Skip to main content

RFID Sensors and Artifact Tracking

  • Chapter
  • First Online:
Book cover Sensing the Past

Part of the book series: Geotechnologies and the Environment ((GEOTECH,volume 16))

Abstract

As network bandwidth steadily increases and touchscreen mobile devices become ever more pervasive, objects achieve an electronic identity by actively building the “Internet of Things” (IoT). RFID technology as well as sensor networks (SN) are important elements in the creation of the IoT, with innovative customized apps designed around people. This chapter introduces basic features of RFID systems and discusses their potential in the field of cultural heritage protection and promotion. After a brief introduction, RFID is introduced, describing recent research improvements that integrate sensor ability in RFID (semi)passive tags. Next, we focus on its application in the field of cultural heritage, introducing related work and discussing possible scenarios of use. Finally, conclusions and future prospects end the chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Angelaccio M, Basili A, Buttarazzi B, Liguori W (2012) Smart and mobile access to cultural heritage resources: a case study on Ancient Italian Renaissance Villas. In: IEEE 21st international workshop on enabling technologies: infrastructure for collaborative enterprises (WETICE), pp 310–314

    Google Scholar 

  • Bajaj R, Ranaweera SL, Agrawal DP (2002) GPS: location-tracking technology. Computer 35(4):92–94

    Article  Google Scholar 

  • Bateman IJ, Langford IH (1997) Non-users’ willingness to pay for a National Park: an application and critique of the contingent valuation method. Reg Stud 31(6):571–582

    Google Scholar 

  • Bhattacharya R, Florkemeier C, Sarma S (2009) Towards tag antenna based sensing-An RFID displacement sensor. In: Proceedings of international conference on RFID, pp 95–102

    Google Scholar 

  • Blake J (2000) On defining the cultural heritage. Int Comp Law Quart 49:61–85. doi:10.1017/S002058930006396X

    Article  Google Scholar 

  • Bono S, Green M, Stubblefield A, Juels A, Rubin A, Szydlo M (2006) Security analysis of a cryptographically enabled RFID device. Pre-print. Available at www.rfidanalysis.org

  • Bowitz E, Ibenholt K (2009) Economic impacts of cultural heritage–research and perspectives. J Cult Herit 10(1):1–8

    Article  Google Scholar 

  • Capdevila S, Jofre L, Bolomey JC, Romeu J (2010) RFID multi-probe impedance-based sensors. IEEE Trans Inst Measur 59(12):3093–3101

    Article  Google Scholar 

  • Catarinucci L, Colella R, Tarricone L (2013) Enhanced UHF RFID sensor-tag microwave and wireless components letters. IEEE 23(1):49–51

    Google Scholar 

  • Çayırezmez NA, Aygün HM, Boz L (2013) Suggestion of RFID technology for tracking museum objects in Turkey. In: Digital heritage IEEE International Congress, vol 2, pp 315–318

    Google Scholar 

  • Ceipidor UB, Medaglia CM, Volpi V, Moroni A, Sposato S, Carboni M, Caridi A (2013) NFC technology applied to touristic-cultural field: a case study on an Italian museum. In: The 5th international workshop on near field communication (NFC)

    Google Scholar 

  • Cober R, Au O, Son JJ (2012) Using a participatory approach to design a technology-enhanced museum tour for visitors who are blind. In: Proceedings of the 2012 iConference ACM, New York, pp 592–594. doi:10.1145/2132176.2132301

  • Costantini S, Mostarda L, Tocchio A, Tsintza P (2008) DALICA: agent-based ambient intelligence for cultural-heritage scenarios. Intell Syst IEEE 23(2):34–41

    Article  Google Scholar 

  • Cultural Heritage Space Identification System (CUSPIS) (2007) European commission 6th framework program—2nd call Galileo joint undertaking http://www.gsa.europa.eu/fp6-cuspis-project

  • De Donno D, Catarinucci L, Tarricone L (2014) RAMSES: RFID augmented module for smart environmental sensing. IEEE Trans Instrum Meas 63(7):1701–1708

    Article  Google Scholar 

  • Dobkin DM (2007) The RF in RFID: passive UHF RFID in practice. Elsevier-Newnes, Amsterdam

    Google Scholar 

  • Dupuy A, Juanals B, Minel, J-L (2015) Towards open museums: the interconnection of digital and physical spaces in open environments. MW2015: Museums and the Web 2105, Chicago, USA

    Google Scholar 

  • Duroc Y, Vera GA (2014) Towards autonomous wireless sensors: RFID and energy harvesting solutions. In: Internet of Things. Springer International Publishing, pp 233–225

