Skip to main content Accessibility help
×
Hostname: page-component-745bb68f8f-f46jp Total loading time: 0 Render date: 2025-01-10T06:47:29.923Z Has data issue: false hasContentIssue false

4 - An Overview of the ISO 18000-63 Standard

Published online by Cambridge University Press:  02 January 2025

Alírio Soares Boaventura
Affiliation:
University of Aveiro, Portugal
Nuno Borges Carvalho
Affiliation:
University of Aveiro, Portugal
Get access

Summary

Chapter 4 presents a review of the ISO 18000-63 protocol, including data encoding and modulation, and aspects of the transponder memory structure, security, and privacy, and presents real examples of reader–transponder transactions.

Type
Chapter
Information
Radio Frequency Identification Engineering
How to Engineer an RFID Reader
, pp. 77 - 92
Publisher: Cambridge University Press
Print publication year: 2025

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

ISO/IEC “18000-63:2013 Information Technology – Radio Frequency Identification for Item Management – Part 63: Parameters for Air Interface Communications at 860 MHz to 960 MHz Type C,” 2013.Google Scholar
EPCglobal Inc. “EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID Specification for RFID Air Interface Protocol for Communications at 860 MHz–960 MHz (version 2.0.0 ratified),” 2013.Google Scholar
ETSI “EN 302 208 V3.2.0, Radio Frequency Identification Equipment Operating in the Band 865 MHz to 868 MHz with Power Levels up to 2 W and in the Band 915 MHz to 921 MHz with Power Levels up to 4 W; Harmonised Standard for Access to Radio Spectrum,” 2018.Google Scholar
FCC “Title 47, Part 15, Operation within the Bands 902–928 MHz, 2435–2465 MHz, 5785–5815 MHz, 10500–10550 MHz, and 24075–24175 MHz,” 2024.Google Scholar
Wang, J., et al., “System Design Considerations of Highly-Integrated UHF RFID Reader Transceiver RF Front-End,” in Ninth International Conference on Solid-State and Integrated-Circuit Technology, 2008, pp. 1560–1563.CrossRefGoogle Scholar
Engels, D.W. et al., “On Security with the New Gen2 RFID Security Framework,” in Proceedings of the IEEE International Conference on RFID, 2013.CrossRefGoogle Scholar
Chien, H.-Y., “Efficient Authentication Scheme with Tag-Identity Protection for EPC Class 2 Generation 2 Version 2 Standards,” International Journal of Distributed Sensor Networks, 13(3), 2017.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×