RFID Essay
Deadline: Friday,
April 28th Wednesday, May
3rd
This is an individual exercise
that involves the production of an essay on the topic “Radio Frequency
Identification: The technology, its application in ubiquitous computing, the
issues it raises, the opportunities and challenges it opens”. The essay should
between 2,500 and 3,000 words.
References
- Radio Frequency Identification
(RFID) Technologies: A Workshop Summary, The National Academies, 2004.
- R. Want, Enabling
Ubiquitous Sensing with RFID, IEEE Computer, vol. 37, no. 4, pp.
84-86, April 2004.
- V. Stanford, Pervasive
Computing Goes the Last Hundred Feet with RFID Systems, IEEE Pervasive
Computing, vol. 2, no. 2, pp. 9-14, April-June 2003.
- M. Phillipose et al., Inferring
Activities from Interactions with Objects, IEEE Pervasive Computing,
vol. 3, no. 4, pp. 50-57, Oct-Dec 2004.
- J.R. Smith et al., RFID-based
techniques for human-activity detection, Communications of the ACM,
vol. 48, no. 9, pp. 39-44, September 2005.
- M. Phillipose et al., Battery-Free
Wireless Identification and Sensing, IEEE Pervasive Computing, vol. 4,
no. 1, pp. 37-45, January-March 2005.
- B. Nath et al., RFID
Technology and Applications, IEEE Pervasive Computing, vol. 5, no. 1,
pp. 22-24, January-March 2006.
- R. Want, An Introduction to RFID Technology, IEEE Pervasive
Computing, vol. 5, no. 1, pp. 25-33, January-March 2006.
- C. Legner and F. Thiesse, RFID-Based
Maintenance at Frankfurt Airport, IEEE Pervasive Computing, vol. 5,
no. 1, pp. 34-39, January-March 2006.
- J. Reikki et al., Requesting
Pervasive Services by Touching RFID Tags, IEEE Pervasive Computing,
vol. 5, no. 1, pp. 40-46, January-March 2006.
- F. Thiesse et al., LotTrack: RFID-Based Process Control in the
Semiconductor Industry, IEEE Pervasive Computing, vol. 5, no. 1, pp.
47-53, January-March 2006.
- K. Opasjumruskit et al., Self-Powered
Wireless Temperature Sensors Exploit RFID Technology, IEEE Pervasive
Computing, vol. 5, no. 1, pp. 54-61, January-March 2006.
- M. Rieback et al., The
Evolution of RFID Security, IEEE Pervasive Computing, vol. 5, no. 1,
pp. 62-69, January-March 2006.
- G. Borriello, RFID: tagging the world, Introduction,
Communications of the ACM, vol. 48, no. 9, pp. 34-37, September 2005.
- R. Raskar et al., Photosensing wireless tags for geometric procedures,
Communications of the ACM, vol. 48, no. 9, pp. 46-51, September 2005.
- T. Pering et al., Spontaneous
marriages of mobile devices and interactive spaces, Communications of
the ACM, vol. 48, no. 9, pp. 53-59, September 2005.
- S. Hsi
and H. Fait, RFID
enhances visitors' museum experience at the Exploratorium,
Communications of the ACM, vol. 48, no. 9, pp. 60-65, September 2005.
- M. Ohkubo et al., RFID
privacy issues and technical challenges, Communications of the ACM,
vol. 48, no. 9, pp. 66-71, September 2005.
- O. Gunther and S. Spiekermann, RFID
and the perception of control: the consumer's view,
Communications of the ACM, vol. 48, no. 9, pp. 73-76, September 2005.
- B. Eckfeldt, What
does RFID do for the consumer?, Communications of the ACM, vol. 48,
no. 9, pp. 77-79, September 2005.
- C. Floerkemeier et al., Scanning
with a Purpose – Supporting the Fair Information Principles in RFID
Protocols, in H. Murakami, Hideyuki Nakashima et al. (Eds.):
Ubiquitous Computing Systems. Revised Selected Papers from the 2nd
International Symposium on Ubiquitous Computing Systems (UCS 2004), LNCS
vol. 3598, pp. 214-231, Springer 2005,
- F. Stajano, RFID
is X-ray vision, Technical Report no. 645, University of Cambridge,
Computer Laboratory, August 2005.
- M.R. Rieback et al., Is
Your Cat Infected with a Computer Virus?, in Proceedings of the 4th
International Conference on Pervasive Computing and Communications
(PerCom2006), pp.169-179, Pisa,
Italy,
March 2006.
- G. Goth, RFID:
Not Quite Prime Time, But Dawdle at Your Own Risk, IEEE Distributed
Systems Online, vol. 6, no. 2, 2005.
- A. Juels, RFID
Security and Privacy: A Research Survey, IEEE Journal on Selected
Areas of Communications, vol. 24, no. 2, pp. 381-394, February 2006.
- B.J. Alfonsi, Privacy
debate centers on radio frequency identification,
IEEE Security
& Privacy, vol. 2, no. 2, pp. 12, March-April
2004.
- B. Jiang et al., Unobtrusive
long-range detection of passive RFID tag motion, IEEE Transactions on
Instrumentation and Measurement, vol. 55, no. 1, pp. 187-196, February
2006.
- T Phillips et al., Security
Standards for the RFID Market, IEEE Security & Privacy, vol. 3,
no. 6, pp. 85-89, November-December 2005.
- P. Repo et al., Virtual
Product Design Case Study: The Nokia RFID Tag Reader, vol. 4, no. 4,
pp. 95-99, October-December 2005.