Contents Preface IX Chapter 1 The Challenges and Issues Facing the Deployment of RFID Technology 1 Peter Darcy, Prapassara Pupunwiwat and Bela Stantic Chapter 2 RFID Components, App
Trang 1DEPLOYING RFID – CHALLENGES, SOLUTIONS,
AND OPEN ISSUES
Edited by Cristina Turcu
Trang 2
Deploying RFID – Challenges, Solutions, and Open Issues
Edited by Cristina Turcu
Published by InTech
Janeza Trdine 9, 51000 Rijeka, Croatia
Copyright © 2011 InTech
All chapters are Open Access articles distributed under the Creative Commons
Non Commercial Share Alike Attribution 3.0 license, which permits to copy,
distribute, transmit, and adapt the work in any medium, so long as the original
work is properly cited After this work has been published by InTech, authors
have the right to republish it, in whole or part, in any publication of which they
are the author, and to make other personal use of the work Any republication,
referencing or personal use of the work must explicitly identify the original source Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher No responsibility is accepted for the accuracy of information contained in the published articles The publisher assumes no responsibility for any damage or injury to persons or property arising out
of the use of any materials, instructions, methods or ideas contained in the book
Publishing Process Manager Davor Vidic
Technical Editor Teodora Smiljanic
Cover Designer Martina Sirotic
Image Copyright Albert Lozano, 2010 Used under license from Shutterstock.com
First published August, 2011
Printed in Croatia
A free online edition of this book is available at www.intechopen.com
Additional hard copies can be obtained from orders@intechweb.org
Deploying RFID – Challenges, Solutions, and Open Issues, Edited by Cristina Turcu
p cm
ISBN 978-953-307-380-4
Trang 3free online editions of InTe ch Books and Journals can be found at
www.inte chopen.com
Trang 4Trang 5
Contents
Preface IX
Chapter 1 The Challenges and Issues Facing the
Deployment of RFID Technology 1
Peter Darcy, Prapassara Pupunwiwat and Bela Stantic Chapter 2 RFID Components, Applications and System
Integration with Healthcare Perspective 27
Kamran Ahsan Chapter 3 Development of a Neonatal Interactive
Simulator by Using an RFID Module for Healthcare Professionals Training 51
Loreana Arrighi, Jenny Cifuentes, Daniel Fonseca, Luis Méndez, Flavio Prieto and Jhon J Ramírez Chapter 4 RFID Technology in Preparation and
Administration of Cytostatic Infusions 83
Šárka Kozáková and Roman Goněc Chapter 5 Application of RFID Technology in eHealth 103
Cristina Turcu, Tudor Cerlinca, Marius Cerlinca and Remus Prodan Chapter 6 RFID Technology and Multi-Agent
Approaches in Healthcare 127
Felicia Gîză, Cristina Turcu and Cornel Turcu Chapter 7 Farm Operation Monitoring System with
Wearable Sensor Devices Including RFID 141
Tokihiro Fukatsu and Teruaki Nanseki Chapter 8 The Application of RFID in Automatic
Feeding Machine for Single Daily Cow 159
Zhijiang Ni, Zhenjiang Gao and Hai Lin
Trang 6VI Contents
Chapter 9 The U.S National Animal Identification System
(NAIS) & the U.S Beef-Cattle Sector:
A Post-Mortem Analysis of NAIS 167
Rhonda Skaggs Chapter 10 Mine Planning Using RFID 179
Vladimir Konyukh Chapter 11 The Applicability of RFID for Indoor Localization 203
Apostolia Papapostolou and Hakima Chaouchi Chapter 12 Use of Active RFID and Environment-Embedded
Sensors for Indoor Object Location Estimation 219
Hiroaki Fukada, Taketoshi Mori, Hiroshi Noguchi and Tomomasa Sato
Chapter 13 RFID Sensor Modeling by Using an
Autonomous Mobile Robot 237
Grazia Cicirelli, Annalisa Milella and Donato Di Paola Chapter 14 Location of Intelligent Carts Using RFID 249
Yasushi Kambayashi and Munehiro Takimoto Chapter 15 Services, Use Cases and Future Challenges for
Near Field Communication: the StoLPaN Project 265
Carlo Maria Medaglia, Alice Moroni, Valentina Volpi,Ugo Biader Ceipidor, András Vilmosand Balázs Benyó
Chapter 16 RFID Applications in Cyber-Physical System 291
Nan Wu and Xiangdong Li Chapter 17 SAW Transponder – RFID for Extreme Conditions 303
Alfred Binder, Gudrun Bruckner and René Fachberger Chapter 18 Internetworking Objects with RFID 319
Rune Hylsberg Jacobsen, Qi Zhang and Thomas Skjødebjerg Toftegaard Chapter 19 Applying RFID Technology to Improve User
Interaction in Novel Environments 335
Elena de la Guía, María D Lozano and Víctor M.R Penichet
Chapter 20 Building Blocks of the Internet of Things:
State of the Art and Beyond 351
Alexandru Serbanati, Carlo Maria Medaglia and Ugo Biader Ceipidor
Trang 7Chapter 21 RFID Security and Privacy 367
Michel Arnaud Chapter 22 The Ethics of RFID Technology 377
Joël Schlatter and Fouad Chiadmi
Trang 9In chapter 1, the authors present the importance of RFID and the shortcomings of the current approaches designed to correct some issues among the integration of systems including security, privacy, and data abnormalities. They also recommend solutions to these issues.
