Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Automated Data Capture Technologies: RFID

Automated Data Capture Technologies: RFID
View Sample PDF
Author(s): Vidyasagar Potdar (Curtin University of Technology, Australia), Chen Wu (Curtin University of Technology, Australia)and Elizabeth Chang (Curtin University of Technology, Australia)
Copyright: 2010
Pages: 30
Source title: Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Judith Symonds (AUT University, New Zealand)
DOI: 10.4018/978-1-60566-960-1.ch008


View Automated Data Capture Technologies: RFID on the publisher's website for pricing and purchasing information.


In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification and explanation for each of these components is provided, followed by the benefits and applications that can be achieved by adopting this technology. After discussing all possible applications, we describe the business benefits and how stakeholders can benefit. This is followed by a detailed outline of the adoption challenges, where we discuss issues like the security, privacy, cost, scalability, resilience, and deployment and some existing solutions. Once the issues are discussed, we divert our attention to some successful RFID deployment case studies to describe the adoption of RFID technology that has already begun and how many big organizations across the world are showing interest in this technology. Since this chapter takes into consideration 83 Automated Data Capture Technologies a variety of audiences like researchers, business executives, business consultants, hobbyists, and general readers, we tried to cover material relevant to each target audience. For business executives and consultants interested in knowing who can offer complete RFID solutions, we allocated a dedicated section for RFID vendors where we provide a comprehensive list of RFID vendors across the globe. For researchers, we listed some open issues in the section of adoption challenges. For advanced users, in-depth technical details are provided in the section where we discuss security and privacy enhancing protocols.

Related Content

Bin Guo, Yunji Liang, Zhu Wang, Zhiwen Yu, Daqing Zhang, Xingshe Zhou. © 2014. 20 pages.
Yunji Liang, Xingshe Zhou, Bin Guo, Zhiwen Yu. © 2014. 31 pages.
Igor Bisio, Alessandro Delfino, Fabio Lavagetto, Mario Marchese. © 2014. 33 pages.
Kobkaew Opasjumruskit, Jesús Expósito, Birgitta König-Ries, Andreas Nauerz, Martin Welsch. © 2014. 22 pages.
Viktoriya Degeler, Alexander Lazovik. © 2014. 23 pages.
Vlasios Kasapakis, Damianos Gavalas. © 2014. 26 pages.
Zhu Wang, Xingshe Zhou, Daqing Zhang, Bin Guo, Zhiwen Yu. © 2014. 18 pages.
Body Bottom