skip to main content
10.1145/1378600.1378629acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

SixthSense: RFID-based Enterprise Intelligence

Published:17 June 2008Publication History

ABSTRACT

RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterprise intelligence systems. We consider an enterprise setting where people (or rather their employee badges) and their personal objects such as books and mobiles are tagged with cheap, passive RFID tags, and there is good coverage of RFID readers in the workplace. SixthSense combines mobility information obtained from RFID-based sensing with information from enterprise systems such as calendar and presence, to automatically draw inferences about the association and interaction amongst people, objects, and workspaces. For instance, SixthSense is able to automatically distinguish between people and objects, learn the identities of people, and infer the ownership of objects by people.

We characterize the performance of a state-of-the-art RFID system used in our testbed, present our inference algorithms, and evaluate these both in a small testbed and via simulations. We also present the SixthSense programming model that exposes a rich API to applications. To demonstrate the capabilities of the SixthSense platform, we present a few applications built using these APIs, including a mis placed object alert service, an enhanced calendar service, and rich annotation of video with physical events. We also discuss the issue of safeguarding user privacy in the context of SixthSense.

References

  1. EPCglobal. http://www.epcglobalinc.org.Google ScholarGoogle Scholar
  2. Health Effects of Radiofrequency Fields. Fact Sheet N183, World Health Organization, May 1998, http://www.who.int/docstore/peh-emf/publications/facts_press/efact/efs183.html.Google ScholarGoogle Scholar
  3. Impinj Monza Gen 2 Tag Silicon for UHF RFID. http://rfidsupport.impinj.com/Common/FileTransfer/Download.aspx?ObjectId=30089219&env=807989.Google ScholarGoogle Scholar
  4. Impinj Speedway Reader. http://www.impinj.com/uploadedFiles/RFID/RFID_Products/Impinj-Speedway_Reliable_Data(singlepages-web).pdf.Google ScholarGoogle Scholar
  5. Intel?s RFID Move To Slash Reader Prices. http://www.eweek.com/article2/0,1759,2100828,00.asp, Mar 2007.Google ScholarGoogle Scholar
  6. Is RFID Safe at the Work Place? RFID4SME Report (project funded in part by the European Union), http://www.rfid4sme.eu/.Google ScholarGoogle Scholar
  7. Microsoft BizTalk RFID. http://www.microsoft.com/biztalk/technologies/rfid/default.mspx.Google ScholarGoogle Scholar
  8. RFID 301: A Detailed Look At Using RFID In Your Library. 3M Corporation, http://solutions.3m.com/wps/portal/3M/en_US/library/home/resources/case_studies/rfid_301/.Google ScholarGoogle Scholar
  9. SmartCode Corp. Announces the World?s First 5-cent RFID Tag. http://www.smartcodecorp.com/newsroom/01-05-06.asp, May 2006.Google ScholarGoogle Scholar
  10. The History of RFID Technology. RFID Journal, http://www.rfidjournal.com/article/view/1338/1/129.Google ScholarGoogle Scholar
  11. The Internet of Things. ITU Internet Reports 2005, http://www.itu.int/osg/spu/publications/internetofthings/.Google ScholarGoogle Scholar
  12. P. Bahl and V. N. Padmanabhan. RADAR: An Inbuilding RF-based User Location and Tracking System. In INFOCOM, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  13. N. Chaudhry, D. R. Thompson, and C. W. Thompson. RFID Technical Tutorial and Threat Modeling Version 1.0. Department of Computer Science and Engineering, University of Arkansas, http://www.csce.uark.edu/drt/publications/rfid-tutorial120608.pdf, 2005.Google ScholarGoogle Scholar
  14. R. W. et al. The active badge location system. ACM Transactions on Information Systems, Jan 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Finkenzeller. RFID Handbook. Wiley & Sons LTD, 2003.Google ScholarGoogle Scholar
  16. K. P. Fishkin, B. Jiang, M. Philipose, and S. Roy. I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects. In Ubicomp, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Geist. Computer and E-Mail Workplace Surveillance in Canada: The Shift from Reasonable Expectation of Privacy to Reasonable Surveillance. Prepared for Canadian Judicial Council, http://www.cjc-cm.gc.ca/cmslib/general/Geist_report.en.pdf, 2002.Google ScholarGoogle Scholar
  18. D. Hahnel, W. Burgard, D. Fox, K. Fishkin, and M. Philipose. Mapping and Localization with RFID Technology. In IEEE ICRA, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  19. A. Juels. RFID Security and Privacy: A Research Survey. IEEE JSAC, Feb 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. X. Liu, M. D. Corner, and P. Shenoy. Ferret: RFID Localization for Pervasive Multimedia. In Ubicomp, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Philipose, K. P. Fishkin, M. Perkowitz, D. J. Patterson, D. Fox, H. Kautz, and D. Hähnel. Inferring Activities from Interactions with Objects. IEEE Pervasive Computing, Oct 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Rahmati, L. Zhong, M. Hiltunen, and R. Jana. Reliability Techniques for RFID-Based Object Tracking Applications. In IEEE/IFIP DSN, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K. M. Ramakrishnan and D. D. Deavours. Performance Benchmarks for Passive UHF RFID Tags. In 13th GI/ITG Conf on Measurement, Modeling, and Evaluation of Computer and Communication Systems, 2006.Google ScholarGoogle Scholar
  24. J. R. Smith, K. P. Fishkin, B. Jiang, A. Mamishev, M. Philipose, A. D. Rea, S. Roy, and K. Sundara-Rajan. RFID-based Techniques for Human-activity Detection. CACM, Sep 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. F. Stajano. RFID is X-ray vision. Technical report, Aug 2005. University of Cambridge Computer Laboratory, Technical Report No. 645, http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-645.pdf.Google ScholarGoogle Scholar
  26. V. Stanford. Pervasive Computing Goes the Last Hundred Feet with RFID Systems. IEEE Pervasive Computing, Apr 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Want. An Introduction to RFID Technology. IEEE Pervasive Computing, Jan 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. E. Welbourne, M. Balazinska, G. Borriello, and W. Brunette. Challenges for Pervasive RFID-based Infrastructures. In PERTEC 2007 Workshop on Pervasive RFID/NFC Technology and Applications, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. SixthSense: RFID-based Enterprise Intelligence

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys '08: Proceedings of the 6th international conference on Mobile systems, applications, and services
      June 2008
      304 pages
      ISBN:9781605581392
      DOI:10.1145/1378600

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 June 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate274of1,679submissions,16%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader