• 1. Preface
  • 2. Foreword
  • 3. Summary
  • 4. Introduction
  • 4.1. RFID as a key technology of pervasive computing
  • 4.2. The goals, methodological approach and structure of the study
  • 5. Basics of RFID technology
  • 5.1. Features and versions of RFID systems
  • 5.2. Features for distinguishing RFID systems
  • 6. Classification of RFID systems
  • 6.1. General
  • 6.2. Classification of RFID systems according to their performance
  • 6.3. Classification of RFID systemsaccording to their range
  • 6.4. The classification of the Auto-ID Center
  • 7. Threat situation and inventory of common security measures
  • 7.1. Overview
  • 7.2. Basic types of attack
  • 7.3. Types of attack according to their purpose
  • 7.4. Digression: Attack on the backend
  • 7.5. Threat to the active party
  • 7.6. Threat situation for the passive party
  • 7.7. Security precautions
  • 7.8. Evaluation of the threat situation and discussion ofthe security measures
  • 7.9. Availability of the security measures
  • 8. Areas of RFID Application
  • 8.1. Overview of application areas
  • 8.2. Identification of objects
  • 8.3. Document authentication
  • 8.4. Maintenance and repair, recall campaigns
  • 8.5. Access and route control
  • 8.6. Theft protection and stop-loss strategies
  • 8.7. Environmental monitoring and sensor technology
  • 8.8. Supply chain management: automation, controland process control and optimization
  • 9. Factors facilitating or inhibiting the use of RFID
  • 10. Development perspectives of RFID technology
  • 10.1. Making the risks visible in the form of fictive cases
  • 10.2. Expected developments by 2010
  • 11. Abbreviations
  • 12. Index page
  • 13. Bibliography