Vallejo, Stephen Hailes, Ruth Conroy-Dalton, and Alan Penn |
|
|
|
|
234 | |
|
11.2 The Case Study: Nationwide Headquarters, Swindon |
|
|
235 | |
|
11.2.1 Nationwide House and the Office Environment |
|
|
236 | |
|
|
238 | |
|
11.2.3 Communication Strategy |
|
|
241 | |
|
|
243 | |
|
|
243 | |
|
|
243 | |
|
11.4 Results of the Technology Pilot |
|
|
245 | |
|
11.5 Results of the Study |
|
|
247 | |
|
11.5.1 Understanding and Communication |
|
|
247 | |
|
11.5.2 The Temporary Nature of the Deployment |
|
|
248 | |
|
11.5.3 Privacy and Intrusion |
|
|
248 | |
|
11.5.4 Attitudes and Organizational Culture |
|
|
249 | |
|
|
250 | |
|
11.6.1 Conclusions Regarding the Pilot |
|
|
250 | |
|
11.6.2 Conclusions Regarding the Study of the Pilot |
|
|
251 | |
|
11.6.3 Conclusions Regarding the Approach to the Study of the Pilot |
|
|
253 | |
|
|
253 | |
|
|
254 | |
|
|
254 | |
Chapter 12 Pervasive Computing Security: Bluetooth® Example |
|
257 | |
|
Giorgos Kostopoulos, Paris Kitsos, and Odysseas Koufopavlou |
|
|
|
|
258 | |
|
12.2 Bluetooth Security Layer Specification Description |
|
|
260 | |
|
|
261 | |
|
|
262 | |
|
|
263 | |
|
12.3 Bluetooth Security Layer Architectures and Implementations |
|
|
264 | |
|
12.4 Hardware Implementation of the Bluetooth Security Specifications |
|
|
264 | |
|
12.4.1 SAFER+ Block Cipher Hardware Architecture |
|
|
265 | |
|
12.4.2 The Link Key Generation Function E2 |
|
|
267 | |
|
12.4.3 The E1/E3 Function Architecture |
|
|
268 | |
|
12.4.4 The E0 Unit Architecture |
|
|
268 | |
|
12.5 Bluetooth Enhanced Security Layer (ESL) Hardware Implementation |
|
|
270 | |
|
12.5.1 Enhanced Security Layer (ESL) |
|
|
271 | |
|
12.5.2 Enhanced Security Design |
|
|
272 | |
|
|
274 | |
|
12.5.4 Prototype Architecture |
|
|
275 | |
|
12.5.5 Security Processing Hardware |
|
|
276 | |
|
|
278 | |
|
12.5.7 Software Interfaces |
|
|
279 | |
|
12.6 Bluetooth Security Implementation Based on Software-Oriented Hardware—Software Partition |
|
|
280 | |
|
12.6.1 Constructing Block Ciphering Functions in Software |
|
|
280 | |
|
12.6.2 Timing Analysis of Block Ciphering Functions |
|
|
281 | |
|
12.6.3 Timing Constraint of Block Ciphering Functions |
|
|
281 | |
|
12.6.4 Timing Measurement of Block Ciphering Functions in Embedded MCU |
|
|
282 | |
|
12.6.5 Constructing and Analysis of Stream Ciphering Function |
|
|
282 | |
|
12.6.6 Implementation Results |
|
|
283 | |
|
|
284 | |
|
|
285 | |
Chapter 13 Internet of Things: A Context-Awareness Perspective |
|
287 | |
|
Davy Preuveneers and Yolande Berbers |
|
|
|
|
288 | |
|
13.1.1 Software Architecture and the Internet of Things |
|
|
288 | |
|
13.1.2 Context Awareness and the Internet of Things |
|
|
289 | |
|
13.1.3 Convergence as a Key Enabler for the Internet of Things |
|
|
290 | |
|
13.2 State-of-the-Art on Context-Aware Computing for Nonintrusive Behavior |
|
|
290 | |
|
13.2.1 A Definition of Context |
|
|
291 | |
|
13.2.2 Using RF1D to Sense Context |
|
|
291 | |
|
13.2.3 Requirements for Representing and Exchanging Context |
|
|
292 | |
|
13.3 Trends in Context-Aware Computing within Service Orientation |
|
|
294 | |
|
13.3.1 Context-Enabled Service Oriented Architecture and the Semantic Web |
|
|
296 | |
|
13.3.2 Context-Enabled Service Delivery Platforms |
|
|
297 | |
|
13.4 Service Provision in a Context-Aware, Converged Service Architecture |
|
|
299 | |
|
13.4.1 Context Management as an Enabling Service |
|
|
300 | |
|
13.4.2 Conveying Context and Distributed Storage |
|
|
301 | |
|
13.5 Context Awareness from RFID to the End-User in the Internet of Things |
|
|
303 | |
|
|
304 | |
|
|
305 | |
|
|
305 | |
Index |
|
309 | |