Advertisement

RFID Sensors and Artifact Tracking

  • Marina BuzziEmail author
  • Caterina Senette
Chapter
Part of the Geotechnologies and the Environment book series (GEOTECH, volume 16)

Abstract

As network bandwidth steadily increases and touchscreen mobile devices become ever more pervasive, objects achieve an electronic identity by actively building the “Internet of Things” (IoT). RFID technology as well as sensor networks (SN) are important elements in the creation of the IoT, with innovative customized apps designed around people. This chapter introduces basic features of RFID systems and discusses their potential in the field of cultural heritage protection and promotion. After a brief introduction, RFID is introduced, describing recent research improvements that integrate sensor ability in RFID (semi)passive tags. Next, we focus on its application in the field of cultural heritage, introducing related work and discussing possible scenarios of use. Finally, conclusions and future prospects end the chapter.

Keywords

Cultural Heritage Cultural Asset Electronic Product Code Cloning Attack Asset Management System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Angelaccio M, Basili A, Buttarazzi B, Liguori W (2012) Smart and mobile access to cultural heritage resources: a case study on Ancient Italian Renaissance Villas. In: IEEE 21st international workshop on enabling technologies: infrastructure for collaborative enterprises (WETICE), pp 310–314Google Scholar
  2. Bajaj R, Ranaweera SL, Agrawal DP (2002) GPS: location-tracking technology. Computer 35(4):92–94CrossRefGoogle Scholar
  3. Bateman IJ, Langford IH (1997) Non-users’ willingness to pay for a National Park: an application and critique of the contingent valuation method. Reg Stud 31(6):571–582Google Scholar
  4. Bhattacharya R, Florkemeier C, Sarma S (2009) Towards tag antenna based sensing-An RFID displacement sensor. In: Proceedings of international conference on RFID, pp 95–102Google Scholar
  5. Blake J (2000) On defining the cultural heritage. Int Comp Law Quart 49:61–85. doi: 10.1017/S002058930006396X CrossRefGoogle Scholar
  6. Bono S, Green M, Stubblefield A, Juels A, Rubin A, Szydlo M (2006) Security analysis of a cryptographically enabled RFID device. Pre-print. Available at www.rfidanalysis.org
  7. Bowitz E, Ibenholt K (2009) Economic impacts of cultural heritage–research and perspectives. J Cult Herit 10(1):1–8CrossRefGoogle Scholar
  8. Capdevila S, Jofre L, Bolomey JC, Romeu J (2010) RFID multi-probe impedance-based sensors. IEEE Trans Inst Measur 59(12):3093–3101CrossRefGoogle Scholar
  9. Catarinucci L, Colella R, Tarricone L (2013) Enhanced UHF RFID sensor-tag microwave and wireless components letters. IEEE 23(1):49–51Google Scholar
  10. Çayırezmez NA, Aygün HM, Boz L (2013) Suggestion of RFID technology for tracking museum objects in Turkey. In: Digital heritage IEEE International Congress, vol 2, pp 315–318Google Scholar
  11. Ceipidor UB, Medaglia CM, Volpi V, Moroni A, Sposato S, Carboni M, Caridi A (2013) NFC technology applied to touristic-cultural field: a case study on an Italian museum. In: The 5th international workshop on near field communication (NFC)Google Scholar
  12. Cober R, Au O, Son JJ (2012) Using a participatory approach to design a technology-enhanced museum tour for visitors who are blind. In: Proceedings of the 2012 iConference ACM, New York, pp 592–594. doi: 10.1145/2132176.2132301
  13. Costantini S, Mostarda L, Tocchio A, Tsintza P (2008) DALICA: agent-based ambient intelligence for cultural-heritage scenarios. Intell Syst IEEE 23(2):34–41CrossRefGoogle Scholar
  14. Cultural Heritage Space Identification System (CUSPIS) (2007) European commission 6th framework program—2nd call Galileo joint undertaking http://www.gsa.europa.eu/fp6-cuspis-project
  15. De Donno D, Catarinucci L, Tarricone L (2014) RAMSES: RFID augmented module for smart environmental sensing. IEEE Trans Instrum Meas 63(7):1701–1708CrossRefGoogle Scholar
  16. Dobkin DM (2007) The RF in RFID: passive UHF RFID in practice. Elsevier-Newnes, AmsterdamGoogle Scholar
  17. Dupuy A, Juanals B, Minel, J-L (2015) Towards open museums: the interconnection of digital and physical spaces in open environments. MW2015: Museums and the Web 2105, Chicago, USAGoogle Scholar
