Basically RFID (radio-frequency identification) is a wireless communication technology within the L1 (Layer 1, the physical layer of the OSI 7-layer Reference Model) and L2 scopes between RFID tag and reader. The RFID reader reads the code in the RFID tag and interprets it by communicating with the IS(information services)Â server via a proper communication network. This is the typical architecture defined by EPC (electronic product Code)global. RFID networks need to provide value added services in order to give better visibility to inventory movement across supply chain or closed loop applications like Asset tracking or Work In Progress tracking. The RFID reader can be stationary or mobile. A mobile RFID reader affords more applications than the stationary one. Mobile RFID is a newly emerging technology which uses the mobile phone as an RFID reader with a wireless technology and provides new valuable services to the user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. The mobile RFID enables business to provide new services to mobile customers by securing services and transactions from the end-user to a company's existing e-commerce and IT systems. In this paper, I describe about the core components of mobile RFID, advantages and its applications in scenario of smart networks. Although there are several types of mobile RFID readers in the market, I focused on mobile RFID technology that has several positive features including security, network architecture, operation scenario, and code resolution mechanism. Keywords: EPC network, RFID, Mobile RFID, Smart RFID network
[1]
James Brusey,et al.
Reasoning about uncertainty in location identification with auto-ID
,
2003
.
[2]
Toshiyuki Tsuji,et al.
Asset management salution based on RFID
,
2004
.
[3]
Martin Fischer,et al.
Fully integrated passive UHF RFID transponder IC with 16.7-μW minimum RF input power
,
2003,
IEEE J. Solid State Circuits.
[4]
Klaus Finkenzeller,et al.
Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed.
,
2004,
ACM Queue.
[5]
Koutarou Suzuki,et al.
Cryptographic Approach to “Privacy-Friendly” Tags
,
2003
.
[6]
Mun Leng Ng,et al.
The reader collision problem in RFID systems
,
2005,
2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.
[7]
Marc Langheinrich.
RFID and Privacy
,
2007,
Security, Privacy, and Trust in Modern Data Management.
[8]
Daniel W. Engels,et al.
RFID Systems and Security and Privacy Implications
,
2002,
CHES.
[9]
Dongho Won,et al.
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment
,
2006,
APWeb Workshops.
[10]
Ronald L. Rivest,et al.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
,
2003,
SPC.
[11]
By Toshiyuki TSUJI,et al.
Asset Management Solution Based on RFID
,
2004
.
[12]
M. Harrison,et al.
Reasoning about Uncertainty in Location Identification with RFID
,
2003
.