Skip to main content
Log in

Ubiquitous RFID: Where are we?

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

After over a half century of development, radio-frequency identification (RFID) is beginning to move into mainstream applications for automatic identification. RFID is widely seen today as one of the key enabling technologies of the “Internet of Things”. However, many challenges still need to be addressed before we can fully benefit from this nascent and ubiquitous technology. In this paper, we present the state of the art of RFID technology and discuss the challenges and open issues in developing next generation RFID applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. There are about 50,000 billion things on the Earth.

  2. Ghost reads occur when an RFID reader “reads” an identifier that is not stored on any tag within the reader’s field.

  3. http://winmec.ucla.edu/.

  4. http://www.sap.com/platform/netweaver/autoidinfrastructure.epx.

  5. http://www.sybase.com/rfid.

References

  • Bornhövd, C., Lin, T., Haller, S., & Schaper, J. (2004). Integrating automatic data acquisition with business processes experiences with SAP’s auto-ID infrastructure. In Proc. of the 30th international conference on very large data bases (VLDB’04), Toronto, Canada.

  • Chawathe, S. S., Krishnamurthy, V., Ramachandran, S., & Sarma, S. (2004). Managing RFID data. In Proc. of the 30th international conference on very large data bases (VLDB’04), Toronto, Canada.

  • Cole, P. H. (2004). Fundamentals in radio frequency identification. http://autoidlabs.eleceng.adelaide.edu.au/Tutorial/SeattlePaper.doc Accessed 17 February 2009.

  • Diao, Y., Li, B., Liu, A., Peng, L., Sutton, C., Tran, T., et al. (2009). Capturing data uncertainty in high-volume stream processing. In Pro. of the 4th biennial conference on innovative data systems (CIDR’09), Asilomar, CA, USA.

  • EPCglobal (2005). EPC tag data standards version 1.1. http://www.epcglobalinc.org/standards Accessed 17 February 2009.

  • Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification. New York: Wiley.

    Google Scholar 

  • Franklin, M. J., Jeffery, S. R., Krishnamurthy, S., Reiss, F., Rizvi, S., Wu, E., et al. (2005). Design considerations for high fan-in systems: The HiFi approach. In Proc. of the second biennial conference on innovative data systems research (CIDR’05), Asilomar, CA, USA.

  • Gonzalez, H., Han, J., & Li, X. (2006). FlowCube: Constructing RFID FlowCubes for multi-dimensional analysis of commodity flows. In Proc. of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea.

  • Hu, Y., Sundara, S., Chorma, T., & Srinivasan, J. (2005). Supporting RFID-based item tracking applications in oracle DBMS using a Bitmap Datatype. In Proc. of the 31st international conference on very large data bases (VLDB’05), Trondheim, Norway.

  • ITU (2009). The internet of things: Executive summary. http://www.itu.int/osg/spu/publications/internetofthings/.

  • Jeffery, S. R., Franklin, M. J., & Garofalakis, M. (2008). An adaptive RFID middleware for supporting metaphysical data independence. The VLDB Journal, 17(2), 265–289.

    Article  Google Scholar 

  • Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24(2), 381–394.

    Article  Google Scholar 

  • Khoussainova, N., Balazinska, M., & Suciu, D. (2008). PEEX: Extracting probabilistic events from RFID data. In Pro. of the 24th international conference on data engineering (ICDE’08), Cancun, Mexico.

  • Nath, B., Reynolds, F., & Want, R. (2006). RFID technology and applications. IEEE Pervasive Computing, 7(1), 22–24.

    Article  Google Scholar 

  • O’Connor, M. C. (2005). U.S. bill includes RFID provision for pets. http://www.rfidjournal.com/article/articleview/1976/1/1/.

  • Prabhu, B. S., Su, X., Ramamurthy, H., Chu, C.-C., & Gadh, R. (2006). WinRFID - a middleware for the enablement of radio frequency identification (RFID)-based applications. In Mobile, wireless and sensor networks: Technology, applications and future directions, (pp. 313–336). New York: Wiley–IEEE.

    Google Scholar 

  • Rao, J., Doraiswamy, S., Thakkar, H., & Colby, L. (2006). A deferred cleansing approach for RFID data analytics. In Proc. of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea.

  • Roussos, G. (2008). Networked RFID: Systems, software and services. New York: Springer.

    Google Scholar 

  • Roussos, G., Duri, S. S., & Thompson, C. W. (2009). RFID meets the internet. IEEE Internet Computing, 13(1), 11–13.

    Article  Google Scholar 

  • Sheng, Q. Z., Li, X., & Zeadally, S. (2008). Enabling next-generation RFID applications: Solutions and challenges. IEEE Computer, 41(9), 21–28.

    Google Scholar 

  • Wang, F., Liu, S., & Liu, P. (2009). Complex RFID event processing. The VLDB Journal (in press).

  • Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 94–104.

    Article  Google Scholar 

  • Welbourne, E., Battle, L., Cole, G., Gould, K., Rector, K., Raymer, S., et al. (2009). Building the internet of things using RFID: The RFID ecosystem experience. IEEE Internet Computing, 13(3), 48–55.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quan Z. Sheng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sheng, Q.Z., Zeadally, S., Luo, Z. et al. Ubiquitous RFID: Where are we?. Inf Syst Front 12, 485–490 (2010). https://doi.org/10.1007/s10796-009-9212-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-009-9212-x

Keywords

Navigation