RFID Data Management in Supply Chains: Challenges, Approaches and Further Research Requirements

Adam Melski, Lars Thoroe, Matthias Schumann

2007

Abstract

The implementation of RFID leads to improved visibility in supply chains. However, as a consequence of the increased data collection and enhanced data granularity, supply chain participants have to deal with new data management challenges. In this paper, we give an overview of the current challenges and solution proposals in the area of data collection and transformation, data organization and data security. We also identify further research requirements.

References

  1. Seidman, T.: The Race for RFID. The Journal of Commerce 4, 48 (2003) 16-18
  2. Collins, J.: Metro Group reaps gains from RFID. RFID Journal (2005)
  3. Speer, J. K.: Making (13.56) Waves. Apparel 2 (2006) 22-24
  4. Michael, K., McCathie, L.: The Pros and Cons of RFID in Supply Chain Management. Proceedings of the International Conference on Mobile Business (2005) 623-629
  5. Rao, J., Doraiswamy, S., Thakkar, H., Colby, L. S.: A deferred Cleansing Method for RFID Data Analytics. Proceedings of the 32nd VLDB Conference, Seoul (2006) 175-186
  6. Jeffery, S. R., Alonso, G., Franklin, M. J., Hong, W., Widom, J.: Declarative Support for Sensor Data Cleaning. Pervasive Computing (2006) 83-100
  7. Janz, B. D., Pitz, M. G., Otondo, R. F.: Information Systems and Health Care II: Back to the Future with RFID: Lessons Learned - Some Old, Some New. Communications of the Association for Information Systems 15, 7 (2005) 1-32
  8. Cheong, T., Kim, Y.: RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation. Lecture notes in computer science, Vol. 3760, Springer-Verlag, Berlin Heidelberg New York (2005) 557-575
  9. Zhang, X., Hu, T., Janz, B. D., Gillenson, M. L.: Radio Frequency Identification: The Initiator of a Domino Effect. Proceedings of the 2006 Southern Association for Information Systems Conference (2006) 191-196
  10. Floerkemeier, C., Lampe, M.: RFID Middleware Design - Addressing Application Requirements and RFID Constraints. Proceedings of the 2005 joint conference on Smart objects and ambient intelligence, Grenoble (2005) 219-224
  11. Wang, F., Liu, P.: Temporal Management of RFID Data. Proceedings of the 31st VLDB Conference, Trondheim (2005) 1128-1139
  12. Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and Issues in Data Stream Systems. Proceedings of 21st ACM Symposium on Principles of Database Systems (PODS 2002), June 3-5, 2002, Madison, Wisconsin (2002)
  13. Hu, Y., Sundara, S., Chorma, T., Srinivasan, J.: Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype. Proceedings of the 31st VLDB Conference, Trondheim (2005) 1140-1151
  14. Sarma, S.: Integrating RFID. QUEUE 10 (2004) 50-57
  15. Hanebeck, C.: Managing Data from RFID & Sensor-based Networks. Retrieved from: www.globeranger.com/pdfs/futureoftheedge/GlobeRangerRFIDData.pdf (2004)
  16. Shih, D., Sun, P.-L., Yen, D.C.: Taxonomy and Survey of RFID Anti-Collision Protocols. Computer and Communications 29, 11 (2006) 2150-2166
  17. Spiekermann, S., Berthold, O.: Maintaining privacy in RFID enabled environments - Proposal for a disable-model. In: Robinson, P., Vogt, H., Wagealla, W. (eds.): Privacy, Security and Trust within the Context of Pervasive Computing. Springer-Verlag, Berlin Heidelberg New York (2005) 137-146
  18. Hardgrave, B. C., Armstrong, D. J., Riemenschneider, C. K.: RFID Assimilation Hierarchy. 40th Annual Hawaii International Conference on System Sciences (2007)
  19. Asif, Z., Mandiviwalla, M.: Integrating the Supply Chain with RFID: A Technical and Business Analysis. Communications of the AIS 15 (2005) 393-427
  20. Vaidya, N., Das, S. R.: RFID-Based Networks - Exploiting Diversity and Redundancy. Technical Report (2006)
  21. Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, New York (2003)
  22. Jain, S., Das, S. R.: Collision Avoidance in a Dense RFID Network. Proceedings of the 1st international workshop on Wireless network testbeds, experimental evaluation & characterization. ACM Press, New York (2006) 49-56
  23. Kodialam, M., Nandagopal, T.: Fast and Reliable Estimation Schemes in RFID Systems. Proceedings of the 12th annual international conference on Mobile computing and networking. ACM Press, New York (2006) 322-333
  24. Huang, X.: An Improved ALOHA Algorithm for Improved RFID Identification. Lecture Notes in Computer Science, Vol. 4253. Springer-Verlag, Berlin Heidelberg New York (2006) 1157-1162
  25. Floerkemeier, C., Wille, M.: Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols. International Symposium on Applications and the Internet Workshops (2006) 92-97
