Automated Data Capture Technologies: RFID

In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification and explanation for each of these components is provided, followed by the benefits and applications that can be achieved by adopting this technology. After discussing all possible applications, we describe the business benefits and how stakeholders can benefit. This is followed by a detailed outline of the adoption challenges, where we discuss issues like the security, privacy, cost, scalability, resilience, and deployment and some existing solutions. Once the issues are discussed, we divert our attention to some successful RFID deployment case studies to describe the adoption of RFID technology that has already begun and how many big organizations across the world are showing interest in this technology. Since this chapter takes into consideration

[1]  Christian Damsgaard Jensen,et al.  Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience , 2004, PST.

[2]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[3]  Ertunga C. Özelkan,et al.  When Does RFID Make Business Sense for Managing Supply Chain? , 2008, Int. J. Inf. Syst. Supply Chain Manag..

[4]  Mark J. W. Lee Mobile and Pervasive Technology in Education and Training: Potential and Possibilities, Problems and Pitfalls , 2009 .

[5]  William Stallings,et al.  Cryptography and network security , 1998 .

[6]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  Patrick J. Sweeney RFID For Dummies , 2005 .

[9]  George Roussos What is RFID , 2008 .

[10]  Peter B. Ladkin,et al.  Privacy Enhancing Technology Concepts for RFID Technology Scrutinised , 2004 .

[11]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[12]  Stephen A. Weis Security and Privacy in Radio-Frequency Identification Devices , 2003 .

[13]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[14]  Wendy Powley,et al.  An Adaptable Context Management Framework for Pervasive Computing , 2009, Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability.

[15]  Mehdi Khosrow-Pour,et al.  Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications , 2009 .