Abstract
As network bandwidth steadily increases and touchscreen mobile devices become ever more pervasive, objects achieve an electronic identity by actively building the “Internet of Things” (IoT). RFID technology as well as sensor networks (SN) are important elements in the creation of the IoT, with innovative customized apps designed around people. This chapter introduces basic features of RFID systems and discusses their potential in the field of cultural heritage protection and promotion. After a brief introduction, RFID is introduced, describing recent research improvements that integrate sensor ability in RFID (semi)passive tags. Next, we focus on its application in the field of cultural heritage, introducing related work and discussing possible scenarios of use. Finally, conclusions and future prospects end the chapter.
References
Angelaccio M, Basili A, Buttarazzi B, Liguori W (2012) Smart and mobile access to cultural heritage resources: a case study on Ancient Italian Renaissance Villas. In: IEEE 21st international workshop on enabling technologies: infrastructure for collaborative enterprises (WETICE), pp 310–314
Bajaj R, Ranaweera SL, Agrawal DP (2002) GPS: location-tracking technology. Computer 35(4):92–94
Bateman IJ, Langford IH (1997) Non-users’ willingness to pay for a National Park: an application and critique of the contingent valuation method. Reg Stud 31(6):571–582
Bhattacharya R, Florkemeier C, Sarma S (2009) Towards tag antenna based sensing-An RFID displacement sensor. In: Proceedings of international conference on RFID, pp 95–102
Blake J (2000) On defining the cultural heritage. Int Comp Law Quart 49:61–85. doi:10.1017/S002058930006396X
Bono S, Green M, Stubblefield A, Juels A, Rubin A, Szydlo M (2006) Security analysis of a cryptographically enabled RFID device. Pre-print. Available at www.rfidanalysis.org
Bowitz E, Ibenholt K (2009) Economic impacts of cultural heritage–research and perspectives. J Cult Herit 10(1):1–8
Capdevila S, Jofre L, Bolomey JC, Romeu J (2010) RFID multi-probe impedance-based sensors. IEEE Trans Inst Measur 59(12):3093–3101
Catarinucci L, Colella R, Tarricone L (2013) Enhanced UHF RFID sensor-tag microwave and wireless components letters. IEEE 23(1):49–51
Çayırezmez NA, Aygün HM, Boz L (2013) Suggestion of RFID technology for tracking museum objects in Turkey. In: Digital heritage IEEE International Congress, vol 2, pp 315–318
Ceipidor UB, Medaglia CM, Volpi V, Moroni A, Sposato S, Carboni M, Caridi A (2013) NFC technology applied to touristic-cultural field: a case study on an Italian museum. In: The 5th international workshop on near field communication (NFC)
Cober R, Au O, Son JJ (2012) Using a participatory approach to design a technology-enhanced museum tour for visitors who are blind. In: Proceedings of the 2012 iConference ACM, New York, pp 592–594. doi:10.1145/2132176.2132301
Costantini S, Mostarda L, Tocchio A, Tsintza P (2008) DALICA: agent-based ambient intelligence for cultural-heritage scenarios. Intell Syst IEEE 23(2):34–41
Cultural Heritage Space Identification System (CUSPIS) (2007) European commission 6th framework program—2nd call Galileo joint undertaking http://www.gsa.europa.eu/fp6-cuspis-project
De Donno D, Catarinucci L, Tarricone L (2014) RAMSES: RFID augmented module for smart environmental sensing. IEEE Trans Instrum Meas 63(7):1701–1708
Dobkin DM (2007) The RF in RFID: passive UHF RFID in practice. Elsevier-Newnes, Amsterdam
Dupuy A, Juanals B, Minel, J-L (2015) Towards open museums: the interconnection of digital and physical spaces in open environments. MW2015: Museums and the Web 2105, Chicago, USA
Duroc Y, Vera GA (2014) Towards autonomous wireless sensors: RFID and energy harvesting solutions. In: Internet of Things. Springer International Publishing, pp 233–225
