Skip to main content

RFID-Based Identification: A Measurement Study

  • Conference paper
Mobile Lightweight Wireless Systems (Mobilight 2009)

Abstract

In this paper we investigate the feasibility of using UHF RFID as a tool for identifying individuals. We first developed a demo application for greeting conference speakers by incorporating a passive UHF tag into a user badge. Next, based on participant feedback we carried out additional tests to gauge the reliability of the user identification. Results of our experiments are very encouraging. If certain technical precautions are kept in mind, UHF RFID has a high percentage of success and is more widely accepted in the user community than is active sensor technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alien Technology: Tag Feng Shui. A Practical Guide to Selecting and Applying RFID Tags, http://www.alientechnology.com/docs/WP_Alien_Tag.pdf

  2. Doherty, N.F., King, M., Al-Mushayt, O.: The impact of inadequacies in the treatment of organizational issues on information systems development projects. In: International Journal of Information & Management, vol. 41, pp. 49–62. Elsevier, Amsterdam (2003)

    Google Scholar 

  3. Dritsas, S., Gritzalis, D., Lambrinoudakis, C.: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics and Informatics Journal 23(3), 196–210 (2006)

    Article  Google Scholar 

  4. Günther, O., Spiekermann, S.: RFID: tagging the world: RFID and the perception of control: the consumer’s view. Communications of the ACM 48(9), 73–76 (2005)

    Article  Google Scholar 

  5. Juels, A.: RFID Security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  6. Hyangjin, L., Jeeyeon, K.: Privacy threats and issues in mobile RFID. In: First International Conference on Availability, Reliability and Security, pp. 510–514 (2006)

    Google Scholar 

  7. Konomi, S., Roussos, G.: Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments. Personal and Ubiquitous Computing 11(7), 507–521 (2007)

    Article  Google Scholar 

  8. Kourouthanassis, P.E., Giaglis, G.M., Vrechopoulos, A.P.: Enhancing user experience through pervasive information systems: The case of pervasive retailing. International Journal of Information Management 27, 319–335 (2007)

    Article  Google Scholar 

  9. Mamei, M., Quaglieri, R., Zambonelli, F.: Making tuple spaces physical with RFID tags. In: Proceedings of the 2006 ACM symposium on Applied computing, pp. 434–439. ACM Press, New York (2006)

    Chapter  Google Scholar 

  10. Paar, C., Weimerskirch, A.: Embedded security in a pervasive world - Information Security Technical Report, vol. 12, pp. 155–161. Elsevier, Amsterdam (2007)

    Google Scholar 

  11. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez, J.M.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Psion Teklogix. WorkAbout Pro Second Generation Hand-Held Computer, http://www.psionteklogix.com/

  13. Roussos, G., Kostakos, V.: RFID in pervasive computing: State-of-the-art and outlook. Pervasive and Mobile Computing 5, 110–131 (2009)

    Article  Google Scholar 

  14. Sheng, Q.Z., Li, X., Zeadally, S.: Enabling Next-Generation RFID Applications: Solutions and Challenges. Computer 41(9), 21–28 (2008)

    Article  Google Scholar 

  15. Vega, V.: Common RFID Implementation Issues: 10 Considerations for Deployment, http://www.alientechnology.com/blog/

  16. Weiser, M.D.: The Computer for the 21st Century. Scientific American Special Issue on Communications, Computers, and Networks, 66–75 (1991)

    Google Scholar 

  17. Wikipedia. Radio-frequency identification, http://en.wikipedia.org/wiki/RFID

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Buzzi, M., Conti, M., Gregori, E. (2009). RFID-Based Identification: A Measurement Study. In: Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S. (eds) Mobile Lightweight Wireless Systems. Mobilight 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 13. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03819-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03819-8_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03818-1

  • Online ISBN: 978-3-642-03819-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics