An introduction to RFID technology

@article{Want2006AnIT,
  title={An introduction to RFID technology},
  author={Roy Want},
  journal={IEEE Pervasive Computing},
  year={2006},
  volume={5},
  pages={25-33}
}
  • R. Want
  • Published 2006
  • Business
  • IEEE Pervasive Computing
In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance, and unlike earlier bar-code technology, it does so without requiring a line of sight. In this paper, the author introduces the principles of RFID, discusses its primary technologies and applications, and reviews the challenges organizations will face in deploying this… 

Figures from this paper

Custom RFID Location Simulator
TLDR
The author introduces the principles of RFID, discusses its primary technologies and applications, and describes its primary applications.
An Introduction to RFID Technology
TLDR
RFID technology is described and its applications in today’s world including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout are described.
Emerging Applications in RFID Technology
TLDR
The principles of RFID are introduced, the emerging applications of RFIDs are reviewed, and the latest technological developments in various industries have open new avenues to many new applications ofRFID.
A Review on RFID Technology and Applications
TLDR
This paper primarily focuses on RFID technology with its hardware components, basic system and applications.
Security on RFID technology
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Latest technologies have
RFID: Opportunities and Challenges
TLDR
This chapter introduces the basic concepts in RFID technologies and its applications, and discusses the characteristics of RFID data and overview the state-of-the-art research onRFID data management.
IMPLEMENTATION OF RFID TECHNOLOGY IN LIBRARY
TLDR
It is demonstrated that RFID can be used in libraries to ensure security and facilitate innovative services and highlights key issues that need to be addressed in order to achieve successful implementation of RFID in Libraries.
RFID Technology Principles, Advantages, Limitations & Its Applications
TLDR
Basic Principles of RFID technology along with its types are discussed and major current and envisaged fields of application, as well as advantages, and limitations of use are discussed.
Radio frequency identification
TLDR
The technology used by RFID systems are introduced, their use in several applications are illustrated, and problems of privacy and security when they are used are discussed.
A New RFID-USB Key
  • Yuli Fu, W. Liu
  • Computer Science
    2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID)
  • 2007
TLDR
This RFID-USB key can be used to establish some safe environments of authentication, identification and other applications feasibly and an implementation solution of the design is given in this paper.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 15 REFERENCES
Enabling ubiquitous sensing with RFID
  • R. Want
  • Computer Science
    Computer
  • 2004
Radio frequency identification has attracted considerable press attention in recent years, and for good reasons: RFID not only replaces traditional barcode technology, it also provides additional
RFID privacy: an overview of problems and proposed solutions
As organizations aggressively deploy radio frequency identification systems, activists are increasingly concerned about RFID's potential to invade user privacy. This overview highlights potential
The blocker tag: selective blocking of RFID tags for consumer privacy
TLDR
This work proposes the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing, and believes that this approach provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use ofRFID tags in consumer products.
The reader collision problem
  • D. Engels, S. Sarma
  • Computer Science
    IEEE International Conference on Systems, Man and Cybernetics
  • 2002
TLDR
The reader collision problem, the problem of allocating frequencies over time to radio frequency identification (RFID) tag readers such that their interference with one another is minimized, is introduced and several graph coloring formulations for variants of the problem are presented.
Bridging physical and virtual worlds with electronic tags
TLDR
A novel combination of inexpensive, unobtrusive and easy to use RFID tags, tag readers, portable computers and wireless networking demonstrates theility of invisibly, seamlessly and portably linking physical objects to networked electronic services and actions that arenaturally associated with their form.
People, Places, Things: Web Presence for the Real World
TLDR
The HP Labs' “Cooltown” project has been exploring opportunities through an infrastructure to support “web presence” for people, places and things, providing a model for supporting nomadic users without a central control point.
Bridging real and virtual worlds with electronic tags
TLDR
David Want developed the Active Badge, a system for automatically locating people in a building and led a project called PARCTab, one of the first context-aware computer systems.
PERVASIVE computing 33 the AUTHOR
  • PERVASIVE computing 33 the AUTHOR
  • 2006
The RFID Handbook
  • The RFID Handbook
  • 2003
An RFID Bill of Rights
  • Technology Rev
  • 2002
...
1
2
...