RFID Applications: An Introductory and Exploratory Study
RFID Applications: An Introductory and Exploratory Study
RFID Applications: An Introductory and Exploratory Study
Faculty of Computing, Engineering & Technology Staffordshire University Stafford, ST18 0AD, UK
1, 3
Abstract
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement in RFID technology has brought advantages that are related to resource optimization, increased efficiency within business processes, and enhanced customer care, overall improvements in business operations and healthcare. Our research is part of a big project; its aim is to produce a model for mobile technology implementation of hospital patients movement process. However, the focus of this paper is to explore the main RFID components, i.e. the tag, antenna and reader. The results of the investigations conducted on the three RFID components will be used to develop our research model.
realized as a performance differentiator for a variety of commercial applications, but its capability is yet to be fully utilised.
2. RFID Evolution
RFID technology has passed through many phases over the last few decades (see figure 1). The technology has been used in tracking delivery of goods, in courier services and in baggage handling. Other applications includes automatic toll payments, departmental access control in large buildings, personal and vehicle control in a particular area, security of items which shouldnt leave the area, equipment tracking in engineering firms, hospital filing systems, etc.[4, 5]. Figure 1 shows RFID evolution over the past few decades.
1. Introduction
RFID stands for Radio Frequency Identification and is a term that describes a system of identification [1]. RFID is based on storing and remotely retrieving information or data as it consists of RFID tag, RFID reader and backend Database [2]. RFID tags store unique identification information of objects and communicate the tags so as to allow remote retrieval of their ID. RFID technology depends on the communication between the RFID tags and RFID readers. The range of the reader is dependent upon its operational frequency. Usually the readers have their own software running on their ROM and also, communicate with other software to manipulate these unique identified tags [3]. Basically, the application which manipulates tag deduction information for the end user, communicates with the RFID reader to get the tag information through antennas. Many researchers have addressed issues that are related to RFID reliability and capability [2]. RFID is continuing to become popular because it increases efficiency and provides better service to stakeholders [1]. RFID technology has been
Fig. 1 RFID evolution: Over past the few decades adapted from [6]
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010 www.IJCSI.org
The reader performs these operations one by one on each tag. A typical RFID system work cycle can be seen in figure 2.
Communication infrastructure (enable reader/RFID to work through IT infrastructure). Application software (user database/application/ interface).
5. Tags
Tags contain microchips that store the unique identification (ID) of each object. The ID is a serial number stored in the RFID memory. The chip is made up of intergrated circuit and embedded in a silicon chip [7]. RFID memory chip can be permanent or changeable depending on the read/write characteristics. Read-only and rewrite circuits are different as read-only tag contain fixed data and can not be changed without re-program electonically [5]. On the other hand, re-write tags can be programmed through the reader at any time without any limit. RFID tags can be different sizes and shapes
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010 www.IJCSI.org depending on the application and the environment at which it will be used. A variety of materials are intergrated on these tags. For example, in the case of the credit cards, small plastic peaces are stuck on various objects, and the labels. Labels are also emmbeded in a variety of objects such as documents, cloths, maufacturing mateirals etc [9]. Figure 4 demonstrates the different sizes and shapes of the RFID tags.
RFID tags can also be classified by their capabilities such as read and write data [10]. Figure 5 shows the five classifications of the RFID tags [10].
Microwave works on 2.45 GHz, it has good reader rate even faster than UHF tags. Although at this frequency the reading rate results are not the same on wet surfaces and near metals, the frequency produce better results in applications such as vehicle tracking (in and out with barriers), with approximately 1 meter of tags read range [7]. Ultra High Frequency works within a range of 860-930 MHz, it can identify large numbers of tags at one time with quick multiple read rate at a given time. So, it has a considerable good reading speed. It has the same limitation as Microwave when is applied on wet surface and near metal. However, it is faster than high frequency data transfer with a reading range of 3 meters [7]. High Frequency works on 13.56MHz and has less than one meter reading range but is inexpensive and useful for access control, items identifications on sales points etc as it can implanted inside thin things such as paper [6, 7]. Low Frequency works on 125 kHz, it has approximately half a meter reading range and mostly used for short reading range applications
There are three types of tags: the passive, semi-active and active. Semi-active tags have a combination of active and passive tags characteristics. So, mainly two types of tags (active and passive) are being used by industry and most of the RFID system [7]. The essential characteristics of RFID tags are their function to the RFID system. This is based on their range, frequency, memory, security, type of data and other characteristics. These characteristics are core for RFID performance and differ in usefulness/support to the RFID system operations [4, 11]. While considering these characteristics, figure 6 compares the active and passive tags.
