To Learn More:


RFID Field Guide, M. Bhuptani and S. Moradpour, Sun Microsystems Press 2005
The RF in RFID, D. Dobkin, Elsevier 2007
RFID Handbook, K. Finkenzeller, Wiley 2003
RFID Applications, Privacy, and Security, ed. S. Garfinkel and B. Rosenberg, Addison-Wesley 2006
RFID Essentials, B. Glover and H. Bhatt, O'Reilly 2006
RFID Toys, A. Graafstra, Wiley 2006
RFID Sourcebook, S. Lahiri, IBM Press 2006
RFID Security, F. Thornton, F. Haines, A. Das, H. Bhargava, A. Campbell and J. Kleinschmidt, Syngress 2006

Web resources:

Automated Identification and RFID:
AIM Global,
RFID Journal,
RFID Switchboard,
Industry Wizards,
RFID Soup (glossary),
RFID Tribe,

Standards organizations:

Regulatory web sites:
Japan Ministry of Posts and Telecommunications,
Japan Association of Radio Industries and Businesses (ARIB),
National Radio Spectrum Management Center, People's Republic of China, (in Chinese)

Publications of interest:


  • “The History of RFID”, Jeremy Landt, IEEE Potentials Magazine Oct/Nov 2005 p. 5
  • “The toll highway faces automation”, William F. Arnold, Electronics, November 8, 1973 p. 74
  • “Electronic Road Pricing in Singapore:  A Technical Overview”, B. Benight and Phang Chong Sun [Philips Singapore], 1996 IES-CTR Symposium on Advanced Technologies in Transportation; Friday, 19 April 1996, Hotel Equatorial
  • “UnManned Library:  An Intelligent robotic books retrieval and return system utilizing RFId tags”, K. Yuan, A. Hong, M. Ang and G. Peng [Nat’l University of Singapore], IEEE Conference on Systems Man and Cybernetics 2002
  • “Coming Soon to a Wal-Mart near You”, R. Bansai, Ant Prop Mag vol. 45 #6, p. 106,Dec 2003
  • "The pros and cons of RFID in supply chain management", K. Michael, and L. McCathie, International Conference on Mobile Business (ICMB), 2005, p. 623
  • "Using RFID tags for tracking patients, charts and medical equipment within an integrated health delivery network", R. Sangwan, R. Qiu, and D. Jessen,   Proceedings. 2005 IEEE Networking, Sensing and Control, 2005, p. 1070
  • “Mapping and Localization with RFID Technology”, D. Hahnel, W. Burgard, D. Fox, K. Fishkin, and M. Philipose, Proc 2004 IEEE Int’l Conf on Robotics and Automation, New Orleans, LA, April 2004, p. 1015


  • “Short-range Radio-telemetry for Electronic Identification using Modulated RF Backscatter”, A. Koelle, S. Depp and R. Freyman, Proc IEEE August 1975 p. 1260
  • “An Ultra Small RFID Chip: m-chip”, M. Usami [Hitachi], 2004 IEEE Radio Frequency Integrated Circuits Symposium paper MO3D-5, page 241
  • "Design criteria for the RF section of UHF and microwave passive RFID transponders", G. De Vita, and G. Iannaccone,  IEEE Transactions on Microwave Theory and Techniques, Volume 53,   Issue 9,   Sept. 2005,  p. 2978
  • “Fully Integrated Passive UHF RFID Transponder IC with 16.7 mW Minimum RF Input Power”, U. Karthaus and M. Fischer, IEEE J. Solid-State Circuits, 38 #10 p. 1602 (2003)
  • “Progress Toward Development of All-Printed RFID Tags:  Materials, Processes, and Devices”
  • V. Subramanian, J. Frechet, P. Chang, D. Huang, J. Lee, S. Molesa, A. Murphy, D. Redinger, and S. Volkman, Proc IEEE v 93 #7 p. 1330 (2005)
  • "Antenna design for UHF RFID tags: a review and a practical application", K. Rao, P., Nikitin, and S. Lam,  IEEE Transactions on Antennas and Propagation, Volume 53,   Issue 12,   Dec. 2005,  p. 3870 
  • "The Web of augmented physical objects", T. Nicolai, F. Resatsch, and D. Michelis, International Conference on Mobile Business( ICMB), 2005. ICMB 2005, p.  340 
  • “Design considerations for embedded software-defined RFID readers”, Matthew Reynolds and Christopher Weigand, RF Design August 2005 p. 14

Security and Privacy

  • "RFID privacy: an overview of problems and proposed solutions", S. Garfinkel, A., Juels,  and R. Pappu, 
  • IEEE Security & Privacy Magazine,  Volume 3,   Issue 3,    May-June 2005,  p. 34.
  • "Vulnerabilities in First-Generation RFID-Enabled Credit Cards", T. Heydt-Benjamin, D. Bailey, K. Fu, A. Juels and T. O'Hare,
  • "A feasible security mechanism for low cost RFID tags", Gwo-Ching Chang, International Conference on Mobile Business (ICMB), 2005
  • "A scalable and provably secure hash-based RFID protocol", G. Avoine and P. Oechslin, Third IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom), 2005.
  • "A Random ID Update Scheme to Protect Location Privacy in RFID-Based Student Administration Systems", Ma Jianhua, A. Nakamura, and Huang Runhe, Proceedings. Sixteenth International Workshop on Database and Expert Systems Applications, 2005, p. 67
  • "A Lightweight Mutual Authentication Protocol for RFID Networks, Luo Zongwei Luo, T., Chan, J. Li, IEEE International Conference on e-Business Engineering (ICEBE), 2005. ICEBE 2005, p. 620