Definition
Radio Frequency Identification (RFID) exists as a distinct subset of the larger family of automated identification technologies that includes things like bar codes, visual scanning devices and biometric readers. RFID is a means of automated identification that features electronic tags used both to store data and to act as transponders for sending the stored data as the payload in electromagnetic waves (radio waves) sent to detached listening devices (RFID readers) (Landt 2001; Wikipedia 2006). The tags can be affixed to animate or inanimate objects by a variety of methods and the readers that receive emissions from the tags translate the wave-embedded data into meaningful information (Fig. 1). They are a significant improvement over bar codes, for example, in that they do not require any human intervention. Currently deployed RFID systems provide real-time identity tracking...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bauer M, Fabian B, Fischmann M, Gürses S (2006) Emerging markets for RFID traces. arxiv preprint cs.CY/0606018
Bluestein G (2006) Companies track gridlock via cell phones. http://news.yahoo.com/s/ap/20061105/ap_on_hi_te/tracking_traffic;_ylt=AoQQdZOHq.vxPTOcxWTRCaDMWM0F;_ylu=X3oDMTA3ODdxdHBhBHNlYwM5NjQ-. Associated press. Retrieved 11 May 2006
Bowden L (1985) The story of IFF (identification friend or foe). IEEE Proc Part A: Phys Sci Meas Instrum Manag Educ 132(6):435–437
Fulton N (2006) High-tech cloning. http://blogs.reuters.com/2006/07/22/high-tech-cloning/. Reuters. Retrieved 10 Oct 2006
Juels A, Rivest RL, Szydlo M (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM conference on computer and communications security (CCS’03). ACM, New York, pp 103–111
Juels A, Pappu R (2003) Financial Cryptography. In: Squealing euros: privacy protection in RFID-enabled banknotes. Lecture notes in computer science, vol 2742. Springer, Berlin, pp 103–121
Koelle AR, Depp SW, Freyman RW (1975) Short-range radio-telemetry for electronic identification, using modulated RF backscatter. Proc IEEE 63(8):1260–1261
Landt J (2001) Shrouds of time: the history of RFID. http://www.aimglobal.org/technologies/rfid/resources/shrouds_of_time.pdf. Association for automatic identification and mobility. Retrieved 10 Oct 2006
Molnar D, Wagner D (2004) Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM conference on computer and communications security (CCS’04). ACM, New York, pp 210–219
O’Connor MC (2006) Gen 2 EPC protocol approved as ISO 18000-6C. http://www.rfidjournal.com/article/articleview/2481/1/1/. The RFID journal. Retrieved 11 May 2006
Riscure (2006) Privacy issues with new digital passport. http://www.riscure.com/2_news/passport.html. Riscure BV. Retrieved 11 Aug 2006
Sanjay E, Weis S, Weis SA, Engels DW (2002) RFID systems and security and privacy implications. In: Workshop on cryptographic hardware and embedded systems. Lecture notes in computer science, vol 2523. pp 454–470. http://citeseer.ist.psu.edu/sarma02rfid.html
Saxena M (2005) Does GIS and RFID amalgamation work? http://www.geoplace.com/uploads/FeatureArticle/0505tt.asp. Geoplace. Retrieved 10 Oct 2006
Shim R (2003) Wal-Mart to throw its weight behind RFID, http://news.com.com/2100-1022-1013767.html?tag=nl. CNET news. Retrieved 10 Oct 2006
Stockman H (1948) Communication by means of reflected power. Proc Inst Radio Engin 36:1196–1204
The British Broadcasting Corporation (2002) Stopping the book thieves. http://news.bbc.co.uk/2/hi/uk_news/1958424.stm. The BBC news. Retrieved 10 Oct 2006
The RFID Journal (2006) The history of RFID technology. http://www.rfidjournal.com/article/articleview/1338/1/129/. The RFID journal. Retrieved 10 Oct 2006
The RFID Journal (2006) The history of RFID technology. http://www.rfidjournal.com/article/articleview/1337/1/129/. The RFID journal. Retrieved 10 Dec 2006
The RFID Journal (2006) RFID system components and costs. http://www.rfidjournal.com/article/articleview/1336/1/129/. The RFID journal. Retrieved 10 Dec 2006
The RFID Gazette (2006) Wal-mart doubling RFID-enabled stores. http://www.rfidgazette.org/walmart/. The RFID journal. Retrieved 11 May 2006
The United States Navy (2006) Identification friend or foe. http://www.nrl.navy.mil/content.php?P=FRIENDFOE. United States naval research library. Retrieved 11 May 2006
Vernon F Jr (1952) Application of the microwave homodyne. Trans IRE Prof Group Antennas Propog 4(1):110–116
Vogt H (2002) Pervasive computing: first international conference proceedings. In: Efficient object identification with passive RFID tags. Lecture notes in computer science, vol 2414. Springer, London, pp 98
Walton CA (1971) US Patent 3,752,960. 27 Dec 1971
Wikipedia (2006) Radio frequency identification. http://en.wikipedia.org/w/index.php?title=Radio_Frequency_Identification&oldid=85251329. Wikipedia, the free encyclopedia. Retrieved 10 Oct 2006
Recommended Reading
Avoine G, Oechslin P (2005) Financial cryptography and data security. In: RFID traceability: a multilayer problem. Lecture notes in computer science, vol 3570. Springer, pp 125–140
Coroama V, Bohn J, Mattern F (2004) Living in a smart environment – implications for the coming ubiquitous information society, In: Proceedings of the international conference on systems, man and cybernetics (IEEE SMC 2004), pp 5633–5638. http://citeseer.ist.psu.edu/coroama04living.html
Davies N, Gellersen HW (2002) Beyond prototypes: challenges in deploying ubiquitous systems. IEEE Pervasive Comput 1(1):26–35
Indulska J, McFadden T, Kind M, Henricksen K (2003) Distributed applications and interoperable systems. In: Scalable location management for context-aware systems. Lecture notes in computer science, vol 2893. Springer, Paris, pp 224–235
Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. http://eprint.iacr.org/2006/137.pdf, Cryptology ePrint Archive: Retrieved 10 Oct 2006 (2006)
Newsweek (2006) An internet of things. http://www.msnbc.msn.com/id/3068871/. Newsweek. Retrieved 10 Oct 2006
Roberti M (2004) DOD releases final RFID policy. http://www.rfidjournal.com/article/articleview/1080/1/1/. The RFID journal. Retrieved 10 Nov 2006
Roussos G, Kourouthanasis P, Spinellis D, Gryazin E, Pryzbliski M, Kalpogiannis G, Giaglis G (2003) Systems architecture for pervasive retail. In: SAC’03: proceedings of the 2003 ACM symposium on applied computing. ACM, New York
Tenmoku R, Kanbara M, Yokoya N (2003) A wearable augmented reality system using positioning infrastructures and a pedometer. In: Proceedings of Seventh IEEE International Symposium on Wearable Computers 2003, New York, pp 110–117
Want R, Fishkin KP, Gujar A, Harrison BL (1999) Bridging physical and virtual worlds with electronic tags. In: CHI’99: proceedings of the SIGCHI conference on human factors in computing systems. ACM, New York
Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security in pervasive computing. In: Security and privacy aspects of low-cost radio frequency identification systems. Lecture notes in computer science, vol 2802. Springer, Berlin/New York, pp 201–212
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this entry
Cite this entry
Goshey, M. (2017). Radio Frequency Identification (RFID). In: Shekhar, S., Xiong, H., Zhou, X. (eds) Encyclopedia of GIS. Springer, Cham. https://doi.org/10.1007/978-3-319-17885-1_1071
Download citation
DOI: https://doi.org/10.1007/978-3-319-17885-1_1071
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17884-4
Online ISBN: 978-3-319-17885-1
eBook Packages: Computer ScienceReference Module Computer Science and Engineering