Preface ixChapter 1 Introduction to Chipless Radio Frequency Identification 11.1 Introduction 11.2 Chipless radio frequency identification 11.3 Recent developments and advancements 41.4 Authentication 141.5 Conclusion 15Chapter 2 Literature Review 172.1 Introduction 172.2 State of the art 182.2.1 Basic level of security (overt or visible features) 202.2.2 Medium level of security (covert or hidden markers) 222.2.3 High level of security (forensic techniques) 232.2.4 Conventional RFID approaches 242.2.5 Classical chipless approaches 272.2.6 Natural randomness 282.3 Conclusion 30Chapter 3 Methodology and Proof of Concept 313.1 Introduction 313.2 Randomness inherent in the realization process 323.3 Authentication procedure 343.4 Statistical analysis 373.5 Chipless tag discrimination using PCB tags 393.5.1 Chipless tag design and purposely applied dimensional variations 403.5.2 Chipless tag discrimination results and performance of the resemblance metrics 443.6 Chipless tag discrimination using inkjet-printed paper tags 473.6.1 Chipless tag design and purposely applied dimensional variations 473.6.2 Chipless tag discrimination results and performance of the resemblance metrics 483.7 Conclusion 51Chapter 4 Extraction of Chipless Tag Key Parameters from Backscattered Signals 534.1 Introduction 534.2 Chipless RFID tags and measurement setup 574.3 Extraction of aspect-independent parameters of a second-order scatterer 614.3.1 Extraction with the matrix pencil method 644.3.2 Extraction with the spectrogram method 674.4 Extraction of CNRs of the multi-scatterer-based tags 734.5 Comparison of computational time durations between the matrix pencil method and the spectrogram method 824.6 Conclusion 83Chapter 5 Chipless Authentication Using PCB Tags 855.1 Introduction 855.2 Design and the optimization of chipless tags to be employed for authentication 865.2.1 C-folded uni-scatterer tags (classical design) 875.2.2 C-folded quad-scatterer tags (optimized design) 945.3 Detection of minimum dimensional variation in outdoor realistic environment and authentication results 1005.4 Detection of natural randomness and authentication results 1065.4.1 Authentication within each realization 1085.4.2 Authentication across different realizations 1115.4.3 Characterization of the natural randomness 1125.4.4 Generalization of the proposed method 1175.4.5 Final remarks on the constraints 1185.5 Conclusion 119Chapter 6 Chipless Authentication Using Inkjet-Printed PET Tags 1216.1 Introduction 1216.2 Optimization of chipless tags to exploit natural randomness inherent in inkjet printing 1226.3 Authentication using VNA-based chipless reader 1296.4 Authentication using IR-UWB chipless reader 1366.5 Conclusion 142Conclusion 145Appendices 149Appendix A 151Appendix B 153Appendix C 155References 157Index 173
Zeshan Ali is a postdoctoral researcher with the Grenoble INP, part of Université Grenoble Alpes, in France. He specializes in the design of RF/microwave circuits for chipless RFID tags and systems, radar signal processing, multi-band filters, reconfigurable filters and optimization methods.Etienne Perret is an Associate Professor with the Grenoble INP, part of Université Grenoble Alpes. He is interested in electromagnetic modeling of passive devices for millimeter and submillimeter-wave applications, wireless communication systems including RFID and chipless RFID technologies, non-volatile nano-ionic RF switches, and advanced computer-aided design techniques based on the development of automated co-design synthesis computational approaches. He has contributed to numerous pioneering works in the field of chipless RFID.Nicolas Barbot is Associate Professor with the Grenoble INP, part of Université Grenoble Alpes. His research interests include backscattering communications, RFID, chipless RFID and antenna theory, especially the use of chipless tags as low-cost, battery-free and robust sensors.Romain Siragusa is Associate Professor with the Grenoble INP, part of Université Grenoble Alpes. He specializes in the field of wireless communications, especially RFID.