Advertisement

Abstract

Radio Frequency Identification (RFID) which is a mature identification and tracking technology recently is picking up its momentum with the emergency of a highly hyped "Internet of Things" (IOT). The ultimate goal of IOT is to let human and objects seamlessly talk to each other via the Internet. It finds great impacts on our lifestyles in various applications such as supply chain management, access control security, mobile health-care, etc. In response to this technology trend and market demands, a high level infrastructure called EPC (Electronic Product Code) network with Object Naming Service has been proposed that rides on the future IPv6 Internet. In order to enable the operation of EPC network, auxiliary mechanisms such as privacy and security protection, context-aware capabilities, middleware and interoperable data semantics are needed. In this paper we propose a prototype of wireless communication system incorporated with Internet capability, namely Internet RFID. In particular, this paper shows the preliminary design, implementation and testing of the Internet RFID prototype in a client-server environment. As an experiment, we implemented a typical RFID system with the additional feature of distance finding that can track and monitor access control, and at the same time a database located remotely in a Web Server is updated. Users can query the Web database server in real-time about the location of the client. The hardware module consists mainly of the construction of two micro-controller systems: one for the user card and the other one for the station transceiver controller. Recommendations are provided at the end of the paper for future development.

Keywords

Wireless communication Internet applications RFID 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Harrison, M.: The ’Internet of Things’ and Commerce. XRDS: Crossroads, The ACM Magazine for Students 17(3), 19–22 (2011)CrossRefGoogle Scholar
  2. 2.
    Fong, S., Zhuang, Y.: A Security Model for Detecting Suspicious Patterns in Physical Environment. In: IEEE The Third International Symposium on Information Assurance and Security (IAS 2007), UK, pp. 221–226. IEEE Press, Manchester (2007)CrossRefGoogle Scholar
  3. 3.
    Michael, M.P.: Architectural Solutions for Mobile RFID Services on Internet of Things, Master Thesis, University of Helsinki, pp. 1–95 (2007)Google Scholar
  4. 4.
    Liu, H., Bolic, M., Nayak, A., Stojmenovic, I.: Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks. In: IEEE Network, pp. 26–32. IEEE Press, Los Alamitos (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Simon Fong
    • 1
  1. 1.Faculty of Science and TechnologyUniversity of MacauMacau

Personalised recommendations