Documente Academic
Documente Profesional
Documente Cultură
0 TECHNOLOGY
Radio Frequency Identification or RFID
technology has passed through many phases over
the last few decades (see figure 1). The technology
has been used in tracking delivery of goods, in
courier services and in baggage handling. Other
applications includes automatic toll payments,
departmental access control in large buildings,
personal and vehicle control in a particular area,
security of items which shouldnt leave the area,
equipment tracking in engineering firms, hospital
filing systems, etc.[1,2]. Figure 1 shows RFID
evolution over the past few decades.
4.0 APPLICATIONS
2.
3.
regions
concerned.
A
compromise for tags only
modulating the reader signal
without actively producing a
carrier wave on their own may be
their ability to work in a wider
frequency range than nominally
specified, allowing their usage
even in regions where RFID
bands are close enough.
E. Faulty manufacture of tags
Manufacturing of tags is not yet 100%
failure-free today; about 2030% of tags
used in early RFID pilots have been
defective [13].
F. Security and privacy Issues
Depending on the field of application
and in some cases, prescribed by lawit
may become necessary to prevent
unauthorized persons from reading or
writing data stored on or transmitted from
tags. To this end, encryption must be
ensured at all interfaces where data could
be intercepted or transmitted (on the
medium itself, as well as tagreader and
readerhost communication) [13].
CONCLUSION
The paper gave an overview of the fundamentals of
operation of radio frequency identification
technology and the application areas in which such
systems have traditionally been used. RFID
technology will open new doors to make
organisations, companies more secure, reliable, and
accurate. The first part of this paper has explained
and described the RFID technology. The paper
considers RFID technology as a means to provide
new capabilities and efficient methods for several
applications. For example, in healthcare, access
control, analysing inventory information, and
business processes. Even though numerous
limitations and unresolved issues still hinder the
widespread application of RFID. Furthermore,
extensive engineering efforts are under way to
overcome current technical limitations and to build
accurate and reliable tag reading systems. We might
also start to see economic pressure from the larger
distributors to modify product packaging and its
associated materials to more effectively integrate
RFID.
RFIDs potential benefits are large, and were sure
to see many novel applications in the near future
some of which we cant even begin to imagine. The
components that go into RFID readers and tags are
simple radio communications, but their smaller size
REFERENCE
[1] K. Ahsan, H. Shah, P. Kingston, Context
Based Knowledge Management in
Healthcare: An EA Approach, AMCIS
2009, Available at AIS library.
[2] S. Garfinkel, B. Rosenberg, RFID
Application, Security, and Privacy, USA,
(2005), ISBN: 0-321-29096-8.
[3] L. Srivastava, RFID: Technology,
Applications and Policy Implications,
Presentation,
International
Telecommunication
Union,
Kenya,
(2005).
[4] K. Ahsan, H. Shah, P. Kingston, Role of
Enterprise Architecture in healthcare IT,
Proceeding ITNG2009, (2009), IEEE.
[5] S. Shepard, (2005), RFID Radio
Frequency Identification, (2005), USA,
ISBN:0-07-144299-5.
[6] Whitaker, J.; Mithas, S.; Krishnan, M.S.
(2007): A Field Study of RFID
Deployment and Return Expectations.
Production and Operations Management,
16 (5), pp. 599-612.
[7] Barua, A.; Mani, D.; Whinston, A.B.
(2006): Assessing the Financial Impacts of
RFID Technologies on the Retail and
Healthcare Sectors. Center for Research in
Electronic Commerce, Department of
IROM, McComb School of Business, The
University of Texas at Austin.
[8] http://www.rfidjournal.com/article/articlev
iew/1098/1/1/.
[9] Burdet, L. A., 2004: Smart Environments,
Seminar, Zrich.
[10] D.W. Engels and S.E. Sarma, The Reader
Collision
Problem,
white
paper
MITAUTOID- WH-007, Auto-ID Center,
Nov. 2001.
[11] E. Batista, Step Back for Wireless ID
Tech? Wired News, 8 Apr. 2003; www.
wired.com/news/wireless/0,1382,58385,
00.html.
[12] A. Juels, R.L. Rivest, and M. Szydlo,
ThevBlocker Tag: Selective Blocking of
RFIDvTags for Consumer Privacy, Proc.