  18. Duroc Y, Vera GA (2014) Towards autonomous wireless sensors: RFID and energy harvesting solutions. In: Internet of Things. Springer International Publishing, pp 233–225Google Scholar
  19. EGNOS (European Geostationary Navigation Overlay Service): www.esa.int/
  20. EPC global standard powered by GS1: Object Naming Service (ONS) 5 Version 1.0 (2005)Google Scholar
  21. EPCglobal (2005). Class-1 Generation-2 UHF RFID Conformance Requirements Specification v. 102 EPCglobal public document, February 2005Google Scholar
  22. Fu Y, Zhang C, Wang J (2010) A research on Denial of Service attack in passive RFID system. In: International conference on anti-counterfeiting security and identification in communication (ASID). IEEE, pp 24–28Google Scholar
  23. Hahnel D, Burgard W, Fox D, Fishkin K, Philipose M (2004) Mapping and localization with RFID technology. In: robotics and automation, ICRA ‘04.2004 IEEE international conference 1, pp 1015–1020Google Scholar
  24. Jacob J (2002) Counterfeit art—how to keep it out of your collection. Chubb CollectorsGoogle Scholar
  25. Jingwangsa T, Soonjun S, Cherntanomwong P (2010) Comparison between innovative approaches of RFID based localization using fingerprinting techniques for outdoor and indoor environments. In: Advanced Communication Technology (ICACT), 2010 The 12th international conference on (vol. 2, pp 1511–1515). IEEEGoogle Scholar
  26. Juels A (2006) Rfid security and privacy: a research survey. IEEE J Select Areas CommunGoogle Scholar
  27. Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Advances in cryptology–CRYPTO 2005. Springer, Berlin/Heidelberg, pp 293–308CrossRefGoogle Scholar
  28. Karimi R, Nanopoulos A, Schmidt-Thieme L (2012) RFID-enhanced museum for interactive experience. Springer Multimedia for Cultural Heritage Communications in Computer and Information Science 247:192–205Google Scholar
  29. Kostoska G, Fezzi D, Valeri B, Baez M, Casati F, Caliari S, Tarter S (2013) Collecting memories of the museum experience. In: CHI ‘13 extended abstracts on human factors in computing systems (CHI EA ‘13). ACM, New York, pp 247–252CrossRefGoogle Scholar
  30. Kuflik T, Lanir J, Dim E, Wecker A, Corrá M, Zancanaro M, Stock O (2011) Indoor positioning: challenges and solutions for indoor cultural heritage sites. In: Proceedings of the 16th international conference on Intelligent user interfaces (IUI ‘11), pp 375–378Google Scholar
  31. Kuo CW, Chiang JK, Lin QP (2009) The research on applying RFID information system architecture for museum service. In: Fourth international conference on computer sciences and convergence information technology, pp 218–222Google Scholar
  32. Lee J, Park KS, Hong S, Cho WD (2007). Object tracking based on RFID coverage visual compensation in wireless sensor network. In: ISCAS 2007. IEEE international symposium on circuits and systems. IEEE, pp 1597–1600Google Scholar
  33. Lehtonen M, Michahelles F, Fleisch E (2007) Probabilistic approach for location-based authentication. In: 1st international workshop on security for spontaneous interaction IWSSI 2007Google Scholar
  34. Lehtonen M, Staake T, Michahelles F (2008) From identification to authentication–a review of RFID product authentication techniques. In: Networked RFID systems and lightweight cryptography. Springer, Berlin/Heidelberg, pp 169–187CrossRefGoogle Scholar
  35. Liu H, Bolic M, Nayak A, Stojmenovi I (2007) Integration of RFID and wireless sensor networks. In: Sense ID 2007 workshop at ACN SenSys, pp 6–9Google Scholar
  36. Liu H, Bolic M, Nayak A, Stojmenovic I (2008) Taxonomy and challenges of the integration of RFID and wireless sensor networks. In: IEEE network, pp 26–32Google Scholar
  37. Mazzenga F, Simonetta A, Giuliano R, Vari M (2010) Applications of smart tagged RFID tapes for localization services in historical and cultural heritage environments, 2010 19th IEEE international workshop on enabling technologies: infrastructures for collaborative enterprises WETICE, pp 186–191Google Scholar
  38. Mody A, Akram M, Rony K Aman MS, Kamoua R (2009) Enhancing user experience at museums using smart phones with RFID. In: Proceedings of the systems, applications and technology conference. LISAT ‘09. IEEE Long Island, pp 1–5Google Scholar