Chapter 2 deals with the study of the RFID components such as antenna and reader. It also discusses the RFID active and passive tags, and compares these tags, considering both advantages and disadvantages of RFID system. RFID applications are explored and a technical model is analyzed. The chapter also considers the healthcare perspectives and RFID use within healthcare settings. This study outlines a model for connected RFID applications, which provides quick support for various healthcare functions and enhances flexibility for different systems’ components integration. Chapter 3 outlines the experience and achievements attained in a project carried out
by the National University of Colombia. This project was intended to design and implement RFID‐based tools for training students in medical and nursing techniques applied on neonatal patients.
Trang 10in terms of the software resources existing in the medical units.
In chapter 7 the authors propose a farm operation monitoring system using wearable sensor devices with RFID readers and various sensing devices such as motion sensors, cameras, and a GPS. This system recognizes detailed farming operations automatically
in various situations by analyzing the data from sensors and detected RFID tags. The tags and sensors are attached to relevant objects such as farming materials, machinery, facilities, and so on. In this chapter, the authors, based on their research, describe the concept and features of this system and the results of several experiments conducted
on a prototype system. The major applications and extensions of the current systems are also outlined.
In chapter 8, the authors introduce the application of RFID in day‐to day activity in cow industry, regarding the use of RFID technology in automatic cow feeding machine.
Chapter 9 focuses on the cow‐calf sector, with an overview of U.S. agriculture and the beef‐cattle sector. Finally, the author presents what can be called “the National Animal Identification System (NAIS) Pushback”.
In chapter 10 the author presents the new potential of RFID‐applications in mine planning. An RFID‐based system can be used to visualize the placement of machines inside roadways; to monitor miners with personal transponders; to prevent non‐permitted control of machines; to prioritize the control of machines; to evaluate the productivity of both machines and mining areas; to evaluate fuel consumption and machine resources, etc. After being gathered, this information is used for the mine management.
In chapter 11, the authors investigate the applicability of the RFID technology in location sensing, the main design, and environmental factors that should be considered before developing an RFID‐based localization scheme. The authors present
a scenario according to which the location of multiple reader‐enabled terminals need
Trang 11to be estimated based on the information retrieved from low cost passive tags, which are deployed in a particular area. Also, the authors propose a mathematical model for taking into account all implicating factors which affect the accuracy performance of the system, like types of collisions among its components, interference of materials, and temporal environmental changes.
Chapter 12 analyzes an indoor object localizing method by using active RFID tags and simple switch sensors embedded in the environment. The authors focus in their work
on object’s ʺlocationʺ in the environment (e.g. Table, Bed, Sofa, etc.) instead of object’s 3‐dimensional position, the only object location allowing the achievement of their application.
In chapter 13, an approach for developing an RFID sensor model is presented. The authors examine recent progresses in fuzzy logic‐based RFID sensor modeling using
an autonomous robot. Constructing a reliable sensor model is very important for successive applications such as tag localization, robot localization, just to mention a few.
Chapter 14 deals with optimizing distributed robotic control systems, considering as example an intelligent cart system designed to be used in common airports. The presented framework employs an RFID‐based localization algorithm and control methods using mobile software agents.
In chapter 15 the authors present the services, use cases and the future challenges of Near Field Communication, which is the most customer‐oriented one among RFID technologies.
In chapter 16 the authors study a cyber‐physical system based on RFID technology. They compare the proposed RFID system with a traditional wireless sensor network system and discuss the applicability of the first one. Finally, the authors present the design, methodology, and development of an active RFID‐based relative positioning system, also showing the experimental results.
Chapter 17 gives an overview of SAW‐based RFID transponders made for extreme conditions like temperatures up to 400°C or cryogenic temperatures down to –196°C. The authors give an explanatory outline of SAW transponder function principles and system performance, and also some application examples from steel and automotive industries.
The chapter 18 discusses the RFID/WSN technology from a networking perspective. The authors outline the development needed to integrate RFID systems with Internet
of Things and present the evolution from today’s connection of objects to the future networking of objects.
