A Taxonomy for RFID Systems
نویسندگان
چکیده
Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriented is very important. How is the situation of RFID systems? There is a proliferation of RFID systems – tags, sensors, readers, middleware and applications each attempting to solve a specific business need. RFID technology can be found embedded in almost everything from razor blade packages, clothing and books to prescription medicines to parts of an aircraft, indeed it forms a new area titled silent-commerce (s-Commerce). Despite the pervasive nature of RFID, surveys have consistently shown a lack of RFID awareness, an overall lack of understanding and general confusion about what it actually is, its capabilities and limitations. This is due in part to a lack of a comprehensive, principles-based and systematic RFID classification scheme. This paper makes its contribution that first proposes taxonomy of currently available RFID technology and systems. The taxonomy is based on a sound service-oriented RFID architecture framework. It can be used by both novices and RFID practitioners to gain an understanding of the “next big thing” technology, the architectural considerations for designing and implementing a successful RFID system. Moreover, RFID researchers will also benefit from this taxonomy.
منابع مشابه
RFID-based decision support within maintenance management of urban tunnel systems
Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملRFID-based decision support within maintenance management of urban tunnel systems
Efficiently, tracking information related to components, materials and equipment from the production/construction phase to operation and maintenance is a challenge in the industries. The industry environment is a natural fit for generating and utilizing instance-level data for decision support. Advanced electronic identification and data storage technologies e.g. radio frequency identification ...
متن کامل