Managing RFID data in supply chains

The implementation of RFID leads to improved visibility in supply chains. However, as a consequence of the increased data collection and enhanced data granularity, supply chain participants have to deal with new data management challenges. In this paper, we give an overview of the current challenges and solution proposals in the area of data collection and transformation, data organisation and data security. We also identify further research requirements.

[1]  David C. Yen,et al.  Taxonomy and survey of RFID anti-collision protocols , 2006, Comput. Commun..

[2]  Paul Müller,et al.  Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.

[3]  Nitin H. Vaidya,et al.  RFID-based networks: exploiting diversity and redundancy , 2008, MOCO.

[4]  Gustavo Alonso,et al.  Declarative Support for Sensor Data Cleaning , 2006, Pervasive.

[5]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[6]  Munir Mandviwalla,et al.  Integrating the Supply Chain with RFID: A Technical and Business Analysis , 2005, Commun. Assoc. Inf. Syst..

[7]  E. W. Schuster,et al.  Global RFID: The Value of the EPCglobal Network for Supply Chain Management , 2007 .

[8]  Elizabeth Chang,et al.  Tamper Detection for Ubiquitous RFID-Enabled Supply Chain , 2005, CIS.

[9]  Craig K. Harmon,et al.  The necessity for a uniform organisation of User Memory in RFID , 2006, Int. J. Radio Freq. Identif. Technol. Appl..

[10]  Xue Li,et al.  RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.

[11]  Matthias Schumann,et al.  Data-on-Network vs. Data-on-Tag: Managing Data in Complex RFID Environments , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[12]  Holger Ziekow,et al.  RFID: A 7-Point Plan to Ensure Privacy , 2005, ECIS.

[13]  Katina Michael,et al.  The pros and cons of RFID in supply chain management , 2005, International Conference on Mobile Business (ICMB'05).

[14]  Kelly T. Slaughter,et al.  The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[15]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[16]  Tao Hu,et al.  Radio Frequency Identification: The Initiator of a Domino Effect , 2006 .

[17]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[18]  Christian Floerkemeier,et al.  Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.

[19]  Elgar Fleisch,et al.  The Business Value of Ubiquitous Computing Technologies , 2006 .

[20]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.

[21]  Christian Floerkemeier,et al.  RFID middleware design: addressing application requirements and RFID constraints , 2005, sOc-EUSAI '05.

[22]  Youngil Kim,et al.  RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation , 2005, OTM Conferences.

[23]  Christian Floerkemeier,et al.  Comparison of transmission schemes for framed ALOHA based RFID protocols , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[24]  Samir Ranjan Das,et al.  Collision avoidance in a dense RFID network , 2006, WiNTECH.

[25]  Wonjun Lee,et al.  Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.

[26]  Xu Huang,et al.  An Improved ALOHA Algorithm for RFID Tag Identification , 2006, KES.

[27]  Deborah J. Armstrong,et al.  RFID Assimilation Hierarchy , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[28]  Jennifer Widom,et al.  Models and issues in data stream systems , 2002, PODS.

[29]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[30]  Diego Klabjan,et al.  Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[31]  Tao Lin,et al.  Integrating Automatic Data Acquisition with Business Processes - Experiences with SAP's Auto-ID Infrastructure , 2004, VLDB.

[32]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[33]  Sarah Spiekermann,et al.  Maintaining Privacy in Rfid Enabled Environments - Proposal for a Disable-Model , 2005 .

[34]  Ying Hu,et al.  Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype , 2005, VLDB.

[35]  Sudarshan S. Chawathe,et al.  Managing RFID Data , 2004, VLDB.

[36]  Bing Jiang,et al.  Some Methods for Privacy in RFID Communication , 2004, ESAS.

[37]  Florian Michahelles,et al.  An overview of EPC technology , 2006 .

[38]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[39]  Sanjay E. Sarma Integrating RFID , 2004, ACM Queue.

[40]  Jun Rao,et al.  A deferred cleansing method for RFID data analytics , 2006, VLDB.

[41]  Marc Langheinrich,et al.  Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.

[42]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[43]  Gustavo Alonso,et al.  A Pipelined Framework for Online Cleaning of Sensor Data Streams , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[44]  Robert F. Otondo,et al.  Information Systems and Health Care-II: Back to the Future with RFID: Lessons Learned - Some Old, Some New , 2005, Commun. Assoc. Inf. Syst..

[45]  Gildas Avoine Cryptography in radio frequency identification and fair exchange protocols , 2005 .

[46]  Fusheng Wang,et al.  Temporal Management of RFID Data , 2005, VLDB.