Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure.infrastructure is one such technology which enables the Internet of things.When the RFID readers abides by appropriate communication protocols and are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT).
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure.infrastructure is one such technology which enables the Internet of things.When the RFID readers abides by appropriate communication protocols and are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT).
There is an undeniable trend to implement more and more sensors so that the data is then sent to the IoT to be processed.
The issue with this data source is that sensors and actuators need a power source to operate.
The quest for autonomous sensors to be deployed massively is on the rise. Energy harvesting sources such as solar or vibrations are some of the lines but they require stable set-ups which are generally far away from real world applications.
Learn how RFID can help by harvesting energy from the RF field created by an RFID reader.
Battery-free sensors that are ready for a poll from RFID readers as a source for the IoT.
Rfid technology next generation application solutionsashtopustech
Astopous Technologies is one of the fastest growing identification & security solutions providers .We have best & high performance active and passive RFID technology solutions,for live tracking vehicles and student care in school bus,live stock and health care people tracking ,retail and assets mgmt.
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.
Revolutionizing Asset Tracking with RFID and IoT.pdfriyak40
RFID and IoT tech have transformed asset tracking, boosting accuracy and efficiency. Businesses across industries benefit from real-time visibility, cost savings, and enhanced security. Embracing these innovations helps companies thrive in a future of precise, efficient asset management.
There is an undeniable trend to implement more and more sensors so that the data is then sent to the IoT to be processed.
The issue with this data source is that sensors and actuators need a power source to operate.
The quest for autonomous sensors to be deployed massively is on the rise. Energy harvesting sources such as solar or vibrations are some of the lines but they require stable set-ups which are generally far away from real world applications.
Learn how RFID can help by harvesting energy from the RF field created by an RFID reader.
Battery-free sensors that are ready for a poll from RFID readers as a source for the IoT.
Rfid technology next generation application solutionsashtopustech
Astopous Technologies is one of the fastest growing identification & security solutions providers .We have best & high performance active and passive RFID technology solutions,for live tracking vehicles and student care in school bus,live stock and health care people tracking ,retail and assets mgmt.
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.
Revolutionizing Asset Tracking with RFID and IoT.pdfriyak40
RFID and IoT tech have transformed asset tracking, boosting accuracy and efficiency. Businesses across industries benefit from real-time visibility, cost savings, and enhanced security. Embracing these innovations helps companies thrive in a future of precise, efficient asset management.
Radio Frequency Identification RFID is a programmed innovation and helps machines or PCs to distinguish objects, record metadata or control singular focus through radio waves. Associating RFID reader to the terminal of Internet, the reader can distinguish, track and screen the articles appended with labels all inclusive, consequently, and progressively, if necessary. This is the supposed Internet of Things IOT . Radio Frequency Identification RFID is an innovation that utilizes correspondence through electromagnetic waves to trade information between a terminal and an electronic label joined to an article, with the end goal of ID and tracking Sapna Yadav | Pratibha Jha ""RFID Technology: An Overview"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23247.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23247/rfid-technology-an-overview/sapna-yadav
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
International Journal of Business and Management Invention (IJBMI) inventionjournals
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGcscpconf
As a core component of the Internet of Things technology (IoT), Radio Frequency Identification
(RFID) tagged items will add billions, perhaps trillions, of objects to the Internet. As a result,
uses of Ultra High Frequency (UHF) RFID sensing become massive ranging from logistics,
retail and healthcare to homes and even entire smart cities. Under this trend, mobile UHF
RFID scanners also need to evolve. Consumers will interact with their surroundings via tagged
RFID items taking full advantage of the advancing IoT. For mainstream consumer smartphones,
unfortunately, UHF RFID connectivity has yet to be fully integrated. The major challenges are:
1) the compatibility of an RFID reader module to the host platform, 2) Radio Frequency (RF)
signal coexistence interference between the RFID reader and other sensor/RF technologies, and
3) the unacceptable high current drain caused by RFID active scanning. In this paper, we
present a design and implementation of a novel modular UHF RFID scanning subsystem, the
UHF RFID reader module, on a Motorola Moto-Z smartphone. This module is fully integrated
with an Android 7.0 Operating System (OS) and directly interconnects with the low-level
smartphone hardware and software framework. With the new antenna design and the signal
spectrum analysis, we guarantee the RF isolation of the Mod with the smartphone’s other native
wireless components and sensors. Our design and implementation also address the current
drain issue and extends the battery life of Moto-Z smartphone up to 30.4 hours with IoT RFID
scanning.
