RFID Essay

 

 

Deadline: Friday, April 28th   Wednesday, May 3rd   

 

This is an individual exercise that involves the production of an essay on the topic “Radio Frequency Identification: The technology, its application in ubiquitous computing, the issues it raises, the opportunities and challenges it opens”. The essay should between 2,500 and 3,000 words.

 

References

  1. Radio Frequency Identification (RFID) Technologies: A Workshop Summary, The National Academies, 2004.
  2. R. Want, Enabling Ubiquitous Sensing with RFID, IEEE Computer, vol. 37, no. 4, pp. 84-86, April 2004.
  3. V. Stanford, Pervasive Computing Goes the Last Hundred Feet with RFID Systems, IEEE Pervasive Computing, vol. 2, no. 2, pp. 9-14, April-June 2003.
  4. M. Phillipose et al., Inferring Activities from Interactions with Objects, IEEE Pervasive Computing, vol. 3,  no. 4,  pp. 50-57, Oct-Dec 2004.
  5. J.R. Smith et al., RFID-based techniques for human-activity detection, Communications of the ACM, vol. 48, no. 9, pp. 39-44, September 2005.
  6. M. Phillipose et al., Battery-Free Wireless Identification and Sensing, IEEE Pervasive Computing, vol. 4, no. 1, pp. 37-45, January-March 2005.
  7. B. Nath et al., RFID Technology and Applications, IEEE Pervasive Computing, vol. 5, no. 1, pp. 22-24, January-March 2006.
  8. R. Want, An Introduction to RFID Technology, IEEE Pervasive Computing, vol. 5, no. 1, pp. 25-33, January-March 2006.
  9. C. Legner and F. Thiesse, RFID-Based Maintenance at Frankfurt Airport, IEEE Pervasive Computing, vol. 5, no. 1, pp. 34-39, January-March 2006.
  10. J. Reikki et al., Requesting Pervasive Services by Touching RFID Tags, IEEE Pervasive Computing, vol. 5, no. 1, pp. 40-46, January-March 2006.
  11.  F. Thiesse et al., LotTrack: RFID-Based Process Control in the Semiconductor Industry, IEEE Pervasive Computing, vol. 5, no. 1, pp. 47-53, January-March 2006.
  12. K. Opasjumruskit et al., Self-Powered Wireless Temperature Sensors Exploit RFID Technology, IEEE Pervasive Computing, vol. 5, no. 1, pp. 54-61, January-March 2006.
  13. M. Rieback et al., The Evolution of RFID Security, IEEE Pervasive Computing, vol. 5, no. 1, pp. 62-69, January-March 2006.
  14.  G. Borriello, RFID: tagging the world, Introduction, Communications of the ACM, vol. 48, no. 9, pp. 34-37, September 2005.
  15. R. Raskar et al., Photosensing wireless tags for geometric procedures, Communications of the ACM, vol. 48, no. 9, pp. 46-51, September 2005.
  16.  T. Pering et al., Spontaneous marriages of mobile devices and interactive spaces, Communications of the ACM, vol. 48, no. 9, pp. 53-59, September 2005.
  17. S. Hsi and H. Fait, RFID enhances visitors' museum experience at the Exploratorium, Communications of the ACM, vol. 48, no. 9, pp. 60-65, September 2005.
  18. M. Ohkubo et al., RFID privacy issues and technical challenges, Communications of the ACM, vol. 48, no. 9, pp. 66-71, September 2005.
  19. O. Gunther and S. Spiekermann, RFID and the perception of control: the consumer's view, Communications of the ACM, vol. 48, no. 9, pp. 73-76, September 2005.
  20.  B. Eckfeldt, What does RFID do for the consumer?, Communications of the ACM, vol. 48, no. 9, pp. 77-79, September 2005.
  21. C. Floerkemeier et al., Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols, in H. Murakami, Hideyuki Nakashima et al. (Eds.): Ubiquitous Computing Systems. Revised Selected Papers from the 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), LNCS vol. 3598, pp. 214-231, Springer 2005,
  22.  F. Stajano, RFID is X-ray vision, Technical Report no. 645, University of Cambridge, Computer Laboratory, August 2005.
  23. M.R. Rieback et al., Is Your Cat Infected with a Computer Virus?, in Proceedings of the 4th International Conference on Pervasive Computing and Communications (PerCom2006), pp.169-179, Pisa, Italy, March 2006.
  24. G. Goth, RFID: Not Quite Prime Time, But Dawdle at Your Own Risk, IEEE Distributed Systems Online, vol. 6, no. 2, 2005.
  25. A. Juels, RFID Security and Privacy: A Research Survey, IEEE Journal on Selected Areas of Communications, vol. 24, no. 2, pp. 381-394, February 2006.
  26. B.J. Alfonsi, Privacy debate centers on radio frequency identification, IEEE Security & Privacy, vol. 2, no. 2, pp. 12, March-April 2004.
  27. B. Jiang et al., Unobtrusive long-range detection of passive RFID tag motion, IEEE Transactions on Instrumentation and Measurement, vol. 55, no. 1, pp. 187-196, February 2006.
  28. T Phillips et al., Security Standards for the RFID Market, IEEE Security & Privacy, vol. 3, no. 6, pp. 85-89, November-December 2005.
  29. P. Repo et al., Virtual Product Design Case Study: The Nokia RFID Tag Reader, vol. 4, no. 4, pp. 95-99, October-December 2005.