Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-xfwgj Total loading time: 0 Render date: 2024-07-07T17:28:54.081Z Has data issue: false hasContentIssue false

2 - RFID technology and its applications

Published online by Cambridge University Press:  02 November 2009

Stephen B. Miles
Affiliation:
Massachusetts Institute of Technology
Sanjay E. Sarma
Affiliation:
MIT Auto-ID Labs
John R. Williams
Affiliation:
MIT Auto-ID Labs
Get access

Summary

While the origins of RFID lie more than 50 years in the past, passive RFID technology is actually only in its infancy. This might seem an odd statement given that other technologies which have had a comparable history – computers for example – are considered mature. What makes RFID different?

The reason is that RFID, perhaps more than other technologies, is a systems technology that transcends the reader and the tag. Readers and tags are rarely, if ever, used alone. They are components of much larger systems, some of which they augment, and many of which they fundamentally enable. There are many other components to the system in which RFID participates, and, for RFID to really blossom, every component of the system must blossom. So every new advance in, say, battery technology or networking will launch a new wave of creativity and invention in RFID. This will create new applications. These new applications will increase the demand for products, further subsidizing research, and thus laying the seeds for the next invention and the next wave. It is my firm belief that RFID is currently only in its first wave.

EPC technology, developed first by the Auto-ID Center and then by EPCglobal, probably represents the state-of-the-art of the first wave of RFID. Today, EPC tags are being deployed worldwide in thousands of sites and billions of EPC tags have been read. Passive EPC tags are being used for intra- and inter-company applications on a scale perhaps never seen before.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Sarma, S., “A History of the EPC,” in RFID: Applications, Security, and Privacy, ed. Garfinkel, S. and Rosenberg, B., pp. 37–55 (Addison-Wesley Professional, New York, 2005).Google Scholar
,EPCglobal Inc., The EPCglobal Architecture Framework, 2005-07-01. Note: EPCglobal standards are available on-line (http://www.epcglobalinc.org/standards).
,EPCglobal Inc., EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–960 MHz Version 1.0.9 (2005).
,EPCglobal Inc., Low Level Reader Protocol (LLRP) Version 1.0 (2007).
,EPCglobal Inc., The Application Level Events (ALE) Specification Version 1.0 (2005).
,EPCglobal Inc., EPC Information Services (EPCIS) Version 1.0 Specification (2007).
Sarma, S. E., Towards the Five-Cent Tag (Auto-ID Center, Cambridge, MA, 2001) (http://www.autoidlabs.org/uploads/media/mit-autoid-wh-006.pdf).Google Scholar
Sarma, S. E., and Swamy, G., Manufacturing Cost Simulations for Low Cost RFID Systems (Auto-ID Center, Cambridge, MA, 2003) (http://www.autoidlabs.org/uploads/ media/MIT-AUTOID-WH017.pdf)Google Scholar
Roberti, M., “SmartCode offers 5-Cent EPC Tags,” RFID Journal (2006).Google Scholar
Lowe, F., Craig, G. S. W., Hadley, M. A., and Smith, J. S., Methods and Apparatus for Fluid Self Assembly, US patent 7172789 (2007).
Syed, A., Demarest, K., and Deavours, D. D., “Effects of Antenna Material on the Performance of UHF RFID Tags,” IEEE RFID 2007, March 26–28, 2007 (Grapevine, TX).
,Alien Technology CorporationRegistration Statement (Securities and Exchange Commission, Washington, DC, May 31, 2006) (http://ipo.nasdaq.com/edgar_conv_ html%5C2006%5C05%5C31%5C0001193125-06-121612.html).
Sarma, S. E., “Integrating RFID,” ACM Queue, 2(7):50–57 (2004).CrossRefGoogle Scholar
