Book title: RFID Protocol Design, Optimization, and Security for the Internet of Things
Author: Alex X. Liu, Muhammad Shahzad, Xiulong Liu and Keqiu Li
Product Code: PBCE1120
Stock Status: Pre-order
arrival date is
Your account will only be charged when we ship your item.
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promises a huge growth in RFID technology and usage.
This book covers the topic of RFID protocol design and optimization. RFID systems allow for a much easier and error free inventory management and tracking. But the probabilistic nature of RFID protocols makes the design and optimization complex and challenging. Most existing commercial RFID systems are not well designed. In this book, the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.
Alex X. Liu is a Professor of Michigan State University, Department of Computer Science and Engineering, East Lansing, Michigan, USA.
Muhammad Shahzad is an Assistant Professor of North Carolina State University, Department of Computer Science, Raleigh, North Carolina, USA.
Xiulong Liu is a Postdoctoral Fellow at The Hong Kong Polytechnic University, Department of Computing, Hong Kong, China.
Keqiu Li is a Professor and the Dean of the School of Computer Software at Tianjin University, Tianjin, China.
Written for RFID and IoT practitioners, system developers, engineers and researchers in sensing, control, electronics, communications, computing, packaging, supply chain management, automotive, access control and security. Also suitable for professors, and students in the fields of sensing, control, electronics, communications, computing, packaging, supply chain management, automotive, access control and security.
This information is provisional and will be updated prior to publication
Chapter 1: RFID Identification – Design and Optimization
Chapter 2: RFID Identification - Fairness
Chapter 3: RFID Estimation – Design and Optimization
Chapter 4: RFID Estimation – Impact of Blocker Tags
Chapter 5: RFID Detection – Missing Tags
Chapter 6: RFID Detection – Unknown Tags
Chapter 7: RFID Queries – Single Category
Chapter 8: RFID Queries – Multiple Category
Chapter 9: RFID Privacy and Authentication Protocols