Internet of Things (IoT) Applicability in a Metropolitan CityEswar Publications
Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several
technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically
feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a
concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in
supporting the metropolitan needs in San Antonio, Texas.
What is the role of RFID chips in logistics What is the role o.pdfarihantcommunication
What is the role of RFID chips in logistics?
What is the role of RFID chips in logistics?
Solution
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and
track tags attached to objects. The tags contain electronically stored information. Passive tags
collect energy from a nearby RFID reader\'s interrogating radio waves. Active tags have a local
power source such as a battery and may operate at hundreds of meters from the RFID reader.
Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).[1]
The emergence of RFID (Radio Frequency Identification) technology has been greatly increased
efficiency in the production process management, material flow management, logistics and
transport, retail and distribution and other fields of the national economy industries, including
electronic information industry. RFID may eventually replace the ubiquitous bar code in the
future and become the main technology in logistics and supply chain management field
RFID in Logistics Management
Logistics management involves the efficient control of some or all of the supply chain functions,
including:
– Product research and development
– Sourcing and purchasing
– Manufacturing
– Production planning
– Sales, marketing, and forecasting
– Inventory management
– Cross-docking and flow-through
– Customer service
– Transportation
– Freight payment
– Information reporting
Using RFID logistics tracking has helped many organizations solve the main challenge at every
node in their supply chains: the lack of visibility of logistics data. RFID technology is a powerful
solution that improves asset visibility, data quality, inventory management, and interoperability
in an end-to-end integrated supply chain. In fact, the U.S. Department of Defense (DoD) issued a
mandate in 2005 that requires all of their suppliers to use RFID in marking any items that are
sold to the DoD. The need for this mandate arose from decades of logistical challenges faced by
the military with regard to the supply chain.
RFID has proven to alleviate various logistical problems associated with the DoD supply chain.
RFID technology, in combination with the Internet, allows the DoD to disseminate accurate,
real-time data to commanders worldwide so that assets can be easily located and used according
to the Department’s highest priorities..
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...Kumar Satyam
According to TechSci Research report, “India Orthopedic Devices Market -Industry Size, Share, Trends, Competition Forecast & Opportunities, 2030”, the India Orthopedic Devices Market stood at USD 1,280.54 Million in 2024 and is anticipated to grow with a CAGR of 7.84% in the forecast period, 2026-2030F. The India Orthopedic Devices Market is being driven by several factors. The most prominent ones include an increase in the elderly population, who are more prone to orthopedic conditions such as osteoporosis and arthritis. Moreover, the rise in sports injuries and road accidents are also contributing to the demand for orthopedic devices. Advances in technology and the introduction of innovative implants and prosthetics have further propelled the market growth. Additionally, government initiatives aimed at improving healthcare infrastructure and the increasing prevalence of lifestyle diseases have led to an upward trend in orthopedic surgeries, thereby fueling the market demand for these devices.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
This article provides a comprehensive guide on how to
effectively manage the convert Accpac to QuickBooks , with a particular focus on utilizing online accounting services to streamline the process.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
Explore the world of the Taurus zodiac sign. Learn about their stability, determination, and appreciation for beauty. Discover how Taureans' grounded nature and hardworking mindset define their unique personality.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Premium MEAN Stack Development Solutions for Modern Businesses
3.[13 21]framework of smart mobile rfid networks
1. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
13 | P a g e
www.iiste.org
Framework of Smart Mobile RFID Networks
Pradeep Kumar
ECE Deptt. , Vidya Vihar Institute of Technology
Maranga, Purnea, Bihar-854301, India,Tel: +917870248311
Web:www.pradeepjec.page4.me, Email: pra_deep_jec@yahoo.co.in
Abstract
Basically RFID (radio-frequency identification) is a wireless communication technology within the L1 (Layer
1, the physical layer of the OSI 7-layer Reference Model) and L2 scopes between RFID tag and reader. The
RFID reader reads the code in the RFID tag and interprets it by communicating with the IS(information
services) server via a proper communication network. This is the typical architecture defined by EPC
(electronic product Code)global. RFID networks need to provide value added services in order to give better
visibility to inventory movement across supply chain or closed loop applications like Asset tracking or Work In
Progress tracking. The RFID reader can be stationary or mobile. A mobile RFID reader affords more
applications than the stationary one. Mobile RFID is a newly emerging technology which uses the mobile
phone as an RFID reader with a wireless technology and provides new valuable services to the user by
integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless
internet. The mobile RFID enables business to provide new services to mobile customers by securing services
and transactions from the end-user to a company's existing e-commerce and IT systems. In this paper, I describe
about the core components of mobile RFID, advantages and its applications in scenario of smart networks.
