Synonyms
RFID; RF identification; Electronic identification; Radio tagging; Electromagnetic tagging
Definition
Radio Frequency Identification (RFID) exists as a distinct subset of the larger family of automated identification technologies that includes things like bar codes, visual scanning devices and biometric readers. RFID is a means of automated identification that features electronic tags used both to store data and to act as transponders for sending the stored data as the payload in electromagnetic waves (radio waves) sent to detached listening devices (RFID readers) [1,2]. The tags can be affixed to animate or inanimate objects by a variety of methods and the readers that receive emissions from the tags translate the wave-embedded data into meaningful information (Fig. 1). They are a significant improvement over bar codes, for example, in that they do not require any human intervention. Currently deployed RFID systems provide real-time identity tracking and monitoring and make...
This is a preview of subscription content, log in via an institution.
Recommended Reading
Landt, J.: Shrouds of Time: The History of RFID. http://www.aimglobal.org/technologies/rfid/resources/shrouds_of_time.pdf, Association for Automatic Identification and Mobility: Retreived 10/10/2006 (2001)
Wikipedia: Radio Frequency Identification. http://en.wikipedia.org/w/index.php?title=Radio_Frequency_Identification&oldid=85251329, Wikipedia, The Free Encyclopedia: Retreived 10/10/2006 (2006)
Vogt, H.: Pervasive Computing: First International Conference Proceedings, In: Efficient Object Identification with Passive RFID Tags, Lecture Notes in Computer Science, vol. 2414, pp. 98. Springer (2002)
The British Broadcasting Corporation: Stopping the book thieves. http://news.bbc.co.uk/2/hi/uk_news/1958424.stm, The BBC News: Retreived 10/10/2006 (2002)
Shim, R.: Wal-Mart to throw its weight behind RFID, http://news.com.com/2100-1022-1013767.html?tag=nl, CNET News: Retreived 10/10/2006 (2003)
Bauer, M., Fabian, B., Fischmann, M., Gürses, S.: Emerging Markets for RFID Traces, Arxiv preprint cs.CY/0606018 (2006)
Bluestein, G.:, Companies track gridlock via cell phones. http://news.yahoo.com/s/ap/20061105/ap_on_hi_te/tracking_traffic;_ylt=AoQQdZOHq.vxPTOcxWTRCaDMWM0F;_ylu=X3oDMTA3ODdxdHBhBHNlYwM5NjQ-, Associated Press: Retreived 11/05/2006 (2006)
Saxena, M.: Does GIS and RFID Amalgamation Work? http://www.geoplace.com/uploads/FeatureArticle/0505tt.asp, Geoplace: Retreived 10/10/2006 (2005)
Stockman, H.: Communication by means of reflected power, Proc. Inst. Radio Engin. 36, 1196–1204 (1948)
The United States Navy: Identification Friend or Foe. http://www.nrl.navy.mil/content.php?P=FRIENDFOE, United States Naval Research Library: Retreived 11/05/2006 (2006)
Bowden, L.: The story of IFF (identification friend or foe), IEEE Proceedings, Part A: Physical Science, Measurement and Instrumentation, Management and Education 132(6), 435–437 (1985)
Vernon Jr, F.: Application of the microwave homodyne, Antennas and Propogation, Transactions of the IRE Professional Group on 4(1), 110–116 (1952)
Walton, C.A.: US Patent 3,752,960, 27 December 1971
The RFID Journal: The History of RFID Technology. http://www.rfidjournal.com/article/articleview/1338/1/129/, The RFID Journal: Retreived 10/10/2006 (2006)
Koelle, A.R., Depp, S.W., Freyman, R.W.: Short-range radio-telemetry for electronic identification, using modulated RF backscatter, Proc. IEEE 63(8), 1260–1261 (1975)
Sanjay E. Weis, S., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications, In: Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, vol. 2523, pp. 454–470 (2002) http://citeseer.ist.psu.edu/sarma02rfid.html
Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures, In: CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pp.210–219. ACM Press, New York (2004)
Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy, In: CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pp. 103–111. ACM Press, New York (2003)
O'Connor, M.C.: Gen 2 EPC Protocol Approved as ISO 18000–6C. http://www.rfidjournal.com/article/articleview/2481/1/1/, The RFID Journal: Retreived 11/05/2006 (2006)
Avoine, G., Oechslin, P.: Financial Cryptography and Data Security, In: RFID traceability: A multilayer problem, Lecture Notes in Computer Science, vol. 3570, pp. 125–140. Springer (2005)
Juels, A., Pappu, R.: Financial Cryptography, In: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, Lecture Notes in Computer Science, vol. 2742, pp. 103–121. Springer (2003)
Fulton, N.: High-tech cloning. http://blogs.reuters.com/2006/07/22/high-tech-cloning/, Reuters: Retreived 10/10/2006 (2006)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security in Pervasive Computing, In: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, Lecture Notes in Computer Science, vol. 2802, pp. 201–212. Springer (2004)
Indulska, J., McFadden, T., Kind, M., Henricksen, K.: Distributed Applications and Interoperable Systems, In: Scalable Location Management for Context-Aware Systems, Lecture Notes in Computer Science, vol. 2893, pp. 224–235. Springer (2003)
Roussos, G., Kourouthanasis, P., Spinellis, D., Gryazin, E., Pryzbliski, M., Kalpogiannis, G., Giaglis, G.: Systems architecture for pervasive retail, In: SAC '03: Proceedings of the 2003 ACM symposium on Applied computing (ACM Press, New York 2003)
Newsweek: An Internet of Things. http://www.msnbc.msn.com/id/3068871/, Newsweek: Retreived 10/10/2006 (2006)
Davies, N., Gellersen, H.W.: Beyond prototypes: challenges in deploying ubiquitous systems, Pervasive Computing, IEEE 1(1), 26–35 (2002)
Tenmoku, R., Kanbara, M., Yokoya, N.: A wearable augmented reality system using positioning infrastructures and a pedometer, Wearable Computers, 2003. Proceedings. Seventh IEEE International Symposium on 110–117 (2003)
Want, R., Fishkin, K.P., Gujar, A., Harrison, B.L.: Bridging physical and virtual worlds with electronic tags, In: CHI '99: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York (1999)
Coroama, V., Bohn, J., Mattern, F.: Living in a Smart Environment – Implications for the Coming Ubiquitous Information Society, In: Proceedings of the International Conference on Systems, Man and Cybernetics 2004 (IEEE SMC 2004) 5633–5638, http://citeseer.ist.psu.edu/coroama04living.html
Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. http://eprint.iacr.org/2006/137.pdf, Cryptology ePrint Archive: Retreived 10/10/2006 (2006)
Roberti, M.: DOD Releases Final RFID Policy. http://www.rfidjournal.com/article/articleview/1080/1/1/, The RFID Journal: Retreived 10/11/2006 (2004)
The RFID Journal: The History of RFID Technology. http://www.rfidjournal.com/article/articleview/1337/1/129/, The RFID Journal: Retreived 10/12/2006 (2006)
The RFID Journal: RFID System Components and Costs. http://www.rfidjournal.com/article/articleview/1336/1/129/, The RFID Journal: Retreived 10/12/2006 (2006)
The RFID Gazette: Wal-Mart Doubling RFID-Enabled Stores. http://www.rfidgazette.org/walmart/, The RFID Journal: Retreived 11/05/2006 (2006)
Riscure: Privacy issues with new digital passport. http://www.riscure.com/2_news/passport.html, Riscure BV: Retreived 11/08/2006 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag
About this entry
Cite this entry
Goshey, M. (2008). Radio Frequency Identification (RFID). In: Shekhar, S., Xiong, H. (eds) Encyclopedia of GIS. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35973-1_1071
Download citation
DOI: https://doi.org/10.1007/978-0-387-35973-1_1071
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30858-6
Online ISBN: 978-0-387-35973-1
eBook Packages: Computer ScienceReference Module Computer Science and Engineering