EGNOS (European Geostationary Navigation Overlay Service): www.esa.int/
EPC global standard powered by GS1: Object Naming Service (ONS) 5 Version 1.0 (2005)
EPCglobal (2005). Class-1 Generation-2 UHF RFID Conformance Requirements Specification v. 102 EPCglobal public document, February 2005
Fu Y, Zhang C, Wang J (2010) A research on Denial of Service attack in passive RFID system. In: International conference on anti-counterfeiting security and identification in communication (ASID). IEEE, pp 24–28
Hahnel D, Burgard W, Fox D, Fishkin K, Philipose M (2004) Mapping and localization with RFID technology. In: robotics and automation, ICRA ‘04.2004 IEEE international conference 1, pp 1015–1020
Jacob J (2002) Counterfeit art—how to keep it out of your collection. Chubb Collectors
Jingwangsa T, Soonjun S, Cherntanomwong P (2010) Comparison between innovative approaches of RFID based localization using fingerprinting techniques for outdoor and indoor environments. In: Advanced Communication Technology (ICACT), 2010 The 12th international conference on (vol. 2, pp 1511–1515). IEEE
Juels A (2006) Rfid security and privacy: a research survey. IEEE J Select Areas Commun
Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Advances in cryptology–CRYPTO 2005. Springer, Berlin/Heidelberg, pp 293–308
Karimi R, Nanopoulos A, Schmidt-Thieme L (2012) RFID-enhanced museum for interactive experience. Springer Multimedia for Cultural Heritage Communications in Computer and Information Science 247:192–205
Kostoska G, Fezzi D, Valeri B, Baez M, Casati F, Caliari S, Tarter S (2013) Collecting memories of the museum experience. In: CHI ‘13 extended abstracts on human factors in computing systems (CHI EA ‘13). ACM, New York, pp 247–252
Kuflik T, Lanir J, Dim E, Wecker A, Corrá M, Zancanaro M, Stock O (2011) Indoor positioning: challenges and solutions for indoor cultural heritage sites. In: Proceedings of the 16th international conference on Intelligent user interfaces (IUI ‘11), pp 375–378
Kuo CW, Chiang JK, Lin QP (2009) The research on applying RFID information system architecture for museum service. In: Fourth international conference on computer sciences and convergence information technology, pp 218–222
Lee J, Park KS, Hong S, Cho WD (2007). Object tracking based on RFID coverage visual compensation in wireless sensor network. In: ISCAS 2007. IEEE international symposium on circuits and systems. IEEE, pp 1597–1600
Lehtonen M, Michahelles F, Fleisch E (2007) Probabilistic approach for location-based authentication. In: 1st international workshop on security for spontaneous interaction IWSSI 2007
Lehtonen M, Staake T, Michahelles F (2008) From identification to authentication–a review of RFID product authentication techniques. In: Networked RFID systems and lightweight cryptography. Springer, Berlin/Heidelberg, pp 169–187
Liu H, Bolic M, Nayak A, Stojmenovi I (2007) Integration of RFID and wireless sensor networks. In: Sense ID 2007 workshop at ACN SenSys, pp 6–9
Liu H, Bolic M, Nayak A, Stojmenovic I (2008) Taxonomy and challenges of the integration of RFID and wireless sensor networks. In: IEEE network, pp 26–32
Mazzenga F, Simonetta A, Giuliano R, Vari M (2010) Applications of smart tagged RFID tapes for localization services in historical and cultural heritage environments, 2010 19th IEEE international workshop on enabling technologies: infrastructures for collaborative enterprises WETICE, pp 186–191
Mody A, Akram M, Rony K Aman MS, Kamoua R (2009) Enhancing user experience at museums using smart phones with RFID. In: Proceedings of the systems, applications and technology conference. LISAT ‘09. IEEE Long Island, pp 1–5
Mostarda L, Tocchio A, Inverardi P, Costantini S (2007) A geo time authentication system. In: Trust management. Springer, New York, , pp 123–138