  26. Myung, J., Lee, W.: Adaptive splitting protocols for RFID tag collision arbitration. Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing. ACM Press, New York (2006) 202-213
  27. Floerkemeier, C., Lampe, M.: Issues with RFID Usage in Ubiquitous Computing Applications. Lecture Notes in Computer Science, Vol. 3001. Springer-Verlag, Berlin Heidelberg New York (2004) 188-193
  28. Jeffery, S. R., Alonso, G., Franklin, M. J., Hong, W., Widom, J.: A Pipelined Framework for Online Cleaning of Sensor Data Streams. Proceedings of the 22nd International Conference on Data Engineering (2006) 140
  29. Jeffery, S. R., Garofalakis, M., Franklin, M. J.: Adaptive Cleaning for RFID Data Streams. Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul (2006) 163-174
  30. Gonzales, H., Han, J., Li, X., Klabjan, D.: Warehousing and Analyzing Massive RFID Data Sets. Proceedings of the International Conference on Data Engineering (2006)
  31. Bornhövd, C., Lin, T., Haller, S., Schaper, J.: Integrating Automatic Data Acquisition with Business Processes Experiences with SAP's Auto-ID Infrastructure. Proceedings of the 30th VLDB Conference, Toronto (2004) 1182-1188
  32. Diekmann, T., Melski, A., Schumann, M.: Data-on-Network vs. Data-on-Tag: Managing Data in Complex RFID Environments. 40th Annual Hawaii International Conference on System Sciences (2007)
  33. Sarma, S.: A History of the EPC. In: Garfinkel, S., Rosenberg, B. (eds.): RFID - Applications, Security and Privacy. Addison-Wesley, Upper Saddle River, NJ (2006) 37-56
  34. Trigg, J. B.: Progress for RFID: An Architectural Overview and Use Case Review. (2005)
  35. Schuster, E. W., Allen, S. J., Brock, D. L.: Global RFID: the value of the EPCglobal network for supply chain management. Springer-Verlag, Berlin Heidelberg New York (2007)
  36. Thiesse, F., Michahelles, F.: An overview of EPC technology. Sensor Review 26, 2 (2006) 101-105
  37. Harmon, C. K.: The necessity for a uniform organisation of user memory in RFID. Int. J. RFID Technology and Applications 1, 1 (2006) 41-51
  38. Garfinkel, S., Juels, A., Pappu, R.: RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy 3, 3 (2005) 34-43
  39. Henrici, D., Mueller, P.: Tackling security and privacy issues in radio frequency identification. In: Ferscha, A., Mattern, F. (eds.): Pervasive Computing. Lecture Notes in Computer Science, Vol. 3001, Springer-Verlag, Berlin Heidelberg New York (2004), 219- 224
  40. Spiekermann, S., Ziekow, H.: RFID: A 7-point plan to ensure privacy. European Conference on Information Systems (ECIS 7805), Regensburg, Germany (2005)
  41. Juels, A.: RFID Security and Privacy: A research Survey. (2005)
  42. Garfinkel, S., Juels, A., Pappu, R.: RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy 3, 3 (2005) 34-43
  43. Juels, A.: Authentication and Identification - Minimalist Cryptography for Low-Cost RFID Tags. Lecture notes in computer science 3352, (2005) 149-164
  44. Avoine, G.: Cryptography in Radio Frequency Identification and Fair Exchange Protocols. PhD thesis, EPFL, Lausanne (2005)
  45. AVANTE International Technology: Supply Chain Security and Loss Prevention through Effective Counterfeit Prevention and Detection RFID Data Structure. (2005)
  46. Potdar, V., Wu, C., Chang, E.: Intrusion Detection - Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. (2005)
  47. Floerkemeier, C., Schneider, R., Langheinrich, M.: Sensors and Tags - Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols. Lecture notes in computer science, Vol. 3598, Springer-Verlag, Berlin Heidelberg New York (2005) 214- 231
  48. Rieback, M. R., Crispo, B., Tanenbaum, A. S.: Mobile Security - RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Lecture notes in computer science, Vol. 3574, Springer-Verlag, Berlin Heidelberg New York (2005) 184-194
Download


Paper Citation


in Harvard Style

Melski A., Thoroe L. and Schumann M. (2007). RFID Data Management in Supply Chains: Challenges, Approaches and Further Research Requirements . In Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2007) ISBN 978-989-8111-01-2, pages 61-74. DOI: 10.5220/0002413200610074


in Bibtex Style

@conference{iwrt07,
author={Adam Melski and Lars Thoroe and Matthias Schumann},
title={RFID Data Management in Supply Chains: Challenges, Approaches and Further Research Requirements},
booktitle={Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2007)},
year={2007},
pages={61-74},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002413200610074},
isbn={978-989-8111-01-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2007)
TI - RFID Data Management in Supply Chains: Challenges, Approaches and Further Research Requirements
SN - 978-989-8111-01-2
AU - Melski A.
AU - Thoroe L.
AU - Schumann M.
PY - 2007
SP - 61
EP - 74
DO - 10.5220/0002413200610074