RFID and the Internet of Things /

RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves. An RFID tag contains an antenna and a microchip that allows it to transmit and receive. This technology is a possible...

Full description

Bibliographic Details
Other Authors: Chabanne, Hervé, Urien, Pascal, Susini, Jean-Ferdinand
Format: eBook
Language:English
Published: London : Wiley, [2013]
Series:ISTE.
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 05695nam a2200661 4500
001 ocn830161710
003 OCoLC
005 20170124070305.9
006 m o d
007 cr cnu---unuuu
008 130316p20132011enk ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDXCP  |d DG1  |d N$T  |d OCLCF  |d UKDOC  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d DEBBG  |d OCLCQ  |d GrThAP 
020 |a 9781118614297  |q (electronic bk.) 
020 |a 1118614291  |q (electronic bk.) 
020 |a 9781118614433  |q (electronic bk.) 
020 |a 1118614437  |q (electronic bk.) 
029 1 |a CHBIS  |b 010026709 
029 1 |a CHVBK  |b 306231751 
029 1 |a DEBBG  |b BV043395641 
029 1 |a DEBSZ  |b 431356424 
029 1 |a NZ1  |b 15916448 
035 |a (OCoLC)830161710 
041 1 |a eng  |h fre 
050 4 |a TK6570.I34  |b R479 2011 
072 7 |a TEC  |x 041000  |2 bisacsh 
082 0 4 |a 384.6 
049 |a MAIN 
130 0 |a RFID et l'internet des choses.  |l English. 
245 1 0 |a RFID and the Internet of Things /  |c edited by Hervé Chabanne, Pascal Urien, Jean-Ferdinand Susini. 
264 1 |a London :  |b Wiley,  |c [2013] 
264 4 |c ©2011 
300 |a 1 online resource (299 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a ISTE 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright Page; Table of Contents; Foreword; PART ONE: PHYSICS OF RFID; Chapter 1. Introduction; 1.1. Bibliography; Chapter 2. Characteristics of RFID Radio Signals; 2.1. Description and operating principle of RFID systems; 2.1.1. Classification of RFID systems; 2.1.2. Available operating frequency ranges; 2.1.3. Transponder types; 2.1.4. Energy and data transmission modes; 2.1.5. Features of RFID chips; 2.2. Transmission channel; 2.2.1. Maxwell's equations; 2.2.2. Electromagnetic field generated by an electric dipole. 
505 8 |a 2.2.3. Electromagnetic field generated by a magnetic dipole2.2.4. Field zones surrounding antennae; 2.2.5. Wave impedance; 2.2.6. Antenna impedance; 2.2.7. Radiated power; 2.2.8. Near-field coupling; 2.3. First level electric model in inductive coupling; 2.3.1. Magnetic loop; 2.3.2. Base station antenna; 2.3.3. RFID chip antenna; 2.3.4. Design issue of RFID antennae in inductive coupling; 2.3.5. Far field coupling; 2.4. Bibliography; Chapter 3. RFID Communication Modes; 3.1. Communication modes; 3.1.1. Waveforms and usual communication codes of RFID systems; 3.1.2. Data coding. 
505 8 |a 3.1.3. Modulation3.1.4. Integrity of transmissions in RFID systems; 3.1.5. Anti-collision protocol; 3.2. Bibliography; PART TWO: RFID APPLICATIONS; Chapter 4. Applications; 4.1. Introduction; 4.2. History: evolution from barcodes to RFID tags; 4.2.1. Description of barcodes; 4.2.2. One-dimensional (or linear) barcodes; 4.2.3. Stacked linear barcodes; 4.2.4. Two-dimensional barcodes; 4.3. RFID tags; 4.3.1. Characteristics of RFID tags; 4.3.2. Operating principle; 4.4. Normalization/standardization; 4.4.1. ISO standards for RFID; 4.4.2. ISO standards for middleware; 4.4.3. User guidance. 
505 8 |a 4.4.4. Protocols4.4.5. EPCglobal standards; 4.4.6. Communication layer; 4.4.7. Different types of tags; 4.5. Advantages/disadvantages of RFID tags; 4.5.1. Advantages; 4.5.2. Disadvantages; 4.6. Description of RFID applications; 4.7. Application examples; 4.7.1. RFIDs in commerce; 4.7.2. Access control; 4.7.3. Culture and RFID; 4.7.4. Payment; 4.7.5. RFID and health; 4.7.6. European biometric passport; 4.7.7. Future perspectives; 4.8. Conclusion; 4.9. Bibliography; PART THREE: CRYPTOGRAPHY OF RFID; Chapter 5. Cryptography and RFID; 5.1. Introduction. 
505 8 |a 5.2. Identification protocols and security models5.2.1. Definition of an identification protocol; 5.2.2. Classical notions of security; 5.2.3. Privacy notions; 5.3. Identification protocols; 5.3.1. Symmetric cryptography-based protocols; 5.3.2. Asymmetric cryptography-based protocols; 5.3.3. Protocols based on physical properties; 5.3.4. Summary; 5.4. Conclusion. Physical attacks on RFID devices; 5.4.1. Side-channel attacks; 5.4.2. Fault injection attacks; 5.4.3. KeeLoq; 5.5. Bibliography; PART FOUR: EPCGLOBAL; Chapter 6. EPCglobal Network; 6.1. Introduction; 6.2. Tags; 6.2.1. EPC codes. 
500 |a 6.2.2. Classes of tags. 
520 |a RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves. An RFID tag contains an antenna and a microchip that allows it to transmit and receive. This technology is a possible alternative to the use of barcodes, which are frequently inadequate in the face of rapid growth in the scale and complexity of just-in-time inventory requirements, regional and international trade, and emerging new methods of trade based on it. Use of RFID tags will likely eventually become as w. 
504 |a Includes bibliographical references and index. 
650 0 |a Radio frequency identification systems. 
650 0 |a Embedded Internet devices. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Telecommunications.  |2 bisacsh 
650 7 |a Embedded Internet devices.  |2 fast  |0 (OCoLC)fst01742162 
650 7 |a Radio frequency identification systems.  |2 fast  |0 (OCoLC)fst01087324 
655 4 |a Electronic books. 
700 1 |a Chabanne, Hervé. 
700 1 |a Urien, Pascal. 
700 1 |a Susini, Jean-Ferdinand. 
776 0 8 |i Print version:  |a Chabanne, Harvé.  |t RFID and the Internet of Things.  |d London : Wiley, ©2013  |z 9781848212985 
830 0 |a ISTE. 
856 4 0 |u https://doi.org/10.1002/9781118614297  |z Full Text via HEAL-Link 
994 |a 92  |b DG1