Although there are several types of mobile RFID readers in the market, I focused on mobile RFID technology
that has several positive features including security, network architecture, operation scenario, and code
resolution mechanism.
Keywords: EPC network, RFID, Mobile RFID, Smart RFID network
1. Introduction
RFID (Radio Frequency IDentification) has been recognized as a key technology for ubiquitous networks,
which in turn is defined as an environment in which information can be acquired anytime and anywhere through
network access service . Currently, RFID technologies consider the environment in which RFID tags are mobile
and RFID readers are stationary. However, in the future, RFID technologies could consider an environment in
which RFID tags are stationary and readers are mobile. RFID based on mobile telecommunications services
could be the best example of this kind of usage. RFID-based mobile telecommunications services could be
defined as services which provide information access through the telecommunication network by reading RFID
tags on certain objects using an RFID reader in mobile terminals such as cell phones. RFID tags play an
important role as a bridge between offline objects and online information. The RFID enabled cell phone was
introduced by Nokia in 2004.
In these domains, RFID technology holds the promise to eliminate many existing business problems by bridging
the economically costly gap between the virtual world of IT systems and the real world of products and
logistical units. Common benefits include more efficient material handling processes, elimination of manual
inventory counts, and the automatic detection of empty shelves and expired products in retail stores. RFID
technology has a number of advantages over other identification technologies. It does not require line-of-sight
alignment, multiple tags can be identified almost simultaneously, and the tags do not destroy the integrity or
aesthetics of the original object. The location of tagged objects can thus be monitored automatically and
continuously. The EPC Network, originally proposed by the Auto-ID Center and further developed by the
members of EPC global, is currently one of the predominant standardization effort of the RFID community.
RFID networks need to provide value added services in order to give better visibility to inventory movement
across supply chain or closed loop applications like Asset tracking or Work In Progress tracking.
In traditional RFID applications, such as access control, there was little need for RFID middleware because the
RFID readers were not networked and the RFID data were only consumed by a single application. In novel
application domains, such as supply chain management and logistics, there is no longer a 1-to-1 relationship
2. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
14 | P a g e
www.iiste.org
between reader and application instance, however. In these domains, many readers distributed across factories,
warehouses, and distribution centers capture RFID data that need to be disseminated to a variety of applications.
This introduces the need for an RFID infrastructure that hides proprietary reader device interfaces, provides
configuration and system management of reader devices, and filters and aggregates the captured RFID data.
This frees applications from the need of maintaining connections to individual reader devices.
The rest of this paper is structured as follows. In Section 2,I give detail about the EPC networks. Section 3
provides a brief overview of RFID technology and outlines the constraints imposed by the characteristics of
RFID. In Section 4, I describe about smart RFID networks. I continue by presenting some sample applications
and advantages of Mobile RFID in Section 5 and in section 6 conclusions are given.
2. EPC Network
A typical RFID network model may refer to the network architecture of EPC global as shown in figure 1 where
the network entities are RFID tags, readers, ALE host, event management server called EPC-IS, EPC-IS service
location server called EPC-DS, and code resolution server called ONS. Business application servers such as
ERP, CRM, SCM, etc. are out of scope because they stay at back-end and are associated indirectly with an RFID
network. Such a network model is for B2B applications.