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010 www.IJCSI.org such as shops, manufacturing factories, inventory control through in and out counts, access control through showing a card to the reader. These low frequency tags are mostly not affected when applied on wet and near metal surfaces [7, 9].
Near Fields: Near field uses method similar to transformer, and employs inductive coupling of the tag to the magnetic field circulating around the reader antenna (see figure 8).
6. Antennas
RFID antennas collect data and are used as a medium for tag reading [7]. It consists of the following:
(1) Patch antennas, (2) Gate antennas, (3) Linear polarized, (4) Circular polarized, (5) Di-pole or multipole antennas, (6) Stick antennas, (7) Beam-forming or phased-array element antennas, (8) Adaptive antennas, and (9) Omni directional antennas.
Far Field: Far field uses method similar to radar, backscatter reflection by coupling with the electric field.
7. RFID Reader
RFID reader works as a central place for the RFID system. It reads tags data through the RFID antennas at a certain frequency [7, 9]. Basically, the reader is an electronic apparatus which produce and accept a radio signals [15]. The antennas contains an attached reader, the reader translates the tags radio signals through antenna, depending on the tags capacity [16]. The readers consist of a build-in anti-collision schemes and a single reader can operate on multiple frequencies. As a result, these readers are expected to collect or write data onto tag (in case) and pass to computer systems. For this purpose readers can be connected using RS-232, RS-485, USB cable as a wired options (called serial readers) and connect to the computer system. Also can use WiFi as wireless options which also known as network readers [8, 12]. Readers are electronic devices which can be used as standalone or be integrated with other devices and the following components/hardware into it [12]. Power for running reader, (2) Communication interface, (3) Microprocessor, (4) Channels, (5) Controller, (6) Receiver, (7) Transmitter, (8) Memory.
The distinction between the RFID systems with far fields to the near fields is that the near fields use LF (lower frequency) and HF (higher frequency) bands [17, 18]. While RFID systems with far fields usually use longer read range UHF and microwave [17].
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010 www.IJCSI.org
9. Study Model
Our research aims to use context based knowledge management [4] to produce a model for mobile technology implementation within patients movement processes. In order to do this we need to investigate RFID feasibility and integration with hospital information systems for improving healthcare [16]. This paper explores the fundamentals of RFID technology. That is the advantages, types, limitations and applications that will further help to develop a model for hospital application. The implementation of RFID in patient flow is intended to improve healthcare especially in hospital settings. RFID technology can provide new capabilities as well as an efficient methods for several applications such as health care, access control, manage, store and analyze information inventory, business processes, and security controls through access to information [17]. The following section will describe the RFID applications [18] which will further help us to develop a model for mobile technology implementation within patients movement processes.
explored. In order to understand the benefits of RFID application in a hospital case, this paper explores general RFID applications shown in figure 10.
Object identification can be given through various ways such as barcode, biometric and RFID. RFID has two basic categories (short & long range). The short range applications need tags to be near reader, it is useful in various condition such as when a patient is required to come near the door/reader and only one person can get access (access control). The long range applications may not need tags that are closer to reader. Similar scenarios are successfully been used on various items in the warehouse (logistics) as shown in figure 9. The most common application is defined in figure 9 and is discussed in Section 10.2 together with other applications.
The system should enable the integration and optimization of resources while improving accuracy and minimizing patients transition time leading to improvements in patients services.
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010 www.IJCSI.org consider time and flow carefully and as an aspect that is very important [19].
advantages and study model. The last part explores RFID technology applications. The paper considers RFID technology as a means to provide new capabilities and efficient methods for several applications. For example, in heathcare, access control, analyzing investory information, and business processes. RFID technology needs to develop its capability to be used with computing devices. This will allow businesses to get real potential benefits of RFID technology. This study facilitates adoption of location deduction technology (RFID) in a healthcare environment and shows the importance of the technology in a real scenario and application in connection with resource optimization and improving effectiveness. However, there is no doubt in the future that many companies and organisations will benefit from RFID technology. Future Work
References
[1]
[2]
11. Conclusions
This study has identified and explained the nature of RFID technology evolution with respect to RFID applications. RFID technology will open new doors to make organisations, companies more secure, reliable, and accurate. The first part of this paper has explained and described the RFID technology and its components, and the second part has discussed the main considerations of RFID technology in terms of
[3] [4]
[5] [6]
[7]
J. Bohn, Prototypical implementation of location-aware services based on a middleware architecture for superdistributed RFID tag infrastructures, Pers Ubiquit omputing, (2008) Journal 12:155-166. J. Schwieren1, G. Vossen, A Design and Development Methodology for Mobile RFID Applications based on the ID-Services Middleware Architecture, IEEE Computer Society, (2009), Tenth International Conference on Mobile Data Management: Systems, Service and Middleware. B. Glover, & H. Bhatt, RFID Essentials, OReilly Media, Inc, Sebastopol, (2006), ISBN 0-596-00944-5. K. Ahsan, H. Shah, P. Kingston, Context Based Knowledge Management in Healthcare: An EA Approach, AMCIS 2009, Available at AIS library. S. Garfinkel, B. Rosenberg, RFID Application, Security, and Privacy, USA, (2005), ISBN: 0-321-29096-8. L. Srivastava, RFID: Technology, Applications and Policy Implications, Presentation, International Telecommunication Union, Kenya, (2005). Application Notes, Introduction to RFID Technology CAENRFID: The Art of Identification (2008).
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 3, January 2010 www.IJCSI.org
[8] [9] [10]
[14]
[15]
[16]
[17]
[18]
[19]
L. Sandip, RFID Sourcebook, IBM Press, USA, (2005) ISBN: 0-13-185137-3. T. Frank, H. Brad, M. Anand, B. Hersh, C. Anita, K. John, RFID Security, (2006) ISBN: 1-59749-047-4. A. Narayanan, S. Singh & M. Somasekharan, Implementing RFID in Library: Methodologies, Advantages and Disadvantages, (2005). Intermec, ABCs of RFID: Understanding and using radio frequency identification, White Paper, (2009). E. Zeisel & R. Sabella, RFID+, Exam Cram, (2006), ISBN: 0-7897-3504-0. US. Department of Homeland Security, Additional Guidence and Security Controls are needed over Systems using RFID and DHS, Department of Homeland Security (Office of Inspector General), (2006), OIG-06-53. US. Department of Homeland Security, Enhanced Security Controls needed for US-Visits System using RFID Technology, Department of Homeland Security (Office of Inspector General), (2006), OIG-06-39. US. Government Accountability Office, Information Security: Radio Frequency Identification Technology in the Federal Government, (2005), Report to Congressional Requesters, GAO-05-551. K. Ahsan, H. Shah, P. Kingston, Role of Enterprise Architecture in healthcare IT, Proceeding ITNG2009, (2009), IEEE. Y. Meiller & S. Bureau, Logistics Projects: How to Assess the Right System? The Case of RFID Solutions in Healthcare, Americas Conference on Information Systems (AMCIS) 2009 Proceedings, Association for Information Systems Year 2009. R. Parks, W. Yao & C. H. Chu, RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector, Americas Conference on Information Systems (AMCIS) 2009 Proceedings, Association for Information Systems Year 2009. S. Shepard, (2005), RFID Radio Frequency Identification, (2005), USA, ISBN:0-07-144299-5.
Paul Kingston is Professor of Health Sciences and Director of the Centre for Ageing and Mental Health at Staffordshire University. Professor Kingston has 34 years of experience as a Healthcare researcher and also practitioner. He has presented 101 conference papers in a number of different countries. He has co-authored or authored 7 books, and contributed 11 chapters. He has seen 33 journal articles published, produced 10 reports/ monographs, and 3 working papers. Additionally Paul has been involved in the development of training material in the area of adult protection and was a key founder of the charity Action on Elder Abuse. Furthermore he is a consulting editor for the Journal of Elder Abuse and Neglect. Over the last ten years Paul has developed a strong and respected track record for developing research activity. During ten years he was either in receipt of, co-managing, or leading awards totaling 1,785,633.
Kamran AHSAN has an MSc in Mobile Computer Systems from Staffordshire University in Computer Science from University of Karachi. Kamran is a PhD researcher and lecturer in FCET (Faculty of Computing, Engineering and Technology) and, web researcher in Centre for Ageing and Mental Health, Staffordshire University, UK since 2005. He has published 10 research papers so far. He has involved in several research funding (UK) includes KTP, NHS Trust, Index Vouchers etc. He is Visiting Faculty at University of Karachi. He is a consultant to businesses in IT applications, software development and web tools. His research interests are mobile technology applications in healthcare including knowledge management. Hanifa Shah is Professor of Information Systems and Director of the Centre for Information, Intelligence & Security Systems at Staffordshire University. She is also a Visiting Professor at Manchester University. Professor Shah has 30 years of experience as an IS/IT researcher and also practitioner. She is a Fellow of the British Computer Society and has led both UK Research Council (EPSRC) funded and industrially funded research projects. Her research has resulted in publications in international journals and conferences. She has research interests in a number of areas including the development of IS/IT systems, enterprise architecture, knowledge management, mobile technology based information systems, universityindustry collaborations, learning through action research and the professional development of IS/IT practitioners in industry.