ABSTRACT
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterprise intelligence systems. We consider an enterprise setting where people (or rather their employee badges) and their personal objects such as books and mobiles are tagged with cheap, passive RFID tags, and there is good coverage of RFID readers in the workplace. SixthSense combines mobility information obtained from RFID-based sensing with information from enterprise systems such as calendar and presence, to automatically draw inferences about the association and interaction amongst people, objects, and workspaces. For instance, SixthSense is able to automatically distinguish between people and objects, learn the identities of people, and infer the ownership of objects by people.
We characterize the performance of a state-of-the-art RFID system used in our testbed, present our inference algorithms, and evaluate these both in a small testbed and via simulations. We also present the SixthSense programming model that exposes a rich API to applications. To demonstrate the capabilities of the SixthSense platform, we present a few applications built using these APIs, including a mis placed object alert service, an enhanced calendar service, and rich annotation of video with physical events. We also discuss the issue of safeguarding user privacy in the context of SixthSense.
- EPCglobal. http://www.epcglobalinc.org.Google Scholar
- Health Effects of Radiofrequency Fields. Fact Sheet N183, World Health Organization, May 1998, http://www.who.int/docstore/peh-emf/publications/facts_press/efact/efs183.html.Google Scholar
- Impinj Monza Gen 2 Tag Silicon for UHF RFID. http://rfidsupport.impinj.com/Common/FileTransfer/Download.aspx?ObjectId=30089219&env=807989.Google Scholar
- Impinj Speedway Reader. http://www.impinj.com/uploadedFiles/RFID/RFID_Products/Impinj-Speedway_Reliable_Data(singlepages-web).pdf.Google Scholar
- Intel?s RFID Move To Slash Reader Prices. http://www.eweek.com/article2/0,1759,2100828,00.asp, Mar 2007.Google Scholar
- Is RFID Safe at the Work Place? RFID4SME Report (project funded in part by the European Union), http://www.rfid4sme.eu/.Google Scholar
- Microsoft BizTalk RFID. http://www.microsoft.com/biztalk/technologies/rfid/default.mspx.Google Scholar
- RFID 301: A Detailed Look At Using RFID In Your Library. 3M Corporation, http://solutions.3m.com/wps/portal/3M/en_US/library/home/resources/case_studies/rfid_301/.Google Scholar
- SmartCode Corp. Announces the World?s First 5-cent RFID Tag. http://www.smartcodecorp.com/newsroom/01-05-06.asp, May 2006.Google Scholar
- The History of RFID Technology. RFID Journal, http://www.rfidjournal.com/article/view/1338/1/129.Google Scholar
- The Internet of Things. ITU Internet Reports 2005, http://www.itu.int/osg/spu/publications/internetofthings/.Google Scholar
- P. Bahl and V. N. Padmanabhan. RADAR: An Inbuilding RF-based User Location and Tracking System. In INFOCOM, 2000.Google ScholarCross Ref
- N. Chaudhry, D. R. Thompson, and C. W. Thompson. RFID Technical Tutorial and Threat Modeling Version 1.0. Department of Computer Science and Engineering, University of Arkansas, http://www.csce.uark.edu/drt/publications/rfid-tutorial120608.pdf, 2005.Google Scholar
- R. W. et al. The active badge location system. ACM Transactions on Information Systems, Jan 1992. Google ScholarDigital Library
- K. Finkenzeller. RFID Handbook. Wiley & Sons LTD, 2003.Google Scholar
- K. P. Fishkin, B. Jiang, M. Philipose, and S. Roy. I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects. In Ubicomp, 2004.Google ScholarCross Ref
- M. Geist. Computer and E-Mail Workplace Surveillance in Canada: The Shift from Reasonable Expectation of Privacy to Reasonable Surveillance. Prepared for Canadian Judicial Council, http://www.cjc-cm.gc.ca/cmslib/general/Geist_report.en.pdf, 2002.Google Scholar
- D. Hahnel, W. Burgard, D. Fox, K. Fishkin, and M. Philipose. Mapping and Localization with RFID Technology. In IEEE ICRA, 2004.Google ScholarCross Ref
- A. Juels. RFID Security and Privacy: A Research Survey. IEEE JSAC, Feb 2006. Google ScholarDigital Library
- X. Liu, M. D. Corner, and P. Shenoy. Ferret: RFID Localization for Pervasive Multimedia. In Ubicomp, 2006. Google ScholarDigital Library
- M. Philipose, K. P. Fishkin, M. Perkowitz, D. J. Patterson, D. Fox, H. Kautz, and D. Hähnel. Inferring Activities from Interactions with Objects. IEEE Pervasive Computing, Oct 2004. Google ScholarDigital Library
- A. Rahmati, L. Zhong, M. Hiltunen, and R. Jana. Reliability Techniques for RFID-Based Object Tracking Applications. In IEEE/IFIP DSN, 2007. Google ScholarDigital Library
- K. M. Ramakrishnan and D. D. Deavours. Performance Benchmarks for Passive UHF RFID Tags. In 13th GI/ITG Conf on Measurement, Modeling, and Evaluation of Computer and Communication Systems, 2006.Google Scholar
- J. R. Smith, K. P. Fishkin, B. Jiang, A. Mamishev, M. Philipose, A. D. Rea, S. Roy, and K. Sundara-Rajan. RFID-based Techniques for Human-activity Detection. CACM, Sep 2005. Google ScholarDigital Library
- F. Stajano. RFID is X-ray vision. Technical report, Aug 2005. University of Cambridge Computer Laboratory, Technical Report No. 645, http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-645.pdf.Google Scholar
- V. Stanford. Pervasive Computing Goes the Last Hundred Feet with RFID Systems. IEEE Pervasive Computing, Apr 2003. Google ScholarDigital Library
- R. Want. An Introduction to RFID Technology. IEEE Pervasive Computing, Jan 2006. Google ScholarDigital Library
- E. Welbourne, M. Balazinska, G. Borriello, and W. Brunette. Challenges for Pervasive RFID-based Infrastructures. In PERTEC 2007 Workshop on Pervasive RFID/NFC Technology and Applications, 2007. Google ScholarDigital Library
Index Terms
- SixthSense: RFID-based Enterprise Intelligence
Recommendations
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction
The privacy model of radio frequency identification RFID systems is for formalizing the adversarial capabilities and the security requirements of RFID anonymity and untraceability. Existing unpredictability-based privacy models such as unp-privacy, eunp-...
Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing
SpringSim '08: Proceedings of the 2008 Spring simulation multiconferenceThe increasing prevalence of ubiquitous computing (UC) mediums presents many unique security and privacy challenges. Digital Right Management (DRM) technologies and Radio Frequency Identification (RFID) technology are at the frontier of UC and are the ...
On two RFID privacy notions and their relations
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on ...
Comments