Chapter 19 deals with the application of RFID technology to improve user interaction
in novel environments. The authors describe the development and implementation of
Trang 12to bring new levels of intelligence and information, strengthening the experience of all participants in this research domain, and serving as a valuable authentication technology. We hope this book will be useful for engineers, researchers and industry personnel, and provide them with some new ideas to address current and future issues they might be facing.
Cristina TURCU
Stefan cel Mare University of Suceava
Romania
Trang 15The Challenges and Issues Facing the
Deployment of RFID Technology
Peter Darcy, Prapassara Pupunwiwat and Bela Stantic
Institute of Integrated and Intelligent Systems, Griffith University
Australia
1 Introduction
Radio Frequency Identification refers to wireless technology that uses radio waves toautomatically identify items within certain proximity This process involves tagging itemswith a transmitter which will emit bursts of information including, but not limited to, theidentification of the tag There are three main varieties of tags: Active, Semi-active andPassive Active tags rely solely on a battery for its power source resulting in the maximumintegrity rate and reading range but, also, a limited lifespan and higher cost Semi-Activetags use batteries to extend the range of the tag only resulting in a higher reading rate thanpassive tags, a longer lifespan than the active tags, but also higher cost The passive tag usesthe electromagnetic pulse from readers as a power source to transmit its identifier Due to itslack of a battery, passive tags are the most cost effective and theoretically have an unlimitedlifespan However, due to their lack of the power source, passive tags also have a limited rangeand produce the largest amount of data anomalies The RFID Reader is used to interrogatethe zone to discover tags within proximity of the reader range If a tag is discovered, itsidentification along with the reader’s ID and the timestamp of the observation are recorded.This information is then passed through the Middleware where initial filtration is done toavoid data anomalies being recorded Finally, the information will then be stored within adatabase ready to be queried for future analysis
Due to the benefits of the technology, RFID is currently employed in various commercialsectors to provide automated assistance for mundane tasks There are hospitals which haveemployed tagged bracelets to ensure maximum care is given to surgical patients At variousairports around the world, RFID is being utilised to track passengers’ bags to ensure thatthe location of the luggage will be known at all times In various cities around the world,pets have had RFID chips implanted to ensure that, when lost, the authorities can find theirowners’ information by simple scanning the tag Various countries have also introduced theRFID-enabled toll system designed for cars at RFID-enabled toll booths which allow drivers
to continue on their journey and avoid the necessity of stopping to pay
Despite the advantages gained from RFID technology integration, various drawbacks preventthe wide-scale adoption into the majority of the commercial sector There are three mainissues concerning the integration of the architecture The first issue is security when usingthe technology as tags are prone to various physical and virtual attacks upon the system.The second concern stems from the need of privacy surrounding the data collected as theobservations recorded can be used for breaches in privacy The third issue is that the
1
Trang 16Various methodologies have been mentioned in literature to address the current problemswith RFID data anomalies We have categorised these solutions into three main groups:Physical, Middleware and Deferred approaches Various physical solutions have beenproposed in past studies to avoid missed readings in particular such as metallic-proof tagpads, tag orientation and multiple tagging Smoothing Filers and Anti-Collision Protocols areMiddleware solutions proposed to correct anomalies found within the Reader at the point ofscanning Finally, there have been several rule-based and classification algorithms proposed
in past methodologies to be utilised at a deferred stage of the scanning cycle to correct variousanomalies already stored in the database
Unfortunately, each of the proposed solutions has drawbacks that prevent it from eliminatingall problems found within RFID systems With regard to the physical solutions, mosthave been designed to eliminate a specific problem (i.e the metallic padding) or it willgenerate additional and unforeseen complications (multiple tags introducing duplicate reads).Middleware solutions have been intended to be applied at the edge of the device whenthe scanning is conducted which results in a limited amount of analytical information forcorrection allowing ambiguous anomalies to persist The Deferred approaches have theadvantage of having access to additional information in the database However, they cannot
be applied in real-time and rely on user-specified rules or probabilistic algorithms that mayresult in additional artificial anomalies
We have examined RFID technology and its current uses in various applications Wehave also examined three core issues stopping the mass integration of RFID in the systemsincluding security, privacy and problematic data characteristics We have further exploredthe data characteristics issue to find that it contains low-level nature, large data gathering,complex spatial and temporal aspects, and data anomalies There have been variousmethodologies proposed in the past to cope with the various data anomalies which we havecategorised into physical, middleware and deferred solutions Unfortunately, due the variousdrawbacks such as application-specified solutions, lack of analytical information or reliance
on user-specified/probabilistic algorithms, current approaches do not provide the adequatesupport needed in RFID systems to be adopted in commercial sectors In this work, wehave identified the importance of RFID, the shortcomings of existing approaches designed
to correct its issues, and have recommended solutions to these methodologies
2 Radio Frequency Identification
Radio Frequency Identification (RFID) has had a long history commencing with its utilisationduring the Second World War to its modern usage The basic architecture of RFID itself