Abstract
RFID is a big step forward when compared to bar codes. A technical description and the possible future progress of this technology are provided. The various factors to take into account when implementing RFID in a supply chain and most of the problems that can occur under these circumstances are outlined. Particular attention is paid to the use of RFID to improve inventory management. Practical applications, related to tracking the movement of goods in diverse industrial sectors, illustrate the importance of this technology. The advantages of using RFID in supply chains as well as expert opinions are highlighted. Some concepts to provide an economic evaluation are presented. Privacy concerns, which are socially important, are discussed. Moreover, some techniques to protect privacy are proposed. The chapter ends by discussing the RFID authentication issue. This includes the problem of misbehaving tags, particularly counterfeit ones.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Bibliography
References
Arens AA, Loebbecke JK (1981) Applications of Statistical Sampling to Auditing. Prentice-Hall, Englewood-Cliff, NJ
Booth-Thomas C (2003) The see-it-all chip. Time Magazine, September 14
Juels A (2006) RFID security and privacy: A research survey. IEEE J. Select. Ar. Comm. 24(2):381–394
Kang Y, Gershwin SB (2005) Information inaccuracy in inventory systems: stock loss and stockout. IIE Trans. 37:843–859
Kang Y, Koh R (2002) MIT Auto-ID Center Research Report. Available on quintessenz.org/rfiddocs/www.autoidcenter.org/media/
Prater E, Frazier GU, Reyes PM (2005) Future impact of RFID on e-supply chains in grocery retailing. Suppl. Ch. Manag.: Int. J. 10(2):134–142
Smith AD (2005) Exploring radio frequency identification technology and its impact on business systems. Inform. Manag. Comput. Secur. 13(1):16–28
Further Reading
Baker P (2004) Aligning distribution center operations in Supply Chain strategy. Int. J. Log. Manag. 15(3):11–123
Brewer A, Sloan N, Landers TL (1999) Intelligent tracking in manufacturing. J. Intell. Manuf. 10:245–250
Brown KL, Imman RA, Calloway JA (2001) Measuring the effects of inventory inaccuracy in MRP inventory and delivery performance. Prod. Plann. Contr. 12(1):46–57
Caputo AC, Cucchiella F, Fratocchi L, Pelagagge PM, Scacchia F (2004) Analysis and evaluation of e-supply chain performances. Ind. Manag. Dat. Syst. 104(7):546–557
Chappell G, Durdon D, Gilbert G, Ginsburg L, Smith J, Tobolski J (2002) Auto-ID on delivery: the value of Auto-ID technology in the retail supply chain. Auto-ID Center. www.autoidcenter.org, November 1
Collins J (2003) Smart labels set to soar. RFID Journal, 23, Available at www.rfidjournal.com/article/articleprint/712/-1/1/
Collins J (2003) Estimating RFID’s pace of adoption. RFID Journal, 5, Available at www.rfidjournal.com/article/articleprint/675/-1/1/
Croft J (2004) High-tech baggage tracking wins in Vega. Air Transp. W. 41(3):12–13
Croft J (2004) Saving private luggage. Air Transp. W. 41(13):10–12
Erickson Research Group (ERG) (2004) Good Manufacturing Practice (GMPs) for the 21st century – food processing. Food Drug Admin. Stud., August 9
Ernst R, Guerrero J-L, Roshwalb A (1993) A quality control approach for monitoring inventory stock levels. J. Oper. Res. Soc. 44(11):1115–1127
Gunasekarana A, Ngai EWT (2005) Build-to-order Supply Chain management: A literature review and framework for development. J. Oper. Manag. 23(5):423–451
Hou J-L, Huang Ch-H (2006) Quantitative performance evaluation of RFID applications in the supply chain of the printing industry. Ind. Manag. Dat. Syst. 106(1):96–120
Hsieh C-T, Lin B (2004) Impact of standardization on EDI in B2B development. Ind. Manag. Dat. Syst. 104(4):68–77
Juels A, Pappu R (2003) Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright R (ed), Proceedings Financial Cryptography, Lecture Notes in Computer Science, vol 2742. Springer-Verlag, New York, pp. 103–121
Juels A (2004) Minimalist cryptography for low-cost RFID tags. In: Blundo C, Cimato S (eds), Proceedings of the 4th International Conference on Security in Communication Networks. Lecture Notes in Computer Science, vol 3352. Springer-Verlag, New York, pp. 149–164
Juels A, Garfinkel S, Pappu R (2005) RFID privacy: an overview of problems and proposed solutions. IEEE Secur. Priv. 3(3):34–43
Kärkkäinen M (2003) Increasing efficiency in the Supply Chain for short shelf life goods using RFID tagging. Int. J. Ret. Distr. Manag. 31(10):529–536
Lee H, Özer Ö (2007) Unlocking the value of RFID. Prod. Oper. Manag. 16(1):40–64
Oudheusden DLV, Boey P (1994) Design of an automated warehouse for air cargo: the case of the Thai air cargo terminal. J. Bus. Log. 15(1):261–285
Petersen CG, Aase G (2004) A comparison of picking, storage, and routing policies in manual order picking. Int. J. Prod. Econ. 92:11–19
Saar S, Thomas V (2002) Towards trash that thinks. J. Ind. Ecol. 6(2):133–146
Sahin E (2004) A qualitative and quantitative analysis of the impact of the Auto ID technology on the performance of supply chains. Dissertation, Ecole Centrale de Paris, France
SAP (2003) SAP Auto-ID Infrastructure. SAP white paper
Selker T, Burleson W (2000) Context-aware design and interaction in computer systems. IBM Syst. J. 39(3–4):880–891
Selker T, Holmstrom J (2000) Viewpoint reaching the customer through grocery VMI. Int. J. Ret. Distr. Manag. 28(2):55–61
Sbihli S (2002) Developing a Successful Wireless Enterprise Strategy: a Manager’s Guide. John Wiley & Sons, New York, NY
Subramaniam C, Shaw MJ (2004) The effects of process characteristics on the value of B2B eprocurement. Inf. Techn. Manag. 5(1–2):161–180
Takaragi K, Usami M, Imura R, Itsuki R, Satoh T (2001) An ultra small individual recognition security chip. IEEE Micr. 21(6):42–49
Trappey AJC, Trappey CV, Hou J-L, Chen BJG (2004) Mobile agent technology and application for online global logistic services. Ind. Manag. Dat. Syst. 104(2):169–183
Violino B (2003) SAP takes RFID into the enterprise. RFID Journal, October 13 http://www.rfidjournalevents.com/
Westhues J (2005) Hacking the prox card. In: Garfinkel S, Rosenberg B (eds), RFID Appl. Secur. Priv., Addison-Wesley, Reading, MA, pp. 291–300
Wu W-Y, Chiag C-Y, Wu Y-J, Tu H-J (2004) The influencing factors of commitment and business integration on supply chain management. Ind. Manag. Dat. Syst. 104(4):322–333
Rights and permissions
Copyright information
© 2010 Springer-Verlag London Limited
About this chapter
Cite this chapter
(2010). Radio-frequency Identification (RFID): Technology and Applications. In: Supply Chain Engineering. Springer, London. https://doi.org/10.1007/978-1-84996-017-5_5
Download citation
DOI: https://doi.org/10.1007/978-1-84996-017-5_5
Publisher Name: Springer, London
Print ISBN: 978-1-84996-016-8
Online ISBN: 978-1-84996-017-5
eBook Packages: EngineeringEngineering (R0)