Skip to main content

Radio-frequency Identification (RFID): Technology and Applications

  • Chapter

Abstract

RFID is a big step forward when compared to bar codes. A technical description and the possible future progress of this technology are provided. The various factors to take into account when implementing RFID in a supply chain and most of the problems that can occur under these circumstances are outlined. Particular attention is paid to the use of RFID to improve inventory management. Practical applications, related to tracking the movement of goods in diverse industrial sectors, illustrate the importance of this technology. The advantages of using RFID in supply chains as well as expert opinions are highlighted. Some concepts to provide an economic evaluation are presented. Privacy concerns, which are socially important, are discussed. Moreover, some techniques to protect privacy are proposed. The chapter ends by discussing the RFID authentication issue. This includes the problem of misbehaving tags, particularly counterfeit ones.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

References

  • Arens AA, Loebbecke JK (1981) Applications of Statistical Sampling to Auditing. Prentice-Hall, Englewood-Cliff, NJ

    Google Scholar 

  • Booth-Thomas C (2003) The see-it-all chip. Time Magazine, September 14

    Google Scholar 

  • Juels A (2006) RFID security and privacy: A research survey. IEEE J. Select. Ar. Comm. 24(2):381–394

    Article  MathSciNet  Google Scholar 

  • Kang Y, Gershwin SB (2005) Information inaccuracy in inventory systems: stock loss and stockout. IIE Trans. 37:843–859

    Article  Google Scholar 

  • Kang Y, Koh R (2002) MIT Auto-ID Center Research Report. Available on quintessenz.org/rfiddocs/www.autoidcenter.org/media/

    Google Scholar 

  • Prater E, Frazier GU, Reyes PM (2005) Future impact of RFID on e-supply chains in grocery retailing. Suppl. Ch. Manag.: Int. J. 10(2):134–142

    Article  Google Scholar 

  • Smith AD (2005) Exploring radio frequency identification technology and its impact on business systems. Inform. Manag. Comput. Secur. 13(1):16–28

    Article  Google Scholar 

Further Reading

  • Baker P (2004) Aligning distribution center operations in Supply Chain strategy. Int. J. Log. Manag. 15(3):11–123

    Google Scholar 

  • Brewer A, Sloan N, Landers TL (1999) Intelligent tracking in manufacturing. J. Intell. Manuf. 10:245–250

    Article  Google Scholar 

  • Brown KL, Imman RA, Calloway JA (2001) Measuring the effects of inventory inaccuracy in MRP inventory and delivery performance. Prod. Plann. Contr. 12(1):46–57

    Article  Google Scholar 

  • Caputo AC, Cucchiella F, Fratocchi L, Pelagagge PM, Scacchia F (2004) Analysis and evaluation of e-supply chain performances. Ind. Manag. Dat. Syst. 104(7):546–557

    Article  Google Scholar 

  • Chappell G, Durdon D, Gilbert G, Ginsburg L, Smith J, Tobolski J (2002) Auto-ID on delivery: the value of Auto-ID technology in the retail supply chain. Auto-ID Center. www.autoidcenter.org, November 1

    Google Scholar 

  • Collins J (2003) Smart labels set to soar. RFID Journal, 23, Available at www.rfidjournal.com/article/articleprint/712/-1/1/

    Google Scholar 

  • Collins J (2003) Estimating RFID’s pace of adoption. RFID Journal, 5, Available at www.rfidjournal.com/article/articleprint/675/-1/1/

    Google Scholar 

  • Croft J (2004) High-tech baggage tracking wins in Vega. Air Transp. W. 41(3):12–13

    MathSciNet  Google Scholar 

  • Croft J (2004) Saving private luggage. Air Transp. W. 41(13):10–12

    Google Scholar 

  • Erickson Research Group (ERG) (2004) Good Manufacturing Practice (GMPs) for the 21st century – food processing. Food Drug Admin. Stud., August 9

    Google Scholar 

  • Ernst R, Guerrero J-L, Roshwalb A (1993) A quality control approach for monitoring inventory stock levels. J. Oper. Res. Soc. 44(11):1115–1127

    MATH  Google Scholar 

  • Gunasekarana A, Ngai EWT (2005) Build-to-order Supply Chain management: A literature review and framework for development. J. Oper. Manag. 23(5):423–451

