Abstract
In this paper we investigate the feasibility of using UHF RFID as a tool for identifying individuals. We first developed a demo application for greeting conference speakers by incorporating a passive UHF tag into a user badge. Next, based on participant feedback we carried out additional tests to gauge the reliability of the user identification. Results of our experiments are very encouraging. If certain technical precautions are kept in mind, UHF RFID has a high percentage of success and is more widely accepted in the user community than is active sensor technology.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Alien Technology: Tag Feng Shui. A Practical Guide to Selecting and Applying RFID Tags, http://www.alientechnology.com/docs/WP_Alien_Tag.pdf
Doherty, N.F., King, M., Al-Mushayt, O.: The impact of inadequacies in the treatment of organizational issues on information systems development projects. In: International Journal of Information & Management, vol. 41, pp. 49–62. Elsevier, Amsterdam (2003)
Dritsas, S., Gritzalis, D., Lambrinoudakis, C.: Protecting privacy and anonymity in pervasive computing: trends and perspectives. Telematics and Informatics Journal 23(3), 196–210 (2006)
Günther, O., Spiekermann, S.: RFID: tagging the world: RFID and the perception of control: the consumer’s view. Communications of the ACM 48(9), 73–76 (2005)
Juels, A.: RFID Security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)
Hyangjin, L., Jeeyeon, K.: Privacy threats and issues in mobile RFID. In: First International Conference on Availability, Reliability and Security, pp. 510–514 (2006)
Konomi, S., Roussos, G.: Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments. Personal and Ubiquitous Computing 11(7), 507–521 (2007)
Kourouthanassis, P.E., Giaglis, G.M., Vrechopoulos, A.P.: Enhancing user experience through pervasive information systems: The case of pervasive retailing. International Journal of Information Management 27, 319–335 (2007)
Mamei, M., Quaglieri, R., Zambonelli, F.: Making tuple spaces physical with RFID tags. In: Proceedings of the 2006 ACM symposium on Applied computing, pp. 434–439. ACM Press, New York (2006)
Paar, C., Weimerskirch, A.: Embedded security in a pervasive world - Information Security Technical Report, vol. 12, pp. 155–161. Elsevier, Amsterdam (2007)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez, J.M.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006)
Psion Teklogix. WorkAbout Pro Second Generation Hand-Held Computer, http://www.psionteklogix.com/
Roussos, G., Kostakos, V.: RFID in pervasive computing: State-of-the-art and outlook. Pervasive and Mobile Computing 5, 110–131 (2009)
Sheng, Q.Z., Li, X., Zeadally, S.: Enabling Next-Generation RFID Applications: Solutions and Challenges. Computer 41(9), 21–28 (2008)
Vega, V.: Common RFID Implementation Issues: 10 Considerations for Deployment, http://www.alientechnology.com/blog/
Weiser, M.D.: The Computer for the 21st Century. Scientific American Special Issue on Communications, Computers, and Networks, 66–75 (1991)
Wikipedia. Radio-frequency identification, http://en.wikipedia.org/wiki/RFID
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Buzzi, M., Conti, M., Gregori, E. (2009). RFID-Based Identification: A Measurement Study. In: Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S. (eds) Mobile Lightweight Wireless Systems. Mobilight 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 13. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03819-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-03819-8_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03818-1
Online ISBN: 978-3-642-03819-8
eBook Packages: Computer ScienceComputer Science (R0)