**8. Conclusions**

Metcalfe's law states that the value of a telecommunications network is proportional to the square of the number of connected users of the system. When the law is applied to a net‐ work of objects on the scale predicted by the vision of the Internet of Things it is clear that a single, open architecture for networking physical objects is much more valuable than small scale and fragmented alternatives.

tion," MIT Auto-ID Center Massachusetts Institute of Technology, October 2000.

Integrating RFID with IP Host Identities http://dx.doi.org/10.5772/53525 129

[4] F. L. Rahman, M.B.I. Reaz, M.A.M. Ali, 2010, "Beyond the Wifi: introducing RFID system using IPv6," Proceedings of ITU-T Kaleidoscobe 2010, pp.1-4. Available from:

[5] L. Ho, M. Moh, Z. Walker, T. Hamada, and C.-F. Su, "A Prototype on RFID and Sen‐ sor Networks for Elder Healthcare: Progress Report," Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental approaches to Wireless Network Design and

[6] R.H. Jacobsen, Q. Zhang, and T.S. Toftegaard, "Internetworking Objects with RFID," in Deploying RFID - Challenges, Solutions, and Open Issues, Cristina Turcu (Ed.), ISBN: 978-953-307-380-4, InTech. Available from: *http://www.intechopen.com/books/ deploying-rfid-challenges-solutions-and-open-issues/internetworking-objects-with-rfid*

[8] IDTechEx, "The RFID Knowledgebase." Available from: *http://www.idtechex.com/*

[9] J.J. Echevarria, J. Ruiz-de-Garibay, J. Legarda, M. Álvarez, A. Ayerbe, and J.I. Vaz‐ quez, "WebTag: Web Browsing into Sensor Tags over NFC," Sensors, vol. 12, pp.

[10] GS1 EPC Tag Data Standard 1.6, September 2011. Available from: *http://www.gs1.org/*

[11] P. Urien, H. Chabanne, M. Bouet, D.O. De Cunha, V. Guyot, G. Pujolle, P. Paradinas, E. Gressier, and J.-F. Susini, "HIP-based RFID Networking Architecture," IFIP Inter‐ national Conference on Wireless and Optical Communications Networks

[12] P. Nikander, J. Laganier, and F. Dupont, "An IPv6 Prefix for Overlay Routable Cryp‐ tographic Hash Identifiers (ORCHID)," Internet Society RFC 4843, April 2009. Avail‐

[13] M. Barisch and A. Matos, "Integrating user identity management systems with the host identity protocol." 2009 IEEE Symposium on Computers and Communications,

[14] S. Dominikus, M. Aigner, and S. Kraxberger, "Passive RFID Technology for the Inter‐ net of Things," 2010 International Conference for Internet Technology and Secured

[15] R. Moskowitz and P. Nikander, "Host Identity Protocol (HIP) Architecture," Internet

Society, RFC 4423. Available from: *http://datatracker.ietf.org/doc/rfc4423/*

[7] T. Hornyak, "RFID powder", Scientific American, 298(2), 68-71, February 2008.

Available from: *http://www.autoidlabs.org/single-view/dir/article/6/93/page.html*

[3] B. Glover and H. Bhatt, "RFID Essentials," O'Reilly, 2006.

*http://www.itu.int/pub/T-PROC-KALEI-2010*

Analysis (E-WIND'05), pp. 70-75, August 2005.

*knowledgebase/en/nologon.asp*

(WOCN'07), pp. 1-5, July 2007.

ISCC, pp. 830-836, 2009.

able from: *http://tools.ietf.org/html/rfc4843*

Transactions (ICITST), pp. 1-8, November 2010.

8675-8690, 2012.

*gsmp/kc/epcglobal/tds*

RFID plays an increasingly important in our daily life from management of goods, e-tickets, healthcare, transports, even the identity cards are embedded with RFID tags. In this chapter, we have sketched methods on how to use RFID technology to connect "things" over the In‐ ternet by using IPv6. This includes a discussion on the different strategies for mapping of tag IDs to globally unique IPv6 addresses.

For tags with large identification numbers (more than 64 bits) it is proposed to use crypto‐ graphic techniques to extract the 64 bits and use these to create a host suffix that is statisti‐ cally unique.

A testbed used to experiment with the internetworking of low-cost, passive RFID tags to the Internet has been presented. Since these tags do not have electrical and processing power to run an IP protocol stack a virtual network interface (VNI) concept has been introduced. Proxies can be deployed on the edge of the Internet to act on behalf of these passive tags in a protocol message exchange.

To solve the mobility problem, two approaches have been discussed: one being the mobile IPv6 approach and the other being the HIP approach. Both have strengths and both have weaknesses. Mobile IPv6 will need some software to make the connection between the tags and the home agent. The HIP approach needs some computation to take place in order to be able to construct routable IPv6 addresses. Both approaches imply changes to be made to the Internet, as we know it today, before it is possible to effectively achieve the desired results.

Most RFID applications today include mobility as an essential part of their value crea‐ tion. Therefore, future research in this area must focus on mobility aspects of the Inter‐ net of Things.
