Basics of Radio Frequency Identification (RFID) Systems

  • Faranak Nekoogar
  • Farid Dowla


With the recent advances in wireless communications, Radio frequency Identification (RFID) technology is becoming more of a reality in terms of their widespread use in various applications. Although RFID provides a general capability for tagging and tracking of objects, and has been in use for decades, no RFID system fits all applications. Therefore, it’s important to start this introductory chapter with an overview of the technology in general terms and continue in the later chapters with more detailed discussions on various techniques that can make RFIDs more adaptable to some specialized applications that face challenges with conventional RFID techniques.


Ultra High Frequency Read Range Reader Antenna Ultra High Frequency Band Write Once Read Many 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    “NSF Researchers Improve Barcode Scanners; Advances Lead to Widespread Use of the Technology”,
  2. 2.
  3. 3.
    Stockman, H., “Communication by Means of Reflected Power”, Proceedings of the IRE, Volume: 36, Issue: 10, pp 1196–1204, Oct. 1948.CrossRefGoogle Scholar
  4. 4.
    M. Cardullo. n.d. [online]. Genesis of the Versatile RFID Tag. Available: 11, 2006 [date accessed].
  5. 5.
    “Transponder Apparatus and System”, US patent US3713148 A, Mario Cardullo, Communications Services Corp, 1973.Google Scholar
  6. 6.
    “Electronic Recognition and Identification System”, US Patent US3816708 A, Charles Walton, Proximity Devices, 1973.Google Scholar
  7. 7.
    Koelle, A.R. Depp, S.W. Freyman, R.W., “Short-range radio-telemetry for electronic identification, using modulated RF backscatter”, Proceedings of the IEEE, Aug. 1975, Volume: 63, Issue: 8, PP: 1260–1261.CrossRefGoogle Scholar
  8. 8.
    “Interrogation, and detection system”, US Patent US4075632 A, Koelle, A.R. Depp, S.W. Freyman, R.W.,Los Alamos National Laboratory, 1976.Google Scholar
  9. 9.
    Klaus Finkenzeller, “RFID Handbook”, John Wiley & Son Ltd., 1999.Google Scholar
  10. 10.
    Y. Fei, G. Jin, R. Wu, “Research on Data Processing in RFID Middleware Based on Event Driven”, 2008 IEEE International Conference on e-Business Engineering.Google Scholar
  11. 11.
  12. 12.
    RFID Essentials By Bill Glover, Himanshu Bhatt.Google Scholar
  13. 13.


  1. Hauslen, R. A.; “The promise of automatic vehicle identification”; IEEE Trans. On Vehicular Technology, Vol VT-26, No 1, Feb 1977, pp. 30–38.CrossRefGoogle Scholar
  2. Baldwin, H., Depp, S., Koelle, A. and Freyman, R.; “Interrogation and detection system”, US Patent 4,075,632, Feb 21, 1978.Google Scholar
  3. Dinade, “A new interrogation, navigation and detection system”, Microwave Journal, May 1967, pp 70–78. Foote, R. S.; “Prospects for Non-stop Toll Collection using Automatic Vehicle Identification”; Traffic Quarterly, Vol 35, No 3, July 1981, pp. 445–460. Foote, R. S.; “Automatic Bus Identification”, NTIS DOT-FH-11-7778 TS-7930-ABI.Google Scholar
  4. Harris, D. B.; “Radio transmission systems with modulatable passive responder”, US Patent 2,927,321, March 1, 1960.Google Scholar
  5. Henoch, B. and Berglind, E.; “Apparatus for synchronized reception in connection with system for recording objects”, US Patent 4,333,078, June 1, 1982.Google Scholar
  6. A guide to understanding RFID [Online].
  7. Weinstein, R. RFID: A technical overview and its application to the enterprise. IT Professional 2005; 5: 27–33.CrossRefGoogle Scholar
  8. Wu, N.C., Nystrom, M.A., Lin, T.R., Yu, H.C. Challenges to Global RFID Adoption. Proc PICMET, 2006, 618–623.Google Scholar
  9. Foster, K.R., Jaeger, J. RFID Inside. IEEE Spectrum 2007; 3: 24–29.CrossRefGoogle Scholar
  10. Klaus Finkenzeller, RFID Handbook – Fundamentals and Applications in Contactless Smart Cards and Identification. Kluwer Academic Publishers, 2003.Google Scholar
  11. D. Paret, RFID and Contactless Smart Card Applications. John Wiles & Sons, 2005.Google Scholar
  12. International Standards Organization, “ISO/IEC FDIS 18000–7:2004(E).” Standard Specification, 2004.Google Scholar
  13. American National Standards Institute, “ANSI NCITS 236:2001.” Standard Specification, 2002.Google Scholar
  14. S. C. A. I. Council, “RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards,” Tech. Rep., Smart Card Alliance, Jan. 2007.Google Scholar
  15. M.C. O’Connor, “Homeland Security to Test RFID.” RFID Journal, 2005.
  16. E. Chabrow, “Homeland Security To Test RFID Tags At U.S. Borders.”, 2005.
  17. S. E. Sarma, “Towards the Five-Cent Tag,” Tech. Rep. MIT-AUTOID-WH-006, Massachusetts Intitute of Technology, 2001.Google Scholar
  18. R. Roman, C. Alcaraz, and J. Lopez, “A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes,” Mob. Netw. Appl., Vol. 12, No. 4, pp. 231–244, 2007.CrossRefGoogle Scholar
  19. H. Cho and Y. Baek, “Design and Implementation of an Active RFID System Platform,” SAINT-W’06: Proceedings of the International Symposium on Applications on Internet Workshops, (Washington, DC, USA), pp. 80–83, IEEE Computer Society, 2006.Google Scholar
  20. H.-J. Chae, D.J. Yeager, J. R. Smith, and K. Fu, “Maximalist cryptography and computation on the WISP UHF RFID tag,” In Proceedings of the Conference on RFID Security, July 2007.Google Scholar
  21. M. Feldhofer, S. Mominikus, and J. Wolkerstorfer, “Strong Authentication for RFID Systems using the AES algorithm,” Proc. Of CHES 2004, Vol. 3156 of Lecture Notes on Computer Science, pp. 357–370, 2004.Google Scholar
  22. G. D.Bhanage, Y. Zhang, Y. Zhang, W. Trappe, and R. E. Howard, “RollCall : The Design For A Low-Cost And Power Efficient Active RFID Asset Tracking System,” EUROCON, 2007. The International Conference on “Computer as a Tool”, pp. 2521–2528, Sept. 2007.Google Scholar
  23. G. Mazurek, “Collision-Resistant Transmission Scheme for Active RFID Systems,” EUROCON, 2007. The International Conference on “Computer as a Tool”, pp. 2517–2520, Sept 2007.Google Scholar
  24. B. Zhen, M. Kobayashi, and M. Shimizu, “To read transmitter-only RFID tags with confidence,” Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE International Symposium on, pp. 396–400, Sept 2004.Google Scholar
  25. R. Das and P. Harrop, “RFID Forecasts, Players & Opportunities 2008–2018,” Tech. Rep.,, 2008.Google Scholar
  26. M. R. Rieback, B. Crispo, and A. S. Tanenbaum, “The evolution of RFID security,” Pervasive Computing, IEEE, Vol. 5, No. 1, pp. 62–69, 2006.CrossRefGoogle Scholar
  27. D. Boys, “Identification Friend or Foe IFF Systems: IFF Questions & Answers,” 2005.
  28. B. Manish and M. Shahram, RFID Field Guide: Deploying Radio Frequency Identification Systems. Prentice Hall, 2005.Google Scholar
  29. G. Veeder-Root, “RFID Cashless/Wireless Payment.”
  30. T. A. F., “Machine Readable Travel Documents,” Tech. Rep. 1.1, International Civil Aviation Organization, 2004. PKI for Machine Readable Travel Documents offering ICC Read-Only Access.Google Scholar
  31. International Standards Organization, “ISO/IEC FDIS 18000–6:2004/Amd 1:2006(E).” Standard Specification, 2006.Google Scholar
  32. EPCglobal, Inc., EPC Radio-Frequency Identity Protocols: Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–960 MHz, version 1.0.9 ed., January 2005.Google Scholar
  33. International Standards Organization, “ISO/IEC FDIS 14443, Proximity cards (PICCs).” Standard Specification, 2000.Google Scholar
  34. L. Sullivan, “DOD Seeks New Active-Tag Suppliers.” RFID Journal, 2006.
  35. Hoover, D. R.; “Passive sensing and encoding transponder”, US Patent 4,343,252, August 17, 1982. Kamata, S., Kimura, Y. and Sakuragi, J.; “Foreground subject-identifying apparatus”, US Patent 4,069,472, Jan 17, 1978.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.Lawrence Livermore National LaboratoryLivermoreUSA

Personalised recommendations