    Article  Google Scholar 

  • Hou J-L, Huang Ch-H (2006) Quantitative performance evaluation of RFID applications in the supply chain of the printing industry. Ind. Manag. Dat. Syst. 106(1):96–120

    Article  MathSciNet  Google Scholar 

  • Hsieh C-T, Lin B (2004) Impact of standardization on EDI in B2B development. Ind. Manag. Dat. Syst. 104(4):68–77

    Article  Google Scholar 

  • Juels A, Pappu R (2003) Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright R (ed), Proceedings Financial Cryptography, Lecture Notes in Computer Science, vol 2742. Springer-Verlag, New York, pp. 103–121

    Google Scholar 

  • Juels A (2004) Minimalist cryptography for low-cost RFID tags. In: Blundo C, Cimato S (eds), Proceedings of the 4th International Conference on Security in Communication Networks. Lecture Notes in Computer Science, vol 3352. Springer-Verlag, New York, pp. 149–164

    Google Scholar 

  • Juels A, Garfinkel S, Pappu R (2005) RFID privacy: an overview of problems and proposed solutions. IEEE Secur. Priv. 3(3):34–43

    Article  Google Scholar 

  • Kärkkäinen M (2003) Increasing efficiency in the Supply Chain for short shelf life goods using RFID tagging. Int. J. Ret. Distr. Manag. 31(10):529–536

    Article  Google Scholar 

  • Lee H, Özer Ö (2007) Unlocking the value of RFID. Prod. Oper. Manag. 16(1):40–64

    Google Scholar 

  • Oudheusden DLV, Boey P (1994) Design of an automated warehouse for air cargo: the case of the Thai air cargo terminal. J. Bus. Log. 15(1):261–285

    Google Scholar 

  • Petersen CG, Aase G (2004) A comparison of picking, storage, and routing policies in manual order picking. Int. J. Prod. Econ. 92:11–19

    Article  Google Scholar 

  • Saar S, Thomas V (2002) Towards trash that thinks. J. Ind. Ecol. 6(2):133–146

    Article  Google Scholar 

  • Sahin E (2004) A qualitative and quantitative analysis of the impact of the Auto ID technology on the performance of supply chains. Dissertation, Ecole Centrale de Paris, France

    Google Scholar 

  • SAP (2003) SAP Auto-ID Infrastructure. SAP white paper

    Google Scholar 

  • Selker T, Burleson W (2000) Context-aware design and interaction in computer systems. IBM Syst. J. 39(3–4):880–891

    Article  Google Scholar 

  • Selker T, Holmstrom J (2000) Viewpoint reaching the customer through grocery VMI. Int. J. Ret. Distr. Manag. 28(2):55–61

    Article  Google Scholar 

  • Sbihli S (2002) Developing a Successful Wireless Enterprise Strategy: a Manager’s Guide. John Wiley & Sons, New York, NY

    Google Scholar 

  • Subramaniam C, Shaw MJ (2004) The effects of process characteristics on the value of B2B eprocurement. Inf. Techn. Manag. 5(1–2):161–180

    Article  Google Scholar 

  • Takaragi K, Usami M, Imura R, Itsuki R, Satoh T (2001) An ultra small individual recognition security chip. IEEE Micr. 21(6):42–49

    Google Scholar 

  • Trappey AJC, Trappey CV, Hou J-L, Chen BJG (2004) Mobile agent technology and application for online global logistic services. Ind. Manag. Dat. Syst. 104(2):169–183

    Article  Google Scholar 

  • Violino B (2003) SAP takes RFID into the enterprise. RFID Journal, October 13 http://www.rfidjournalevents.com/

    Google Scholar 

  • Westhues J (2005) Hacking the prox card. In: Garfinkel S, Rosenberg B (eds), RFID Appl. Secur. Priv., Addison-Wesley, Reading, MA, pp. 291–300

    Google Scholar 

  • Wu W-Y, Chiag C-Y, Wu Y-J, Tu H-J (2004) The influencing factors of commitment and business integration on supply chain management. Ind. Manag. Dat. Syst. 104(4):322–333

    Article  Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London Limited

About this chapter

Cite this chapter

(2010). Radio-frequency Identification (RFID): Technology and Applications. In: Supply Chain Engineering. Springer, London. https://doi.org/10.1007/978-1-84996-017-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-84996-017-5_5

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84996-016-8

  • Online ISBN: 978-1-84996-017-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics