InTech uses cookies to offer you the best online experience. By continuing to use our site, you agree to our Privacy Policy.

Engineering » Electrical and Electronic Engineering » "Radio Frequency Identification from System to Applications", book edited by Mamun Bin Ibne Reaz, ISBN 978-953-51-1143-6, Published: June 5, 2013 under CC BY 3.0 license. © The Author(s).

Chapter 6

Integrating RFID with IP Host Identities

By Steffen Elmstrøm Holst Jensen and Rune Hylsberg Jacobsen
DOI: 10.5772/53525

  1. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787-2805, October 2010.

  2. S. Sarma, D.L. Brock, and K. Ashton, “The Networked Physical World, Proposals for Engineering the Next Generation of Computing, Commerce & Automatic-Identification,” MIT Auto-ID Center Massachusetts Institute of Technology, October 2000. Available from:

  3. B. Glover and H. Bhatt, “RFID Essentials,” O’Reilly, 2006.

  4. F. L. Rahman, M.B.I. Reaz, M.A.M. Ali, 2010, “Beyond the Wifi: introducing RFID system using IPv6,” Proceedings of ITU-T Kaleidoscobe 2010, pp.1-4. Available from:

  5. L. Ho, M. Moh, Z. Walker, T. Hamada, and C.-F. Su, “A Prototype on RFID and Sensor Networks for Elder Healthcare: Progress Report,” Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental approaches to Wireless Network Design and Analysis (E-WIND’05), pp. 70-75, August 2005.

  6. R.H. Jacobsen, Q. Zhang, and T.S. Toftegaard, “Internetworking Objects with RFID,” in Deploying RFID - Challenges, Solutions, and Open Issues, Cristina Turcu (Ed.), ISBN: 978-953-307-380-4, InTech. Available from:

  7. T. Hornyak, “RFID powder”, Scientific American, 298(2), 68-71, February 2008.

  8. IDTechEx, “The RFID Knowledgebase.” Available from:

  9. J.J. Echevarria, J. Ruiz-de-Garibay, J. Legarda, M. Álvarez, A. Ayerbe, and J.I. Vazquez, “WebTag: Web Browsing into Sensor Tags over NFC,” Sensors, vol. 12, pp. 8675-8690, 2012.

  10. GS1 EPC Tag Data Standard 1.6, September 2011. Available from:

  11. P. Urien, H. Chabanne, M. Bouet, D.O. De Cunha, V. Guyot, G. Pujolle, P. Paradinas, E. Gressier, and J.-F. Susini, “HIP-based RFID Networking Architecture,” IFIP International Conference on Wireless and Optical Communications Networks (WOCN'07), pp. 1-5, July 2007.

  12. P. Nikander, J. Laganier, and F. Dupont, “An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID),” Internet Society RFC 4843, April 2009. Available from:

  13. M. Barisch and A. Matos, “Integrating user identity management systems with the host identity protocol.” 2009 IEEE Symposium on Computers and Communications, ISCC, pp. 830-836, 2009.

  14. S. Dominikus, M. Aigner, and S. Kraxberger, “Passive RFID Technology for the Internet of Things,” 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1-8, November 2010.

  15. R. Moskowitz and P. Nikander, “Host Identity Protocol (HIP) Architecture,” Internet Society, RFC 4423. Available from:

  16. F. Al-Shraideh, “Host Identity Protocol,” International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL 2006., pp. 203, 23-29 April 2006.

  17. S. Deering and R. Hinden, “Internet Protocol, Version 6 (IPv6) Specification,” Internet Society, RFC 2460, December 1998. Available from:

  18. “ISO/IEC 14443 Identification cards - Contactless integrated circuit(s) cards - Proximity cards.” Available from:

  19. “ISO/IEC 15693 Identification cards - Contactless integrated circuit(s) cards - Vicinity cards.” Available from:

  20. “ISO/IEC 18000 Information technology - Radio frequency identification for item management.” Available from:

  21. Bose and R. Pal, “Auto-ID: managing anything, anywhere, anytime in the supply chain,” Communications of the ACM, vol. 48, no. 8, pp. 100-106, August 2005.

  22. P. Nikander, T. Henderson, C. Vogt, and J. Arkko, “End-Host Mobility and Multihoming with the Host Identity Protocol”, Internet Society, RFC 5206, April 2008. Available from:

  23. D. Eastlake and P. Jones, “US Secure Hash Algorithm 1 (SHA1),” Internet Society, RFC 3174, September 2001. Available from:

  24. R. Rivest, “The MD5 Message-Digest Algorithm,” Internet Society, RFC 1321, April 1992. Available from:

  25. B. Xu, Y. Liu, X. He, and Y. Tao, “On the Architecture and Address Mapping Mechanism of IoT,” 2010 International Conference on Intelligent Systems and Knowledge Engineering (ISKE), pp. 678-682, November 2010.

  26. Pappas, S. Hailes, and R. Giaffreda, “Mobile Host Location Tracking through DNS,“ London Communications Symposium (LCS) and Photonics London, LCS 2002, Available from:

  27. T. Aura, “Cryptographically Generated Addresses (CGA),” Internet Society, RFC 3972, March 2005. Available from:

  28. EM Microelectronics, “EM4100 / Read Only Contactless Identification Device,” data sheet, 2004. Available from

  29. EM Microelectronics, “EM4450/4550 / 1 KBit Read/Write Contactless Identification Device,” data sheet, 2010. Available from:

  30. D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” Internet Society, RFC 3775, June 2004. Available from: