Abstract
Radio Frequency Identification (RFID) creates a seamless link between individual objects and their digital natives. It allows objects to be uniquely, automatically and individually identified using wireless communications. With more than a half century’s development, RFID is becoming the mainstream driving force and has been able to provide various benefits in many different industries. In this chapter, we introduce the basic concepts in RFID technologies and its applications. We discuss the characteristics of RFID data and overview the state-of-the-art research on RFID data management. We also highlight some technical challenges in the management and use of RFID data.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
IETF RFC 2915.
- 3.
- 4.
- 5.
- 6.
Researchers from IBM Almaden Research Center have also developed prototype DS [34]. However, the BRIDGE project has particularly demonstrated the use of DS along with the EPCglobal architecture in various industrial projects.
- 7.
In a small environment, a tag may be read by more than one reader at the same time; as a result, its location is uncertain because of inconsistency derived from the readers.
- 8.
The authors did not give a name to the model. For convenience, we call it “KAIST Trace Model”.
References
Agrawal, J., Diao, Y., Gyllstrom, D., & Immerman, N. (2008). Efficient pattern matching over event streams. In Proceedings of the 2008 ACM SIGMOD international conference on management of data (SIGMOD’08), Vancouver, Canada.
Agrawal, P., Benjelloun, O., Das Sarma, A., Hayworth, C., Nabar, S., Sugihara, T., & Widom, J. (2006). Trio: a system for data, uncertainty, and lineage. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea.
Agrawal, R., Cheung, A., Kailing, K., & Schonauer, S. (2006). Towards traceability across sovereign, distributed RFID databases. In Proceedings of the 10th international database engineering and applications symposium (IDEAS’06), Delhi, India.
Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002). Hippocratic databases. In Proceedings of the 28th international conference on very large data bases (VLDB’02).
Aigner, M., & Feldhofer, M. (2005). Secure symmetric authentication for RFID tags. In Proceedings of the telecommunication and mobile computing (TCMC’05), Graz, Austria.
Cheng, R., Singh, S., & Prabhakar, S. (2005). U-DBMS: a database system for managing constantly-evolving data. In Proceedings of the 31st international conference on very large data bases (VLDB’05).
Cheung, A., Kailing, K., & Schönauer, S. (2007). Theseos: a query engine for traceability across sovereign, distributed RFID databases. In Proceedings of the 23rd international conference on data engineering (ICDE’07), Istanbul, Turkey.
Cocci, R. (2007). SPIRE: Scalable processing of RFID event streams. In Proceedings of the 5th RFID academic convocation, Brussels, Belgium.
Cocci, R., Tran, T., Diao, Y., & Shenoy, P. (2008). Efficient data interpretation and compression over RFID streams. In Proceedings of the 24th international conference on data engineering (ICDE’08), Cancun, Mexico.
Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the 1st international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05), Athens, Greece.
EPCGLOBAL. http://www.EPCGLOBAL.com.
Johnson, R., Gamma, E., Helm, R., & Vlissides, J. (1995). Design patterns—elements of reusable object-oriented software. Reading: Addison-Wesley.
Feldhofer, M., Dominikus, S., & Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In Proceedings of the 6th international workshop on cryptographic hardware and embedded systems (CHES’04), Cambridge, USA.
Finkenzeller, K. (2003). RFID handbook: fundamentals and applications in contactless smart cards and identification. New York: Wiley.
Gonzalez, H., Han, J., Cheng, H., Li, X., Klabjan, D., & Wu, T. (2010). Modeling massive RFID data sets: a gateway-based movement graph approach. IEEE Transactions on Knowledge and Data Engineering, 22, 90–104.
Gonzalez, H., Han, J., Li, X., & Klabjan, D. (2006). Warehousing and analyzing massive RFID data sets. In Proceedings of the 22nd international conference on data engineering (ICDE’06), Atlanta, USA.
Gonzalez, H., Han, J., & Shen, X. (2007). Cost-conscious cleaning of massive RFID data sets. In Proceedings of the 23rd international conference on data engineering (ICDE’07), Istanbul, Turkey, April 2007.
Gu, T., Wu, Z., Tao, X., Pung, H. K., & Lu, J. (2009). EpSICAR: an emerging patterns based approach to sequential, interleaved and concurrent activity recognition. In IEEE international conference on pervasive computing and communications, Los Alamitos, CA, USA.
Huynh, T., Fritz, M., & Schiele, B. (2008). Discovery of activity patterns using topic models. In Proceedings of the 10th international conference on ubiquitous computing (Ubicomp ’08), Seoul, South Korea.
Jeffery, S., Alonso, G., Franklin, M., Hong, W., & Widom, J. (2006). Declarative support for sensor data cleaning. IEEE Pervasive Computing, 3968, 83–100.
Jeffery, S., Franklin, M., & Garofalakis, M. (2008). An adaptive RFID middleware for supporting metaphysical data independence. The VLDB Journal, 17, 265–289.
Jeffery, S., Garofalakis, M., & Franklin, M. (2006). Adaptive cleaning for RFID data streams. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea, September 2006.
Juels, A. (2006). RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394.
Juels, A., & Pappu, R. (2002). Squealing euros: privacy protection in RFID-enabled banknotes. In Financial cryptography (pp. 103–121). Berlin: Springer.
Khoussainova, N., Balazinska, M., & Suciu, D. (2008). Probabilistic event extraction from RFID data. Cancun, Mexico, April 2008.
Ku, W.-S., Chen, H., Wang, H., & Sun, M.-T. (2012). A Bayesian inference-based framework for RFID data cleansing. IEEE Transactions on Knowledge and Data Engineering. doi:10.1109/TKDE.2012.116.
Lee, C.-H., & Chung, C.-W. (2008). Efficient storage scheme and query processing for supply chain management using RFID. In Proceedings of the 28th ACM SIGMOD international conference on management of data (SIGMOD’08), Vancouver, Canada.
Liao, G., Li, J., Chen, L., & Wan, C. (2011). KLEAP: an efficient cleaning method to remove cross-reads in RFID streams. In Proceedings of the 20th ACM international conference on information and knowledge management (CIKM’11), Glasgow, Scotland, UK.
Liu, M., Li, M., Golovnya, D., Rundensteiner, E. A., & Claypool, K. (2009). Sequence pattern query processing over out-of-order event streams. In Proceedings of the 2009 IEEE international conference on data engineering (ICDE’09), Shanghai, China.
Massawe, L. V., Vermaak, H., & Kinyua, J. D. M. (2012). An adaptive data cleaning scheme for reducing false negative reads in RFID data streams. In Proceedings of the 2012 IEEE international conference on RFID (RFID’12), Orlando, USA, April 2012.
Nie, Y., Li, Z., & Chen, Q. (2011). Complex event processing over unreliable RFID data streams. In Proceedings of the 13th Asia-Pacific web conference on web technologies and applications (APWeb’11), Beijing, China.
Ondrus, J., & Pigneur, Y. (2007). An assessment of NFC for future mobile payment systems. In Proceedings of the international conference on the management of mobile business, Toronto, Canada.
Osaka, K., Takagi, T., Yamazaki, K., & Takahashi, O. (2009). An efficient and secure RFID security method with ownership transfer. In RFID security (pp. 147–176). New York: Springer.
Rantzau, R., Kailing, K., Beier, S., & Grandison, T. (2006). Discovery services—enabling RFID traceability in EPCglobal networks. In 13th international conference on management of data (COMAD’06), Delhi, India.
Rao, J., Doraiswamy, S., Thakkar, H., & Colby, L. S. (2006). A deferred cleansing method for RFID data analytics. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea, September 2006.
Ré, C., Letchner, J., Balazinksa, M., & Suciu, D. (2008). Event queries on correlated probabilistic streams. In Proceedings of the 2008 ACM international conference on management of data (SIGMOD’08), Vancouver, Canada.
Rosen-Zvi, M., Chemudugunta, C., Griffiths, T., Smyth, P., & Steyvers, M. (2010). Learning author-topic models from text corpora. ACM Transactions on Information Systems, 28, 4:1–4:38.
Sarma, S., Brock, D., & Engels, D. (2001). Radio frequency identification and the electronic product code. IEEE MICRO, 21(6), 50–54. 11/12.
Sheng, Q. Z., Li, X., & Zeadally, S. (2008). Enabling next-generation RFID applications: solutions and challenges. Computer, 41(9), 21–28.
Sutton, C., & McCallum, A. (2007). An introduction to conditional random fields for relational learning. In L. Getoor & B. Taskar (Eds.), Introduction to statistical relational learning. Cambridge: MIT Press.
Tran, T., Sutton, C., Cocci, R., Yanming, N., Yanlei, D., & Shenoy, P. (2009). Probabilistic inference over RFID streams in mobile environments. In Proceedings of the 25th international conference on data engineering (ICDE’09), Shanghai, China, April 2009.
Wang, F., & Liu, P. (2005). Temporal management of RFID data. In Proceedings of the 31st international conference on very large data bases (VLDB’05), Trondheim, Norway.
Wang, L., Cheung, D., Cheng, R., Lee, S., & Yang, X. (2012). Efficient mining of frequent itemsets on large uncertain databases. IEEE Transactions on Knowledge and Data Engineering, 24(12), 2170–2183.
Want, R. (2006). An introduction to RFID technology. IEEE Pervasive Computing, 5(1), 25–33.
Wasserkrug, S., Gal, A., Etzion, O., & Turchin, Y. (2008). Complex event processing over uncertain data. In Proceedings of the second international conference on distributed event-based systems (DEBS’08), Rome, Italy.
Wasserkrug, S., Gal, A., Etzion, O., & Turchin, Y. (2012). Efficient processing of uncertain events in rule-based systems. IEEE Transactions on Knowledge and Data Engineering, 24(1), 45–58.
Wei, B., Fedak, G., & Cappello, F. (2005). Scheduling independent tasks sharing large data distributed with BitTorrent. In Proceedings of the 6th IEEE/ACM international workshop on grid computing (GRID’05), Seattle, USA.
Welbourne, E., Khoussainova, N., Letchner, J., Li, Y., Balazinska, M., Borriello, G., & Suciu, D. (2008). Cascadia: a system for specifying, detecting, and managing RFID events. In Proceedings of the 6th international conference on mobile systems, applications, and services (MobiSys’08), Breckenridge, USA.
Wu, Y., Sheng, Q. Z., & Ranasinghe, D. (2011). Peer-to-peer objects tracking in the Internet of things. In Proceedings of the 40th international conference on parallel processing (ICPP’11), Taipei, Taiwan.
Wu, Y., Sheng, Q. Z., Ranasinghe, D., & Yao, L. (2012). PeerTrack: a platform for tracking and tracing objects in large-scale traceability networks. In Proceedings of the 15th international conference on extending database technology (EDBT’12), Berlin, Germany.
Zhao, Z., Yan, D., & Ng, W. (2012). Mining probabilistically frequent sequential patterns in uncertain databases. In Proceedings of the 15th international conference on extending database technology (EDBT’12), Berlin, Germany.
Ziekow, H., & Ivantysynova, L. (2008). A probabilistic approach for cleaning RFID data. In Proceedings of the 24th international conference on data engineering workshop (ICDEW’07), Istanbul, Turkey, April 2008.
Acknowledgements
Quan Z. Sheng’s work has been partially supported by Australian Research Council (ARC) Discovery Grant DP0878917 and Linkage Project LP100200114. We thank the reviewers for their valuable comments, which helped us improve the content and quality of this chapter.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Wu, Y., Sheng, Q.Z., Zeadally, S. (2013). RFID: Opportunities and Challenges. In: Chilamkurti, N., Zeadally, S., Chaouchi, H. (eds) Next-Generation Wireless Technologies. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-5164-7_7
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5164-7_7
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5163-0
Online ISBN: 978-1-4471-5164-7
eBook Packages: Computer ScienceComputer Science (R0)