|
|
|||
|
||||
OverviewRadio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promises a huge growth in RFID technology and usage. This book covers the topic of RFID protocol design, optimization, and security. RFID systems allow for a much easier and error free inventory management and tracking, but the probabilistic nature of RFID protocols makes the design and optimization complex and challenging. Most existing commercial RFID systems are not well designed. In this book, the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them. Full Product DetailsAuthor: Alex X. Liu (Professor, Michigan State University, Department of Computer Science and Engineering, USA) , Muhammad Shahzad (Assistant Professor, North Carolina State University, Department of Computer Science, USA) , Xiulong Liu (Postdoctoral Fellow, The Hong Kong Polytechnic University, Department of Computing, Hong Kong, China) , Keqiu Li (Professor, Tianjin University, School of Computer Software, China)Publisher: Institution of Engineering and Technology Imprint: Institution of Engineering and Technology ISBN: 9781785613326ISBN 10: 1785613324 Pages: 272 Publication Date: 20 November 2017 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsChapter 1: RFID identification - design and optimization Chapter 2: RFID identification - fairness Chapter 3: RFID estimation - design and optimization Chapter 4: RFID estimation - impact of blocker tags Chapter 5: RFID detection - missing tags Chapter 6: RFID detection - unknown tags Chapter 7: RFID queries - single category Chapter 8: RFID queries - multiple category Chapter 9: RFID privacy and authentication protocolsReviewsAuthor InformationAlex X. Liu is a Professor of Michigan State University, Department of Computer Science and Engineering, East Lansing, Michigan, USA. Muhammad Shahzad is an Assistant Professor of North Carolina State University, Department of Computer Science, Raleigh, North Carolina, USA. Xiulong Liu is a Postdoctoral Fellow at The Hong Kong Polytechnic University, Department of Computing, Hong Kong, China. Keqiu Li is a Professor and the Dean of the School of Computer Software at Tianjin University, Tianjin, China. Tab Content 6Author Website:Countries AvailableAll regions |