Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world’s largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it poses.

The RFID Handbook provides an overview of RFID technology, its associated security and privacy risks, and recommended practices that will enable organizations to realize productivity improvements while also protecting sensitive information and the privacy of individuals.

Expert contributors present a host of applications including RFID enabled automated receiving, triage with RFID for massive incidents, RFID and NFC in relation to mobile phones, and RFID technologies for communication robots and a privacy preserving video surveillance system. The unprecedented coverage also includes detailed descriptions of adaptive splitting protocols as well as tree-based and probabilistic anti-collision protocols.                                                                                                                       

Drawing on its distinguished editors and world-renowned contributors, this one-of-a-kind handbook serves as the ultimate reference on RFID, from basic research concepts to future applications.

part I|2 pages


chapter 1|14 pages

Physics and Geometry of RFID

ByMarlin H. Mickle, Leonid Mats, Peter J. Hawrylak

chapter 2|18 pages

EPCglobal Network

ByAlfio R. Grasso

chapter 3|29 pages

Design Automation for RFID Tags and Systems

BySwapna Dontharaju, Shenchih Tung, Raymond R. Hoare, James T. Cain, Marlin H. Mickle, Alex K. Jones

chapter 4|28 pages

Far-Field Tag Antenna Design Methodology

ByDamith C. Ranasinghe, Peter H. Cole

chapter 5|16 pages

Contemporary RFID Reader Architecture

ByBehnam Jamali, Peter H. Cole

chapter 6|14 pages

Progress in RFID Education

ByBrian J. Garner

part II|2 pages


chapter 7|14 pages

RFID Reader Synchronization

ByKin Seong Leong, Mun Leng Ng, Alfio R. Grasso, Peter H. Cole

chapter 8|21 pages

Adaptive Tag Anticollision Protocols for RFID Passive Tags

ByJihoon Myung, Wonjun Lee, Timothy K. Shih

chapter 9|20 pages

Comparative Performance Analysis of Anticollision Protocols in RFID Networks

ByWonjun Lee, Jihoon Choi, Donghwan Lee

chapter 10|18 pages

Maximizing Read Accuracy by Optimally Locating RFID Interrogators

ByLin Wang, Bryan A. Norman, Jayant Rajgopal

chapter 11|31 pages

Minimum Energy/Power Considerations

ByAlex K. Jones, Gerold Joseph Dhanabalan, Swapna Dontharaju, Shenchih Tung, Peter J. Hawrylak, Leonid Mats, Marlin H. Mickle, James T. Cain

chapter 12|17 pages

Electromagnetic Coupling in RFID

ByPeter H. Cole, Damith C. Ranasinghe

chapter 13|11 pages

RFID Tags for Metallic Object Identification

ByMun Leng Ng, Kin Seong Leong, Peter H. Peter H.

chapter 14|16 pages

WISP: A Passively Powered UHF RFID Tag with Sensing and Computation

ByDaniel J. Yeager, Alanson P. Sample, Joshua R. Smith

part III|1 pages


chapter 15|15 pages

From Automatic Identification and Data Capture to “Smart Business Process”: Preparing for a Pilot Integrating RFID

BySamuel Fosso Wamba, Élisabeth Lefebvre, Ygal Bendavid, Louis-A. Lefebvre

chapter 16|16 pages

Technological Requirements and Derived Benefits from RFID Enabled Receiving in a Supply Chain

ByHarold Boeck, Louis-A. Lefebvre, Élisabeth Lefebvre

chapter 17|18 pages

A Prototype on RFID and Sensor Networks for Elder Health Care

ByMelody Moh, Loc Ho, Zachary Walker, Teng-Sheng Moh

chapter 18|21 pages

Triage with RFID Tags for Massive Incidents

BySozo Inoue, Akihito Sonoda, Hiroto Yasuura

chapter 19|17 pages

RFID Tagging and the Design of “Place”

ByAnijo Punnen Mathew

chapter 20|6 pages

Photosensing Wireless Tags for Precise Location and Geometry Queries

ByRamesh Raskar, Paul Beardsley, Paul Dietz, Jeroen van Baar

chapter 21|16 pages

RFID and NFC on Mobile Phones

ByPaul Coulton, Omer Rashid, Reuben Edwards

chapter 22|26 pages

Applying RFID Techniques for the Next-Generation Automotive Services

ByPeter Harliman, Joon Goo Lee, Kyong Jin Jo, Seon Wook Kim

chapter 23|18 pages

Application of RFID Technologies for Communication Robots

ByMasahiro Shiomi, Takayuki Kanda, Hiroshi Ishiguro, Norihiro Hagita

chapter 24|19 pages

Browsing the World with RFID Tags: Design and Implementation of an RFID-Based Distributed Environmental Memory

ByAlberto Rosi, Marco Mamei, Franco Zambonelli

chapter 25|12 pages

RFID-Enabled Privacy-Preserving Video Surveillance: A Case Study

ByJehan Wickramasuriya, Sharad Mehrotra, Nalini Venkatasubramanian

part IV|1 pages

Security and Privacy

chapter 26|16 pages

Is RFID Technology Secure and Private?

BySurinder Mohan Bhaskar

chapter 27|13 pages

Privacy and Personal Information Protection in RFID Systems

ByYasunobu Nohara, Kensuke Baba, Sozo Inoue, Hiroto Yasuura

chapter 28|23 pages

Multilateral Approaches for Reliable Mobile RFID Service Systems

ByNamje Park, Dongho Won

chapter 29|10 pages

ONS Security

ByBenjamin Fabian, Oliver Günther, Sarah Spiekermann

chapter 30|39 pages

Practical Steps for Securing RFID Systems

ByA. Karygiannis, Bernie Eydt, Ted S. Phillips

chapter 31|15 pages

Lightweight Cryptography for Low Cost RFID: A New Direction in Cryptography

ByDamith C. Ranasinghe, Raja Ghosal, Alfio Grasso, Peter H. Cole

chapter 32|14 pages

Low Overhead RFID Security*

ByShlomi Dolev, Marina Kopeetsky, Thomas Clouser, Mikhail Nesterenko

chapter 33|27 pages

Layers of Security for Active RFID Tags

ByShenchih Tung, Swapna Dontharaju, Leonid Mats, Peter J. Hawrylak, James T. Cain, Marlin H. Mickle, Alex K. Jones

chapter 34|12 pages

Cryptographic Approaches to RFID Security and Privacy

ByKoutarou Suzuki, Miyako Ohkubo, Shingo Kinoshita

chapter 35|14 pages

RFID Authentication: Reconciling Anonymity and Availability

ByBreno de Medeiros, Mike Burmester

chapter 36|18 pages

Security and Privacy of RFID for Biomedical Applications: A Survey

ByEllen Stuart, Melody Moh, Teng-Sheng Moh