    Google Scholar 

  • EGNOS (European Geostationary Navigation Overlay Service): www.esa.int/

  • EPC global standard powered by GS1: Object Naming Service (ONS) 5 Version 1.0 (2005)

    Google Scholar 

  • EPCglobal (2005). Class-1 Generation-2 UHF RFID Conformance Requirements Specification v. 102 EPCglobal public document, February 2005

    Google Scholar 

  • Fu Y, Zhang C, Wang J (2010) A research on Denial of Service attack in passive RFID system. In: International conference on anti-counterfeiting security and identification in communication (ASID). IEEE, pp 24–28

    Google Scholar 

  • Hahnel D, Burgard W, Fox D, Fishkin K, Philipose M (2004) Mapping and localization with RFID technology. In: robotics and automation, ICRA ‘04.2004 IEEE international conference 1, pp 1015–1020

    Google Scholar 

  • Jacob J (2002) Counterfeit art—how to keep it out of your collection. Chubb Collectors

    Google Scholar 

  • Jingwangsa T, Soonjun S, Cherntanomwong P (2010) Comparison between innovative approaches of RFID based localization using fingerprinting techniques for outdoor and indoor environments. In: Advanced Communication Technology (ICACT), 2010 The 12th international conference on (vol. 2, pp 1511–1515). IEEE

    Google Scholar 

  • Juels A (2006) Rfid security and privacy: a research survey. IEEE J Select Areas Commun

    Google Scholar 

  • Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Advances in cryptology–CRYPTO 2005. Springer, Berlin/Heidelberg, pp 293–308

    Chapter  Google Scholar 

  • Karimi R, Nanopoulos A, Schmidt-Thieme L (2012) RFID-enhanced museum for interactive experience. Springer Multimedia for Cultural Heritage Communications in Computer and Information Science 247:192–205

    Google Scholar 

  • Kostoska G, Fezzi D, Valeri B, Baez M, Casati F, Caliari S, Tarter S (2013) Collecting memories of the museum experience. In: CHI ‘13 extended abstracts on human factors in computing systems (CHI EA ‘13). ACM, New York, pp 247–252

    Chapter  Google Scholar 

  • Kuflik T, Lanir J, Dim E, Wecker A, Corrá M, Zancanaro M, Stock O (2011) Indoor positioning: challenges and solutions for indoor cultural heritage sites. In: Proceedings of the 16th international conference on Intelligent user interfaces (IUI ‘11), pp 375–378

    Google Scholar 

  • Kuo CW, Chiang JK, Lin QP (2009) The research on applying RFID information system architecture for museum service. In: Fourth international conference on computer sciences and convergence information technology, pp 218–222

    Google Scholar 

  • Lee J, Park KS, Hong S, Cho WD (2007). Object tracking based on RFID coverage visual compensation in wireless sensor network. In: ISCAS 2007. IEEE international symposium on circuits and systems. IEEE, pp 1597–1600

    Google Scholar 

  • Lehtonen M, Michahelles F, Fleisch E (2007) Probabilistic approach for location-based authentication. In: 1st international workshop on security for spontaneous interaction IWSSI 2007

    Google Scholar 

  • Lehtonen M, Staake T, Michahelles F (2008) From identification to authentication–a review of RFID product authentication techniques. In: Networked RFID systems and lightweight cryptography. Springer, Berlin/Heidelberg, pp 169–187

    Chapter  Google Scholar 

  • Liu H, Bolic M, Nayak A, Stojmenovi I (2007) Integration of RFID and wireless sensor networks. In: Sense ID 2007 workshop at ACN SenSys, pp 6–9

    Google Scholar 

  • Liu H, Bolic M, Nayak A, Stojmenovic I (2008) Taxonomy and challenges of the integration of RFID and wireless sensor networks. In: IEEE network, pp 26–32

    Google Scholar 

  • Mazzenga F, Simonetta A, Giuliano R, Vari M (2010) Applications of smart tagged RFID tapes for localization services in historical and cultural heritage environments, 2010 19th IEEE international workshop on enabling technologies: infrastructures for collaborative enterprises WETICE, pp 186–191

    Google Scholar 

  • Mody A, Akram M, Rony K Aman MS, Kamoua R (2009) Enhancing user experience at museums using smart phones with RFID. In: Proceedings of the systems, applications and technology conference. LISAT ‘09. IEEE Long Island, pp 1–5

    Google Scholar 

  • Mostarda L, Tocchio A, Inverardi P, Costantini S (2007) A geo time authentication system. In: Trust management. Springer, New York, , pp 123–138