  39. Mostarda L, Tocchio A, Inverardi P, Costantini S (2007) A geo time authentication system. In: Trust management. Springer, New York, , pp 123–138Google Scholar
  40. Mostarda L, Dong C, Dulay N (2010) Context-based authentication and transport of cultural assets. Pers Ubiquit Comput 14(4):321–334CrossRefGoogle Scholar
  41. O’Connor MC (2010) A guide to RFID middleware. RFID JGoogle Scholar
  42. Pateriya RK, Sharma S (2011) The evolution of RFID security and privacy: a research survey. In: International conference on communication systems and network technologies (CSNT), pp 115–119. IEEEGoogle Scholar
  43. Pesonen N, Jaakkola K, Lamy J, Nummila K, Marjonen J (2009). Smart RFID tags, development and implementation of RFID technology. In: Turcu C (ed). InTech. ISBN: 978–3–902613-54-7Google Scholar
  44. Pozzobon O, WuUems C, Kubic K (2004) Secure tracking using trusted GNSS receivers and GALILEO authentication services. J Global Posit SystGoogle Scholar
  45. Rahmati A, Zhong L, Hiltunen M, Jana R (2007, June) Reliability techniques for RFID-based object tracking applications. In: Dependable systems and networks, 2007. DSN’07. 37th annual IEEE/IFIP international conference on IEEE, pp 113–118Google Scholar
  46. RFID Journal (2003) RFID, privacy and corporate data. Feature Article, June 2, 2003. Available at http://www.rfidjournal.com on subscription basis
  47. RFID Journal (2006) EPC tags subject to phone attacks. News Article, February 24. Available at http://www.rfidjournal.com/article/articleview/2167/1/1/ (4.5.2006)
  48. Ruijgrok ECM (2006) The three economic values of cultural heritage: a case study in the Netherlands. J Cult Herit 7(3):206–213CrossRefGoogle Scholar
  49. Schirripa G, Cozzella L, Caciotta M, Colasanti R, Ferrari G (2014) Analogue fingerprinting for painting authentication 20th IMEKO TC4 international symposium and 18th international workshop on ADC modelling and testing research on electric and electronic measurement for the economic upturn Benevento, Italy, 15–17 September 2014Google Scholar
  50. Staake T, Thiesse F, Fleisch E (2005) Extending the EPC network – the potential of RFID in anti-counterfeiting. In: Proceedings of the 2005 ACM symposium on applied computing. ACM Press, New York, pp 1607–1612Google Scholar
  51. Stallings W (2006) Cryptography and network security: principles and practice, 4th ed. Prentice HallGoogle Scholar
  52. Todd B, Phillips M, Schultz SM, Hawkins AR, Jensen BD (2009) Low-cost RFID threshold shock sensors. IEEE Sensors J 9(4):464–469CrossRefGoogle Scholar
  53. Tuan TH, Navrud S (2008) Capturing the benefits of preserving cultural heritage. J Cult Herit 9(3):326–337CrossRefGoogle Scholar
  54. Tuyls P, Batina L (2006) RFID-tags for anti-counterfeiting. In: Topics in cryptology–CT-RSA 2006. Springer, Berlin/Heidelberg, pp 115–131Google Scholar
  55. Vaz A, Ubarretxena A, Zalbide I, Pardo D, Solar H, Berenguer R (2010) Full passive UHF tag with a temperature sensor suitable for human body temperature monitoring. Circuits and systems II: express briefs, IEEE Transactions on, 57(2), 95–99Google Scholar
  56. Virtanen J, Ukkonen L, Björninen T, Sydänheimo L (2010) Printed humidity sensor for UHF RFID systems. In: Sensors applications symposium (SAS), 2010 IEEE, pp 269–272Google Scholar
  57. Weingart S (2000) Physical security devices for computer subsystems: a survey of attacks and defense. In: Cetin Kaya Koc, Christof Paar (eds) Proceedings of CHES’00, 1965 of lecture notes in Computer Science. Springer, pp 302–317Google Scholar
  58. Weiser MD (1991) The computer for the 21st century. Scientific American Special Issue on Communications, Computers, and Networks, pp 66–75Google Scholar
  59. Wu J (2012) Three-dimensional indoor RFID localization system. Ph.D. dissertationGoogle Scholar
  60. Yeager DJ, Powledge PS, Prasad R, Wetherall D, Smith JR (2008, April) Wirelessly-charged UHF tags for sensor data collection. In: IEEE international conference on RFID, pp 320–327Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Institute of Informatics and TelematicsNational Research Council (IIT-CNR)PisaItaly

Personalised recommendations