Pervasive computing goes the last hundred feet with rfid systems
2003, IEEE Pervasive Computing
Sign up for access to the world's latest research
Abstract
W hat if networked computers were as cheap as paper clips and could be attached to things as easily as a yellow sticky? We are about to find out, because such computers are being deployed across the world as you read this. They are, of course, Radio Frequency Identification tags-low-power, short-range communication devices that we can embed into everyday objects to track location, monitor security, and record the status of events or even environmental conditions. Conceptualizing them simply as ID tags greatly underestimates their capabilities, considering some have local computing power, persistent storage, and communication capabilities.
Related papers
Communications of the Association for Information Systems
This paper explores the applications and future commercial impacts of radio frequency identification (RFID) technology. Its objective is to summarize the ways in which organizations and academics are thinking about these technologies and to stimulate strategic thinking about their possible uses and implications. It first provides an overview of this technology and how it works. Then it explores the surprisingly wide variety of current applications of RFID. Next it looks at several classes of potential RFID applications and how these might affect how organizations work. Finally, it examines the cost and implementation considerations of this technology. The paper concludes that RFID is a viable technology with many possible applications. However, only some of the impacts on organizations and society can be anticipated at present.
IEEE Transactions on Automation Science and Engineering, 2009
Information Systems Frontiers, 2010
topics in RFID research that reflect some key directions in this active yet diverse research area.
Proceedings of the …, 2006
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ''RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for both automated and coordinated usage of RFID security mechanisms, offering finegrained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.
Information Security and Privacy, 2005
RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, they will allow smart washing machines to check for incompatible clothes (e.g., white shirts and red socks) and smart refrigerators to check for milk that is too old to be consumed. Subdermal tags with medical information are already being implanted in animals and people. However, a world in which practically everything is tagged and can be read at a modest distance by anyone who wants to buy an RFID reader introduces serious security and privacy issues. For example, women walking down the street may be effectively broadcasting the sizes of their RFID-tagged bras and medical data without realizing it. To protect people in this environment, we propose developing a compact, portable, electronic device called an RFID Guardian, which people can carry with them. In the future, it could be integrated into PDAs or cell phones. The RFID Guardian looks for, records, and displays all RFID tags and scans in the vicinity, manages RFID keys, authenticates nearby RFID readers, and blocks attempted accesses to the user's RFID tags from unauthorized readers. In this way, people can find out what RFID activity is occuring around them and take corrective action if need be.
Computers & Security, 2006
First conceived in 1948, Radio Frequency Identification (RFID) has taken many years for the technology to mature to the point where it is sufficiently affordable and reliable for widespread use. From Electronic Article Surveillance (EAS) for article (mainly clothing) security to ...
Pervasive Computing, IEEE, 2006
I n recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance, and unlike earlier bar-code technology (see the sidebar), it does so without requiring a line of sight. 1 RFID tags (see ) support a larger set of unique IDs than bar codes and can incorporate additional data such as manufacturer, product type, and even measure environmental factors such as temperature. Furthermore, RFID systems can discern many different tags located in the same general area without human assistance. In contrast, consider a supermarket checkout counter, where you must orient each bar-coded item toward a reader before scanning it.
Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006
RFID systems come in a myriad of forms, each catering to a specific need. However, a systematic classification to reduce the confusion of potential adopters, researchers and enthusiasts is still lacking. This article proposes and evaluates a taxonomy of various RFID systems currently available. The taxonomy can be used for gaining an understanding of this technology, the factors for implementation of a successful RFID system, its strengths and weaknesses as well as scalability options. Both novice as well as experienced RFID researchers will benefit from this classification.
Mobile media researchers have increasingly focused on smartphones as locative media. However, our field has not devoted as much attention to another mobile technology used to track far more people and things than smartphones: radio frequency identification (RFID) tags. RFID tags are used to track products and people, and they are an increasingly important part of the infrastructure of the Internet of Things. This article argues that mobile media scholars have much to contribute to scholarly analyses of RFID. I make that argument by first giving background on RFID as a mobile technology. I then identify and discuss four areas of research related to RFID tags—Big Data, surveillance, space and place, and nonhuman agency—that are particularly relevant to mobile media scholars.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.