    Google Scholar 

  • Mostarda L, Dong C, Dulay N (2010) Context-based authentication and transport of cultural assets. Pers Ubiquit Comput 14(4):321–334

    Article  Google Scholar 

  • O’Connor MC (2010) A guide to RFID middleware. RFID J

    Google Scholar 

  • Pateriya RK, Sharma S (2011) The evolution of RFID security and privacy: a research survey. In: International conference on communication systems and network technologies (CSNT), pp 115–119. IEEE

    Google Scholar 

  • Pesonen N, Jaakkola K, Lamy J, Nummila K, Marjonen J (2009). Smart RFID tags, development and implementation of RFID technology. In: Turcu C (ed). InTech. ISBN: 978–3–902613-54-7

    Google Scholar 

  • Pozzobon O, WuUems C, Kubic K (2004) Secure tracking using trusted GNSS receivers and GALILEO authentication services. J Global Posit Syst

    Google Scholar 

  • Rahmati A, Zhong L, Hiltunen M, Jana R (2007, June) Reliability techniques for RFID-based object tracking applications. In: Dependable systems and networks, 2007. DSN’07. 37th annual IEEE/IFIP international conference on IEEE, pp 113–118

    Google Scholar 

  • RFID Journal (2003) RFID, privacy and corporate data. Feature Article, June 2, 2003. Available at http://www.rfidjournal.com on subscription basis

  • RFID Journal (2006) EPC tags subject to phone attacks. News Article, February 24. Available at http://www.rfidjournal.com/article/articleview/2167/1/1/ (4.5.2006)

  • Ruijgrok ECM (2006) The three economic values of cultural heritage: a case study in the Netherlands. J Cult Herit 7(3):206–213

    Article  Google Scholar 

  • Schirripa G, Cozzella L, Caciotta M, Colasanti R, Ferrari G (2014) Analogue fingerprinting for painting authentication 20th IMEKO TC4 international symposium and 18th international workshop on ADC modelling and testing research on electric and electronic measurement for the economic upturn Benevento, Italy, 15–17 September 2014

    Google Scholar 

  • Staake T, Thiesse F, Fleisch E (2005) Extending the EPC network – the potential of RFID in anti-counterfeiting. In: Proceedings of the 2005 ACM symposium on applied computing. ACM Press, New York, pp 1607–1612

    Google Scholar 

  • Stallings W (2006) Cryptography and network security: principles and practice, 4th ed. Prentice Hall

    Google Scholar 

  • Todd B, Phillips M, Schultz SM, Hawkins AR, Jensen BD (2009) Low-cost RFID threshold shock sensors. IEEE Sensors J 9(4):464–469

    Article  Google Scholar 

  • Tuan TH, Navrud S (2008) Capturing the benefits of preserving cultural heritage. J Cult Herit 9(3):326–337

    Article  Google Scholar 

  • Tuyls P, Batina L (2006) RFID-tags for anti-counterfeiting. In: Topics in cryptology–CT-RSA 2006. Springer, Berlin/Heidelberg, pp 115–131

    Google Scholar 

  • Vaz A, Ubarretxena A, Zalbide I, Pardo D, Solar H, Berenguer R (2010) Full passive UHF tag with a temperature sensor suitable for human body temperature monitoring. Circuits and systems II: express briefs, IEEE Transactions on, 57(2), 95–99

    Google Scholar 

  • Virtanen J, Ukkonen L, Björninen T, Sydänheimo L (2010) Printed humidity sensor for UHF RFID systems. In: Sensors applications symposium (SAS), 2010 IEEE, pp 269–272

    Google Scholar 

  • Weingart S (2000) Physical security devices for computer subsystems: a survey of attacks and defense. In: Cetin Kaya Koc, Christof Paar (eds) Proceedings of CHES’00, 1965 of lecture notes in Computer Science. Springer, pp 302–317

    Google Scholar 

  • Weiser MD (1991) The computer for the 21st century. Scientific American Special Issue on Communications, Computers, and Networks, pp 66–75

    Google Scholar 

  • Wu J (2012) Three-dimensional indoor RFID localization system. Ph.D. dissertation

    Google Scholar 

  • Yeager DJ, Powledge PS, Prasad R, Wetherall D, Smith JR (2008, April) Wirelessly-charged UHF tags for sensor data collection. In: IEEE international conference on RFID, pp 320–327

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marina Buzzi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Buzzi, M., Senette, C. (2017). RFID Sensors and Artifact Tracking. In: Masini, N., Soldovieri, F. (eds) Sensing the Past. Geotechnologies and the Environment, vol 16. Springer, Cham. https://doi.org/10.1007/978-3-319-50518-3_21

Download citation

Publish with us

Policies and ethics