Fig. 1. EPC Network’s Configuration.
3.RFID
Radio Frequency Identification (RFID) is an automatic identification technology which allows
remote interrogation of ID data on RFID tags using radio frequency as a means of wireless communication
between tagged objects and RFID readers.
3. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
15 | P a g e
www.iiste.org
Fig. 2. EPC Network roles and interfaces
Fig.3.A simple RFID system
4. Smart RFID Networks
RFID technology leads us to the world of connected objects. It enables the inventory to speak for its presence
and drives the processes as opposed to processes driving the inventory. This paradigm shift opens up new
avenues and new approach to achieve process efficiency, better inventory management and improved business
intelligence.
RFID Networks enable businesses to build Event Driven Applications and react to real time information. If
4. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
16 | P a g e
www.iiste.org
business processes start working with the real time events the enterprises can become more efficient and lean.
To have a successful RFID implementation and reap true benefits, businesses have to
- Identify the business goals
- Build RFID networks that give them the visibility to “assets” and “inventory” and achieve business goals
- Collect and convert the RFID data into “actions” and perhaps in real time.
An RFID network generates a continuous stream of data and because of its sheer volume it needs to be handled
very carefully. In the world of connected objects, the goal is to have efficient RFID Networks that give the right
information to the right application at the right time (3R’s) and make Enterprise Management Systems Event
Driven.
• Data becomes valuable information if it is relevant to the recipient. In the application-driven RFID
Network, applications define the rules for processing RFID reads. The network layer executes those
rules for organizing the RFID data, and then delivers quality information to its subscribers. The most
common example would be a RFID Network providing a location service. Anytime if an application
wants to know the last location of an EPC, it can query the RFID network to get one. This
service could help in recall management or just in time replenishment if one knows how far the
inventory is reached in its supply chain.
Fig.4. General Topology of RFID Network
• Similarly “Smart” RFID Network can provide other services such as dwelling times at a particular
location or transit times between two locations. RFID networks can also provide complex services for
instance “no product received (at a location)” or “no product stocked”. This service can help in
monitoring promotion execution in the retail supply chain or ensure customer satisfaction in any
Supply Chain. Another example of complex service would be to push alerts out to subscribers when the
inventory is aging or is already reached to the stale status.
5. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
17 | P a g e
www.iiste.org
5. Mobile RFID
5.1. Mobile RFID Technology
RFID is expected to be the base technology for the ubiquitous network or computing, and is likely to be
associated with other technologies such as MEMS (Micro Electro Mechanical Systems), Telematics, and
Sensors. Meanwhile, it is widely accepted that Korea is one of the countries that has established a robust mobile
telecommunication networks in the world. In particular, about 78% of the population uses mobile phones and
more than 95% of those phones have Internet-enabled functions. Currently, Korea has recognized the potential
of RFID technology and has tried to converge it with mobile phone. Mobile phones integrated with RFID can be
expected to create new markets and provide new services to end-users, and as such will be considered as an
exemplary technology fusion. Furthermore, it may evolve its particular functions as an end user terminal device,
or a u-device (Ubiquitous device), in the world of ubiquitous information technology. Actually, the mobile
RFID phone may represent two types of mobile phone device; one is the RFID-reader-equipped mobile phone,
and the other is the RFID-tag-attached mobile phone. Each type of mobile phone has different application
domains: On the one hand, for example, the RFID-tag-attached type can be used as a device for payment, entry
control, and identity authentication, and the main feature of this application stems from the fact that RFID
readers exist in the fixed position and recognize each phone, giving the user specific services like door opening;
on the other hand, the RFID reader equipped mobile phone, to which Korea is currently paying considerable
attention, can be utilized to provide end-users with detailed information about the tagged object through
accessing the mobile wireless network.
The basic communication scenario for mobile RFID service is as follows: First, a mobile RFID phone reads the
RFID tags on an object and fetches the code stored in it . Second, a mobile RFID phone should execute the code
resolution with which the mobile RFID phone obtains the location of the remote server that provides
information on the product or an adequate mobile service. The code resolution protocol is identical with the
DNS protocol. The ODS server in figure 5 as a DNS server and is similar to EPCglobal’s ONS (Object Name
Service) server. The mobile RFID phone directs queries on the location of the server with a code to the ODS
server, then the ODS server replies by giving the location of the server. Finally, the mobile RFID phone requests
contents or a service from the designated server whose location has been acquired from the ODS server.
