The author’s group has developed various chipless RFID tags and reader architectures
at 2.45, 4–8, 24, and 60 GHz. These results were published extensively in the form of
books, book chapters, refereed conference and journal articles, and finally, as patent
applications. However, there is still room for improvement of chipless RFID sys-
tems. In this book, we proposed advanced techniques of chipless RFID systems that
supersede their predecessors in signal processing, tag design, and reader architecture.
RFID is at a critical price point that could enable its large-scale adoption.
What strengths are pushing it forward? What technical challenges and
privacy concerns must we still address?
Identification is pervasive nowadays in daily life due to many complicated activities such as
bank and library card reading, asset tracking, toll collecting, restricted access to sensitive data
and procedures and target identification. This kind of task can be realized by passwords, bio-
metric data such as fingerprints, barcode, optical character recognition, smart cards and radar.
Radiofrequencyidentification(RFID)isatechniquetoidentifyobjectsbyusingradiosystems.
It is a contactless, usually short distance, wireless data transmission and reception technique
for identification of objects. An RFID system consists of two components: the tag (also called
transponder) and the reader (also called interrogator).
Radio frequency identifi cation (RFID) is a modern wireless data transmission and
reception technique for applications including automatic identifi cation, asset track-
ing and security surveillance. As barcodes and other means of identifi cation and
asset tracking are inadequate for recent demands, RFID technology has attracted
interest for applications such as logistics, supply chain management, asset tracking
and security access control.
The rapid growth of RFID use in various supply chain operations, which has
arisen from the development of Electronic Product Code (EPC) technology,
has created a need for the consideration of security issues in the adoption of that
technology.
Radio frequency identification (RFID) technology is witnessing a recent explosion of
development in both industry and academia. A number of applications include supply
chain management, electronic payments, RFID passports, environmental monitoring
and control, office access control, intelligent labels, target detection and tracking, port
management, food production control, animal identification, and so on. RFID is also
an indispensable foundation to realize the pervasive computing paradigm—“Internet of
things.” It is strongly believed that many more scenarios will be identified when the
principles of RFID are thoroughly understood, cheap components available, and when
RFID security is guaranteed.
It was the publisher’s idea that I write
RFID in the Supply Chain: A Guide
to Selection and Implementation
. Not only am I editor of
Enterprise Inte-
gration System
,
Second Edition Handbook
and author of
The
Complete Book
of Middleware
, I also had some innovative business process and project
management ideas on improving the effectiveness of integrating enterprise
systems with information on product traceability, the scope of which has
been widened by the RFID technology mandates.
adio Frequency Identification (RFID) is a rapidly developing automatic wireless data-collection
technology with a long history.The first multi-bit functional passive RFID systems,with a range of
several meters, appeared in the early 1970s, and continued to evolve through the 1980s. Recently,
RFID has experienced a tremendous growth,due to developments in integrated circuits and radios,
and due to increased interest from the retail industrial and government.