Mostarda L, Dong C, Dulay N (2010) Context-based authentication and transport of cultural assets. Pers Ubiquit Comput 14(4):321–334
O’Connor MC (2010) A guide to RFID middleware. RFID J
Pateriya RK, Sharma S (2011) The evolution of RFID security and privacy: a research survey. In: International conference on communication systems and network technologies (CSNT), pp 115–119. IEEE
Pesonen N, Jaakkola K, Lamy J, Nummila K, Marjonen J (2009). Smart RFID tags, development and implementation of RFID technology. In: Turcu C (ed). InTech. ISBN: 978–3–902613-54-7
Pozzobon O, WuUems C, Kubic K (2004) Secure tracking using trusted GNSS receivers and GALILEO authentication services. J Global Posit Syst
Rahmati A, Zhong L, Hiltunen M, Jana R (2007, June) Reliability techniques for RFID-based object tracking applications. In: Dependable systems and networks, 2007. DSN’07. 37th annual IEEE/IFIP international conference on IEEE, pp 113–118
RFID Journal (2003) RFID, privacy and corporate data. Feature Article, June 2, 2003. Available at http://www.rfidjournal.com on subscription basis
RFID Journal (2006) EPC tags subject to phone attacks. News Article, February 24. Available at http://www.rfidjournal.com/article/articleview/2167/1/1/ (4.5.2006)
Ruijgrok ECM (2006) The three economic values of cultural heritage: a case study in the Netherlands. J Cult Herit 7(3):206–213
Schirripa G, Cozzella L, Caciotta M, Colasanti R, Ferrari G (2014) Analogue fingerprinting for painting authentication 20th IMEKO TC4 international symposium and 18th international workshop on ADC modelling and testing research on electric and electronic measurement for the economic upturn Benevento, Italy, 15–17 September 2014
Staake T, Thiesse F, Fleisch E (2005) Extending the EPC network – the potential of RFID in anti-counterfeiting. In: Proceedings of the 2005 ACM symposium on applied computing. ACM Press, New York, pp 1607–1612
Stallings W (2006) Cryptography and network security: principles and practice, 4th ed. Prentice Hall
Todd B, Phillips M, Schultz SM, Hawkins AR, Jensen BD (2009) Low-cost RFID threshold shock sensors. IEEE Sensors J 9(4):464–469
Tuan TH, Navrud S (2008) Capturing the benefits of preserving cultural heritage. J Cult Herit 9(3):326–337
Tuyls P, Batina L (2006) RFID-tags for anti-counterfeiting. In: Topics in cryptology–CT-RSA 2006. Springer, Berlin/Heidelberg, pp 115–131
Vaz A, Ubarretxena A, Zalbide I, Pardo D, Solar H, Berenguer R (2010) Full passive UHF tag with a temperature sensor suitable for human body temperature monitoring. Circuits and systems II: express briefs, IEEE Transactions on, 57(2), 95–99
Virtanen J, Ukkonen L, Björninen T, Sydänheimo L (2010) Printed humidity sensor for UHF RFID systems. In: Sensors applications symposium (SAS), 2010 IEEE, pp 269–272
Weingart S (2000) Physical security devices for computer subsystems: a survey of attacks and defense. In: Cetin Kaya Koc, Christof Paar (eds) Proceedings of CHES’00, 1965 of lecture notes in Computer Science. Springer, pp 302–317
Weiser MD (1991) The computer for the 21st century. Scientific American Special Issue on Communications, Computers, and Networks, pp 66–75
Wu J (2012) Three-dimensional indoor RFID localization system. Ph.D. dissertation
Yeager DJ, Powledge PS, Prasad R, Wetherall D, Smith JR (2008, April) Wirelessly-charged UHF tags for sensor data collection. In: IEEE international conference on RFID, pp 320–327
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Buzzi, M., Senette, C. (2017). RFID Sensors and Artifact Tracking. In: Masini, N., Soldovieri, F. (eds) Sensing the Past. Geotechnologies and the Environment, vol 16. Springer, Cham. https://doi.org/10.1007/978-3-319-50518-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-50518-3_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50516-9
Online ISBN: 978-3-319-50518-3
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)