Skip to main content
Top
Published in: Information Systems Frontiers 5/2010

01-11-2010

Ubiquitous RFID: Where are we?

Authors: Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung, Zakaria Maamar

Published in: Information Systems Frontiers | Issue 5/2010

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

After over a half century of development, radio-frequency identification (RFID) is beginning to move into mainstream applications for automatic identification. RFID is widely seen today as one of the key enabling technologies of the “Internet of Things”. However, many challenges still need to be addressed before we can fully benefit from this nascent and ubiquitous technology. In this paper, we present the state of the art of RFID technology and discuss the challenges and open issues in developing next generation RFID applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
There are about 50,000 billion things on the Earth.
 
2
Ghost reads occur when an RFID reader “reads” an identifier that is not stored on any tag within the reader’s field.
 
Literature
go back to reference Bornhövd, C., Lin, T., Haller, S., & Schaper, J. (2004). Integrating automatic data acquisition with business processes experiences with SAP’s auto-ID infrastructure. In Proc. of the 30th international conference on very large data bases (VLDB’04), Toronto, Canada. Bornhövd, C., Lin, T., Haller, S., & Schaper, J. (2004). Integrating automatic data acquisition with business processes experiences with SAP’s auto-ID infrastructure. In Proc. of the 30th international conference on very large data bases (VLDB’04), Toronto, Canada.
go back to reference Chawathe, S. S., Krishnamurthy, V., Ramachandran, S., & Sarma, S. (2004). Managing RFID data. In Proc. of the 30th international conference on very large data bases (VLDB’04), Toronto, Canada. Chawathe, S. S., Krishnamurthy, V., Ramachandran, S., & Sarma, S. (2004). Managing RFID data. In Proc. of the 30th international conference on very large data bases (VLDB’04), Toronto, Canada.
go back to reference Diao, Y., Li, B., Liu, A., Peng, L., Sutton, C., Tran, T., et al. (2009). Capturing data uncertainty in high-volume stream processing. In Pro. of the 4th biennial conference on innovative data systems (CIDR’09), Asilomar, CA, USA. Diao, Y., Li, B., Liu, A., Peng, L., Sutton, C., Tran, T., et al. (2009). Capturing data uncertainty in high-volume stream processing. In Pro. of the 4th biennial conference on innovative data systems (CIDR’09), Asilomar, CA, USA.
go back to reference Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification. New York: Wiley. Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification. New York: Wiley.
go back to reference Franklin, M. J., Jeffery, S. R., Krishnamurthy, S., Reiss, F., Rizvi, S., Wu, E., et al. (2005). Design considerations for high fan-in systems: The HiFi approach. In Proc. of the second biennial conference on innovative data systems research (CIDR’05), Asilomar, CA, USA. Franklin, M. J., Jeffery, S. R., Krishnamurthy, S., Reiss, F., Rizvi, S., Wu, E., et al. (2005). Design considerations for high fan-in systems: The HiFi approach. In Proc. of the second biennial conference on innovative data systems research (CIDR’05), Asilomar, CA, USA.
go back to reference Gonzalez, H., Han, J., & Li, X. (2006). FlowCube: Constructing RFID FlowCubes for multi-dimensional analysis of commodity flows. In Proc. of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea. Gonzalez, H., Han, J., & Li, X. (2006). FlowCube: Constructing RFID FlowCubes for multi-dimensional analysis of commodity flows. In Proc. of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea.
go back to reference Hu, Y., Sundara, S., Chorma, T., & Srinivasan, J. (2005). Supporting RFID-based item tracking applications in oracle DBMS using a Bitmap Datatype. In Proc. of the 31st international conference on very large data bases (VLDB’05), Trondheim, Norway. Hu, Y., Sundara, S., Chorma, T., & Srinivasan, J. (2005). Supporting RFID-based item tracking applications in oracle DBMS using a Bitmap Datatype. In Proc. of the 31st international conference on very large data bases (VLDB’05), Trondheim, Norway.
go back to reference Jeffery, S. R., Franklin, M. J., & Garofalakis, M. (2008). An adaptive RFID middleware for supporting metaphysical data independence. The VLDB Journal, 17(2), 265–289.CrossRef Jeffery, S. R., Franklin, M. J., & Garofalakis, M. (2008). An adaptive RFID middleware for supporting metaphysical data independence. The VLDB Journal, 17(2), 265–289.CrossRef
go back to reference Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24(2), 381–394.CrossRef Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24(2), 381–394.CrossRef
go back to reference Khoussainova, N., Balazinska, M., & Suciu, D. (2008). PEEX: Extracting probabilistic events from RFID data. In Pro. of the 24th international conference on data engineering (ICDE’08), Cancun, Mexico. Khoussainova, N., Balazinska, M., & Suciu, D. (2008). PEEX: Extracting probabilistic events from RFID data. In Pro. of the 24th international conference on data engineering (ICDE’08), Cancun, Mexico.
go back to reference Nath, B., Reynolds, F., & Want, R. (2006). RFID technology and applications. IEEE Pervasive Computing, 7(1), 22–24.CrossRef Nath, B., Reynolds, F., & Want, R. (2006). RFID technology and applications. IEEE Pervasive Computing, 7(1), 22–24.CrossRef
go back to reference Prabhu, B. S., Su, X., Ramamurthy, H., Chu, C.-C., & Gadh, R. (2006). WinRFID - a middleware for the enablement of radio frequency identification (RFID)-based applications. In Mobile, wireless and sensor networks: Technology, applications and future directions, (pp. 313–336). New York: Wiley–IEEE. Prabhu, B. S., Su, X., Ramamurthy, H., Chu, C.-C., & Gadh, R. (2006). WinRFID - a middleware for the enablement of radio frequency identification (RFID)-based applications. In Mobile, wireless and sensor networks: Technology, applications and future directions, (pp. 313–336). New York: Wiley–IEEE.
go back to reference Rao, J., Doraiswamy, S., Thakkar, H., & Colby, L. (2006). A deferred cleansing approach for RFID data analytics. In Proc. of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea. Rao, J., Doraiswamy, S., Thakkar, H., & Colby, L. (2006). A deferred cleansing approach for RFID data analytics. In Proc. of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea.
go back to reference Roussos, G. (2008). Networked RFID: Systems, software and services. New York: Springer. Roussos, G. (2008). Networked RFID: Systems, software and services. New York: Springer.
go back to reference Roussos, G., Duri, S. S., & Thompson, C. W. (2009). RFID meets the internet. IEEE Internet Computing, 13(1), 11–13.CrossRef Roussos, G., Duri, S. S., & Thompson, C. W. (2009). RFID meets the internet. IEEE Internet Computing, 13(1), 11–13.CrossRef
go back to reference Sheng, Q. Z., Li, X., & Zeadally, S. (2008). Enabling next-generation RFID applications: Solutions and challenges. IEEE Computer, 41(9), 21–28. Sheng, Q. Z., Li, X., & Zeadally, S. (2008). Enabling next-generation RFID applications: Solutions and challenges. IEEE Computer, 41(9), 21–28.
go back to reference Wang, F., Liu, S., & Liu, P. (2009). Complex RFID event processing. The VLDB Journal (in press). Wang, F., Liu, S., & Liu, P. (2009). Complex RFID event processing. The VLDB Journal (in press).
go back to reference Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 94–104.CrossRef Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 94–104.CrossRef
go back to reference Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., et al. (2009). Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing, 13(3), 48–55.CrossRef Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., et al. (2009). Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing, 13(3), 48–55.CrossRef
Metadata
Title
Ubiquitous RFID: Where are we?
Authors
Quan Z. Sheng
Sherali Zeadally
Zongwei Luo
Jen-Yao Chung
Zakaria Maamar
Publication date
01-11-2010
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 5/2010
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-009-9212-x

Other articles of this Issue 5/2010

Information Systems Frontiers 5/2010 Go to the issue

Premium Partner