Fig. 5. Detailed Mobile RFID’s Code Resolution Process.
Figure 5 illustrates the detailed code resolution process. The code store in the RFID tag is formed of a bit string
such as ‘01001101110…’ and this bit string should be translated into a meaningful form such as EPC, mCode
(Mobile RFID Code), uCode, ISO Code, or something else . Given that ‘1.2.3.4’ is obtained from a bit string
translation and that ‘1.2.3.4’ should be converted into a URN (Uniform Resource Name) form as
6. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
18 | P a g e
www.iiste.org
‘urn:mcode:cb:1.2.3.4’ , the remaining code resolution process is the same as the DNS reverse
lookup process. The mobile RFID reader requests contents retrieval after code resolution. The RFID application
in the mobile RFID phone requests contents from the WAP or web server returned by the code resolution.
5.2 Mobile RFID services
For a long time, RFID has stayed in B2B business fields such as transport and logistics, supply chain
management, manufacturing and processing, and inventory control due to various problems such as still
expensive RFID tag price, lack of 100% reading accuracy, limited operation conditions, etc.
Fig.6. Use cases of mobile RFID applications and services
The model of the mobile RFID service as shown in figure 2 defines three additional entities and two
relationships compared to those defined in the RFID tag, the RFID access network, RFID reader, the
relationship between the RFID tag and RFID reader, and the relationship between the RFID reader and the
application server.
Fig. 7. Model of Mobile RFID Data Communication.
5.3 Advantages
Today we spend significant time stopping to scan bar codes. Collectively, over time, we introduce latency in the
speed and efficiency with which we are able to move products through the supply chain. If you can remove bar
7. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
19 | P a g e
www.iiste.org
code scanning from an operator’s activities and collect the data through RFID, operators become more efficient
at moving material and a wealth of efficiencies can be achieved. What this ultimately means is that if you are
going to implement RFID, which represents some incremental costs in terms of product tagging, you’ll need to
modify your processes to optimize the benefits of RFID. This is not a new concept. We changed processes in
warehousing and distribution centers when we moved from paper pick lists to real-time RF based data collection
using bar code technology. We will change the way we do things again, because RFID allows us to automate
data collection and get better utilization of our facilities, our labor, and achieve better velocity through our
warehousing operations. And again the benefits of data collection automation are maximized by moving the
tagging and implementation of RFID upstream. This moves the costs of tagging products to points upstream
where greater efficiencies of tag programming and application can be realized. It also reduces costs associated
with segregating tagged versus non-tagged products. Over the past several years we’ve done a deep
investigation into the current practices within warehousing and distribution to look at how these practices would
benefit from the combination of a mobile RFID solution and tagging “upstream”. See below in fig.8.
Fig.8. Combination of a mobile RFID solution and tagging “upstream”.
5.4 Mobile RFID – Shipping & Receiving
If you look specifically at shipping and receiving, these are really just specialized instances of a warehouse
move. You still have the same basic data content that you need to capture - “what have I got” and “where is it
going/where is it coming from”? Today that is generally done by scanning a bar code on the pallet load that
represents the load itself. The location is captured by scanning a bar code over the dock door as you go in or out.
The earliest RFID implementations have all focused on a fixed reader placed at the dock door. You capture the
“what is it” by reading the content of the pallet for as many tags as you can capture via the RFID reader as the
forklift takes the load through the portal. The location element is implied by the network address of the fixed
reader itself. If we look at an alternative solution based on a forklift mounted RFID reader you can still capture
the same two data elements; the ”what is it” by reading the pallet via the forklift mounted RFID reader and the
location by use of a location tag placed in the dock door vicinity. A major advantage of the mobile solution is
economical. In a typical warehouse you’d have around 100 dock doors, and those dock doors would be serviced
by as few as 10 to 20 different forklifts. In the fixed RFID portal world you’d need 100 fixed RFID readers. In
the mobile RFID world you’d only need 10 to 20 mobile RFID readers – a much more economical solution.
Furthermore, the mobile RFID readers can be leveraged in other internal warehouse moves where it can
generate further improvements in visibility, efficiency and velocity.
5.5 Mobile RFID – Case Picking
Case picking is another instance where a mobile RFID solution is beneficial. Today, the bar code for the pallet is
available to the forklift operator on a spool. The operator scans the bar code for the pallet and is given his first
pick location. The operator goes to it and scans a location or a pallet tag that he is picking from. That validates
to the system that he is picking the right product. He is told to pick six cases and put them on the pallet. We
8. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
20 | P a g e
www.iiste.org
hope he has picked six and not five. He hops in the forklift and is assigned the next location and repeats the
process until done. At that point the pallet is taken to a shrink wrap machine and in many cases to an audit
station where they check the correct count and SKU for that particular pallet load. At best, if the operator got the
count and SKU’s correct for that pallet load, you now have a redundant activity at an incremental expense. If he
did not get it right, you have to break down the pallet and correct it. The cost of recovery is very high.
Tag readers interrogate tags for their data through an RF interface. To provide additional functionality, readers
may contain internal storage, processing power connections to back-end databases. Computations, such as
cryptographic calculations, may be carried out by the reader on behalf of a tag. The channel from reader-to-tag
may be referred to as the forward channel. Similarly, the tagto- reader channel may be referred to as the
backward channel. In practice, readers might be handheld devices or incorporated into a fixed location. One
application of a fixed reader is a 'smart shelf'. Smart shelves could detect when items are added or removed, and
would play a key role in a real-time inventory control system. Fundamentally, readers are quite simple devices
and could be incorporated into mobile devices like cellular phones or PDAs. A standalone, hand-held reader
with a wireless connection to a back-end database may cost around US $100-200. If RFID tags become
ubiquitous in consumer items, tag reading may become a desirable feature on consumer electronics .
Fig. 9. The mobile RFID Reader.
6. Conclusions
As mentioned above, mobile RFID is an emergent and promising application that uses RFID technology.
However, the mobility of reader and its service model – which differs from the RFID service in the retail and
supply chain – will give rise to additional security threats. To address these issues, while both are important
tools, neither killing nor recoding is the final answer in RFID privacy. The killing alone is not enough, and new
mechanisms are needed for building privacy-preserving RFID architectures. In this chapter, we have tried to
introduce the concept of mobile RFID and expose some of the additional security threats caused by it. The
frequency band to support the air protocol is allocated from 908.5MHz to 914MHz in Korea in order to comply
with ISO 18000-6 for air interface communications at 860MHz to 960MHz. We also describe a way of
incorporating the new technology to work with cell phones in particular, both as an external security reading
device (replacing 900MHz) and as an added security service to manage all RFID mobile device mediums. With
this purpose in mind, the application areas of this service platform are also briefly presented. By doing so,
customized security and privacy protection can be achieved. In this regard, the suggested technique is an
effective solution for security and privacy protection in a networked mobile RFID service system.
Acknowledgment
The author would like to thank Miss K.Jayanthi and Dr.Abhay Kumar for their insightful advice and guidance,
and unknown reviewers for their useful remarks and suggestions.
References
9. Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
21 | P a g e
www.iiste.org
Architecture Review Committee, EPCglobal, Lawrenceville, NJ, “The EPCglobal architecture framework,”
2005. [Online]. Available: www. epcglobalinc.org
Baehyo Park, Seoklae Lee, and Heugyoul Youm. A proposal for personal identifier management framework on
the Internet. ITU-T, COM17-D165, (2006).
Brusey.J, C. Floerkemeier, M. Harrison, and M. Fletcher, “Reasoning about uncertainty in location identification
with RFID,” presented at the Workshop Reason. With Uncertainty Robot. IJCAI, Acapulco, Mexico, 2003.
EPCglobal, Lawrenceville, NJ, “Reader protocol standard, version 1.1,” 2006. [Online]. Available:
www.epcglobalinc.org
EPCglobal, Lawrenceville, NJ, “The application level events (ALE) specification, version 1.0,” 2005 [Online].
Available: www.epcglobalinc. org
EPCglobal, Lawrenceville, NJ, “EPC information services (EPCIS) version 1.0, specification,” 2007. [Online].
Available: www.epcglobalinc.org
EPCglobal, Lawrenceville, NJ, “Class 1 generation 2 UHF air interface protocol standard version 1.0.9,” 2005
[Online]. Available: www.epcglobalinc.Org
European Telecommunications Standards Institute (ETSI), Sophia Antipolis, France, “Electromagnetic
compatibility and radio spectrum matters (ERM); Radio frequency identification equipment operating in the
band 865 MHz to 868 MHz with power levels up to 2 W,” Tech. Rep. EN 302 208-1 V1.1.1, 2004 [Online].
Available: www.etsi.org
Falck.G, “The newRFID standard in Europe,” RFID J., 2004. [Online]. Available: www.rfidjournal.com
Floerkemeier.C, R. Schneider, and M. Langheinrich, Scanning With a Purpose—Supporting the Fair Information
Principles in RFID Protocols,
H. Murakami, H. Nakashima, H. Tokuda, and M. Yasumura, Eds. Berlin, Germany: Springer-Verlag, June 2005,
vol. 3598, pp. 214–231.
International Organization for Standardization, Geneva, Switzerland, “Information technology—Radio
frequency identification for item management—Part 6: Parameters for air interface communications at 860 MHz
to 960 MHz,” 2004.
Jongsuk Chae, and Sewon Oh, Information Report on Mobile RFID in Korea. ISO/IEC JTC1/SC 31/WG4
N0922, Information paper, ISO/IEC JTC1 SC31 WG4 SG 5, (2005).
Karthaus.U and M. Fischer, “Fully integrated passive UHF RFID transponder IC with 16.7-_W minimum RF
input power,” IEEE J. Solid-State Circuits, vol. 38, no. 10, pp. 1602–1608, Oct. 2003.
Klaus Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and
Identification, Wiley (2003).
Langheinrich.M, “RFID and Privacy,” in Security, Privacy and Trust in Modern Data Management,M. Petkovic
and W. Jonker, Eds. New York: Springer-Verlag, 2006.
Leong.K.S, M. L. Ng, and P. H. Cole, “The reader collision problem in RFID systems,” in Proc. IEEE Int.
Symp. Microw., Antenna, Propag. EMC Technol. Wireless Commun. (MAPE), 2005, pp. 658–661.
Mitsuo Tsukada, and Atsunobu Narita, Development models of network aspects of identification systems
(including RFID) (NID) and proposal on approach for the standardization, ITU-T, JCA-NID Document 2006-I-
014, (2006).
Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, WIPI Mobile Platform with Secure
Service for Mobile RFID Network Environment. Lecture Notes in Computer Science, vol.3842, Springer-
Verlag, 741 (2006).
Ohkubo.M, K. Suzuki, and S. Kinoshita, Cryptographic Approach to ‘Privacy-Friendly’ Tags, RFID Privacy
Workshop, (2003).
Sangkeun Yoo, Mobile RFID Activities in Korea, Contribution Paper of the APT Standardization Program,
(2005).
Sarma.S.E, S. A. Weis, and D.W. Engels, RFID systems, Security and privacy implications. Technical Report
MIT-AUTOID-WH-014, AutoID Center, MIT, (2002).
Sullivan L., Middleware enables RFID tests, Information week, no.991, (2004).
Tsuji T., Kouno S., Noguchi J., Iguchi M., Misu N., and Kawamura M., Asset management solution based on
RFID, NEC Journal of Advanced Technology, vol.1, no.3, 188 (2004).
Weis, S. et al, Security and Privacy Aspects of Low-Cost Radio Frequency identification Systems, First
International Conference on Security in Pervasive Computing, (2003).
Wung Park, and Byoungnam Lee, Proposal for participating in the Correspondence Group on RFID in ITU-T,
Information Paper, ASTAP Forum, (2004).
Yongwoon Kim, and Noboru Koshizuka. Review report of Standardization Issues on Network
Aspects of Identification including RFID, ITU-T, Paper TD315, (2006).