Challenges for Pervasive RFID-Based Infrastructures

The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deployments that involve humans raise new and critical problems related to privacy, security, uncertainty, and a more diverse and evolving set of applications. At the University of Washington, we are deploying a building-wide RFID-based infrastructure with hundreds of antennas and thousands of tags. Our goal is to uncover the issues of pervasive RFID deployments and devise techniques for addressing these issues before such deployments become common place. In this paper, we present the challenges encountered and lessons learned during a smaller-scale pilot deployment of the system. We show some preliminary results and, for each challenge, discuss how we addressed it or how we are planning on addressing it

[1]  Wei Tsang Ooi,et al.  WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)Based Applications , 2005 .

[2]  R. Gadh,et al.  WinRFID – A Middleware for the enablement of Radio Frequency Identification ( RFID ) based Applications , 2005 .

[3]  Christian Floerkemeier,et al.  Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.

[4]  Gaetano Borriello,et al.  Reminding About Tagged Objects Using Passive RFIDs , 2004, UbiComp.

[5]  Bill N. Schilit,et al.  An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..

[6]  Prashant J. Shenoy,et al.  Ferret: RFID Localization for Pervasive Multimedia , 2006, UbiComp.

[7]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.

[8]  D. McCullagh RFID tags : Big Brother in small pachkages , 2003 .

[9]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[10]  Vincent M. Stanford,et al.  Pervasive Computing Goes the Last 100 Feet with RFID Systems , 2003, IEEE Pervasive Comput..

[11]  Roy Want,et al.  The Magic of RFID , 2004, ACM Queue.

[12]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[13]  Yanlei Diao,et al.  High-performance complex event processing over streams , 2006, SIGMOD Conference.

[14]  Joshua R. Smith,et al.  RFID-based techniques for human-activity detection , 2005, Commun. ACM.

[15]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[16]  Frederick Reiss,et al.  Design Considerations for High Fan-In Systems: The HiFi Approach , 2005, CIDR.

[17]  Dan Suciu,et al.  Towards correcting input data errors probabilistically using integrity constraints , 2006, MobiDE '06.

[18]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[19]  Christian Floerkemeier,et al.  RFID middleware design: addressing application requirements and RFID constraints , 2005, sOc-EUSAI '05.

[20]  Roy Want,et al.  Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.