Multi-agent Verification of RFID System

  • Ali Selamat
  • Muhammad Tarmizi Lockman
Part of the Studies in Computational Intelligence book series (SCI, volume 244)


In supply chain management and asset tracking, identifying an item and its’ location is very important. RFID technology is suitable to perform the identification and tracking for better asset management. RFID tags can be embedded and attached to the items and their information can be classified for verification process. This is important to avoid problems such as data lost during data management as well as for time management. Multi-agent technology is useful to be implemented during the verification of RFID system architecture because intelligent agent has the capability to define specific verification process and can interact to each other in order to improve the efficiency of the RFID system. Multi-agent system, in this verification of RFID system architecture has a role in formulating the system taxonomy. Therefore, in this paper, the verification process of RFID system architecture has been discussed and successfully implemented in RFID shopping system. The implementation has been tested and evaluated. The results have been encouraging based on the investigation and verification done on a simulation platform.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Clampitt, H.G., Jones, E.C.: RFID Certification Textbook, 3rd edn., American RFID Solution (2007)Google Scholar
  2. 2.
    Weinstein, R.: RFID, A technical overview and its application to the enterprise. Proceedings of IEEE IT, 27–33 (2005)Google Scholar
  3. 3.
    Paper For Topic: Verification,validation, Certification. Obtain through the internet (accessed 12/6/2008),
  4. 4.
    Cui, J.F., Chae, H.S.: Agent-based Design of Load Balancing System for RFID Middlewares. In: Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2007 (2007)Google Scholar
  5. 5.
    He, H.: What is Service-Oriented Architecture (September 30, 2003), 12/4/2008)
  6. 6.
    Le, S., Huang, X., Sharma, D.: A Multi-agent Architecture for RFID Taxonomy. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part III. LNCS (LNAI), vol. 4694, pp. 917–925. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Foster, I., Jennings, N.R., Kesselman, C.: Brain Meets Brawn: Why Grid and Agents Need Each Other. In: Kudenko, D., Kazakov, D., Alonso, E. (eds.) AAMAS 2004. LNCS (LNAI), vol. 3394, pp. 19–23. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Pechoucek, M., Marik, V.: Industrial Deployment of Multi-Agent Technologies: Review and Selected Case Studies. To appear in: International Journal on Autonomous Agents and Multi-Agent Systems (2008)Google Scholar
  9. 9.
    Abdel-Naby, S., Giorgini, P.: Locating Agents in RFID Architectures, Technical Report #DIT-06-095 (DEC 2006), Department of Information and Communication Technology, University of Trento, Italy (2006),
  10. 10.
    Leong, K.S., Ng, M.L., Engels, D.: EPC Network Architecture, Auto-ID Center (2004),
  11. 11.
    Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., Stewart, R., Suen, K.K.: The EPCglobal Architecture Framework (2005),
  12. 12.
    Floerkemeier, C., Lampe, M.: RFID Middleware Design- Addressing Application Requirements And RFID Constraints. In: Proceedings of the, Joint Conference on Smart Objects and Ambient Intelligent: Innovative Context-aware Services: Usages and Technologies. Grenoble, France, pp. 219–224 (2005)Google Scholar
  13. 13.
    Microsoft Biztalk (2006), (accessed 7/2/2008)
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Sybase, (accessed 31/10/2008)
  18. 18.
  19. 19.
    Concurrency Workbench of the New Century (CWB-NC), (accessed 15/5//2009)
  20. 20.
    Passive Radio Frequency Identification (RFID)- A Premier for RF regulation by Kevin Powell, Senior Director, Product Development, Matrics Inc., (accessed 15/5//2009)

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Ali Selamat
    • 1
  • Muhammad Tarmizi Lockman
    • 1
  1. 1.Faculty of Computer Science and Information SystemsUniversiti Teknologi MalaysiaJohorMalaysia

Personalised recommendations