Data Architectures for RFID Transactions

We focus on the data models for storing the data generated by radio frequency identification (RFID) transactions and architectures for processing such data. We consider the supply chain comprised of the manufacturer, distributor, retailer, and the consumer. We discuss details of the data generated by RFID transactions and data models to store such data. Different organizations in the supply chain may use this data for different applications such as automatic product ordering, shelf replenishment, and product recall. We present models to anticipate the data requirements generated by RFID transactions and indicate how existing enterprise applications can be adapted to handle RFID data. The results presented in this paper will help a practitioner to 1) design and develop databases and applications for handling RFID data and 2) significantly reduce the storage requirements of RFID data. Using the data architectures, we discuss two supply chain applications-product recall and shelf replenishment-in detail. We present analytical models for the cost and time required for shelf replenishment in a retail store.

[1]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[3]  Gaetano Borriello RFID:TAGGING THE WORLD , 2005 .

[4]  David L. Brock The Physical Markup Language A Universal Language for Physical Objects , 2001 .

[5]  Roy Want,et al.  RFID Technology and Applications , 2006, IEEE Pervasive Computing.

[6]  Fusheng Wang,et al.  Temporal Management of RFID Data , 2005, VLDB.

[7]  Bruce Eckfeldt,et al.  What does RFID do for the consumer? , 2005, CACM.

[8]  Andrew S. Tanenbaum,et al.  Is your cat infected with a computer virus? , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[9]  Suresh Chalasani,et al.  Software architectures for e-commerce computing systems with external hosting , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.

[10]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[11]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[12]  Munir Mandviwalla,et al.  Integrating the Supply Chain with RFID: A Technical and Business Analysis , 2005, Commun. Assoc. Inf. Syst..

[13]  Jayavel Sounderpandian,et al.  RFID Tag Reader Designs for Retail Store Applications , 2005, AMCIS.

[14]  Sanjay E. Sarma Integrating RFID , 2004, ACM Queue.

[15]  Jayavel Sounderpandian,et al.  RFID for Retail Store Information Systems , 2004, AMCIS.