Sarma, S. E., Weis, S. A., and Engels, D. W., “RFID Systems and Security and Privacy Implications,” in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, pp. 454–470 (Springer, New York, 2002).Google Scholar
Feldhofer, M., Dominikus, S., and Wolkerstorfer, J., “Strong Authentication for RFID Systems using the AES Algorithm,” in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Boston, USA, August 11–13, 2004, pp. 357–370 (Springer, New York, 2004).Google Scholar
Poschmann, A., Leander, G., Schramm, K., and Paar, C., “DESL: An Efficient Block Cipher for Lightweight Cryptosystems,” in Workshop on RFID Security 2006, RFIDSEC '06, ed. Dominikus, S. (Graz, July 2006) (http://events.iaik.tugraz.at/RFIDSec06).Google Scholar
Juels, A., Rivest, R. L., and Szydlo, M., “The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,” in 8th ACM Conference on Computer and Communications Security, ed. Atluri, V., pp. 103–111 (ACM Press, New York, 2003).Google Scholar
Sarma, S., and Engels, D. W., Standardization Requirements within the RFID Class Structure Framework (Auto-ID Center, Cambridge, MA, 2005) (http://www.autoidlabs. org/uploads/media/AUTOIDLABS-WP-SWNET-011.pdf).Google Scholar
Nikitin, P. V., Rao, K. V. S., and Lazar, S., “An Overview of Near Field UHF RFID,” IEEE International Conference on RFID, pp. 167–174 (2007) (http://www.ee.washington.edu/faculty/nikitin_pavel/papers/RFID_2007.pdf).
Dacuña, J., and Pous, R., “Near-field UHF Tags Based on Metamaterials Concepts,” EU RFID Forum/RFID Academic Convocation (2007) (http://www.rfidconvocation.eu/Papers%20presented/Technical/Near-field%20UHF%20tags%20based%20on%20 metamaterials%20concepts.pdf).
,ISA, “Power Scavenging Sensors Shun Batteries” (2006) (http://www.isa.org/InTech Template.cfm?Section=Technology_Update1&template=/ContentManagement/Content Display.cfm&ContentID=54734).
Ehrenberg, I., Florkemeier, C., and Sarma, S., “Inventory Management with an RFID Equipped Mobile Robot,” Proceedings IEEE Case 2007 (Scottsdale, AZ, 2007).Google Scholar
Brynjolfsson, E., Austin Renshaw, A., and Alstyne, M., The Matrix of Change: A Tool for Business Process Reengineering (MIT Press, Cambridge, MA, 1996) (http://ccs.mit.edu/papers/CCSWP189/ccswp189.html).Google Scholar
Bamforth, R. (IT Analysis Communications Ltd.), “Business Processes, not Technology, Show Who's BOSS in RFID” (2004) (http://www.it-director.com/technology/mobile/content.php?cid=7441).
Christensen, C. M., The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail (Harvard Business School Press, Cambridge, MA, 1997).Google Scholar
Subirana, B., Sarma, S., Ferguson, C., Langford, S., Spears, M., Jastremski, G., Dubash, J., and Lee, R., EPC Changing the CPG Industry: Improving Retail Promotional Execution (EPC Global, Princeton, NJ, 2006) (http://autoid.mit.edu/documents/Promotional%20Execution%20Vignette%20 ApprovedV3.pdf).Google Scholar
Subirana, B., Sarma, S., Ferguson, C., Supple, J., Spears, M., Lee, R., Dubash, J., Mason, M., Langford, S., and Roth, L., EPC Changing the CPG Industry: Electronic Proof of Delivery (EPC Global, Princeton, NJ, 2006) (http://autoid.mit.edu/documents/ EPOD%20Vignette%20ApprovedV2.pdf).Google Scholar
Staake, T. R., Counterfeit Trade – Economics and Countermeasures, Ph.D. thesis No. 3362, University of St. Gallen (2007).
,IATA, RFID Trials for Baggage Tagging (IATA, Geneva, 2006) (http://www.iata.org/NR/rdonlyres/D319ADC0-ED5D-447E-9EEB-6CA1179C6BD9/0/RFIDtrialsfor baggagetagging.pdf).Google Scholar
“Years Before RFID Baggage Tracking Takes Off, RFID Update,” The RFID Industry Daily (November 6, 2006).

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×