[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1806338.1806396acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

A RFID architecture framework for global supply chain applications

Published: 14 December 2009 Publication History

Abstract

RFID technology promises to revolutionize supply chains and usher in a new era of cost savings, efficiency and business intelligence. The use of low cost RFID devices in supply chain management systems has been increasing dramatically. While a lot of research has been carried out in trying to make a completely RFID enabled global supply chain a reality there still remains a number of hurdles to be surmounted before that vision can be realized. In this paper, we analyze the specific requirements of a RFID enabled global supply chain. Then we develop and present a RFID architecture that is optimized for developing global supply chain applications but is also fully compatible with the currently used RFID architectures. Finally we do a comparative analysis of our framework with the current RFID architecture standard showing our framework has a number of significant advantages over it.

References

[1]
Asif, Z. and M. Mandviwalla, Integrating the supply chain with RFID: A technical and business analysis. Communications of the Association for Information Systems, 2005. 15(24): p. 393--426.
[2]
Michael, K. and L. McCathie. The pros and cons of RFID in supply chain management. in ICMB 2005. 2005.
[3]
Li, S. and J. K. Visich, Radio frequency identification: supply chain impact and implementation challenges. International Journal of Integrated Supply Management, 2006. 2(4): p. 407--424.
[4]
Tajima, M., Strategic value of RFID in supply chain management. Journal of Purchasing and Supply Management, 2007. 13(4): p. 261--273.
[5]
Armenio, F., et al. The EPCglobal Architecture Framework. 2007 {cited 2009 February 12th}; Available from: http://www.epcglobalinc.org/standards/architecture/architecture_1_2-framework-20070910.pdf.
[6]
Schuster, E. W., S. J. Allen, and D. L. Brock, Global RFID. 2007, Berlin Heidelberg: Springer.
[7]
Michael, K. and L. McCathie. The pros and cons of RFID in supply chain management. in Mobile Business, 2005. ICMB 2005. International Conference on. 2005.
[8]
Glover, B. and H. Bhatt, RFID Essentials. 2006: O' Reilly Media.
[9]
Wu, N. C., et al., Challenges to global RFID adoption. Technovation, 2006. 26(12): p. 1317--1323.
[10]
Floerkemeier, C. and M. Lampe, RFID middleware design: addressing application requirements and RFID constraints, in Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies. 2005, ACM: Grenoble, France.
[11]
Floerkemeier, C. and M. Lampe, RFID middleware design: addressing application requirements and RFID constraints, in joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies. 2005, ACM: Grenoble, France.
[12]
Knospe, H. and H. Pohl, RFID security. Information Security Technical Report, 2004. 9(4): p. 39--50.
[13]
Chien, H.-Y., SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. Transactions on Dependable and Secure Computing, 2007. 4(4): p. 337--340.
[14]
Juels, A., RFID security and privacy: a research survey. Selected Areas in Communications, IEEE Journal on, 2006. 24(2): p. 381--394.
[15]
Hassan, T. and S. Chatterjee. A Taxonomy for RFID. in 39th Annual Hawaii International Conference on System Sciences. 2006. Hawai.
[16]
Abawajy, J. Enhancing RFID Tag Resistance against Cloning Attack. in IEEE International Conference on Network and Systems Security. 2009. Shanghai, China.
[17]
Ranasinghe, D. C., et al. A Distributed Architecture for a Ubiquitous RFID Sensing Network. in Intelligent Sensors, Sensor Networks and Information Processing Conference, 2005. Proceedings of the 2005 International Conference on. 2005.
[18]
Christian, F. and L. Matthias, RFID middleware design: addressing application requirements and RFID constraints, in Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies. 2005, ACM: Grenoble, France.
[19]
Jeffery, S. R., M. Garofalakis, and M. J. Franklin, Adaptive cleaning for RFID data streams, in Proceedings of the 32nd international conference on Very large data bases. 2006, VLDB Endowment: Seoul, Korea.
[20]
Solanas, A., et al., A distributed architecture for scalable private RFID tag identification. Computer Networks, 2007. 51(9): p. 2268--2279.

Cited By

View all
  • (2015)Policy-based SQLIA detection and prevention approach for RFID systemsComputer Standards & Interfaces10.1016/j.csi.2014.08.00538:C(64-71)Online publication date: 1-Feb-2015
  • (2013)Malware Detection and Prevention in RFID SystemsInternet of Things and Inter-cooperative Computational Technologies for Collective Intelligence10.1007/978-3-642-34952-2_6(143-166)Online publication date: 2013
  • (2012)Automation of the Approval and Control Process of DocumentsOrganizational Integration of Enterprise Systems and Resources10.4018/978-1-4666-1764-3.ch016(289-302)Online publication date: 2012
  • Show More Cited By

Index Terms

  1. A RFID architecture framework for global supply chain applications

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    iiWAS '09: Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services
    December 2009
    763 pages
    ISBN:9781605586601
    DOI:10.1145/1806338
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Johannes Kepler University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 December 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RFID
    2. architectural framework
    3. network
    4. supply chain

    Qualifiers

    • Research-article

    Conference

    iiWAS '09
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)Policy-based SQLIA detection and prevention approach for RFID systemsComputer Standards & Interfaces10.1016/j.csi.2014.08.00538:C(64-71)Online publication date: 1-Feb-2015
    • (2013)Malware Detection and Prevention in RFID SystemsInternet of Things and Inter-cooperative Computational Technologies for Collective Intelligence10.1007/978-3-642-34952-2_6(143-166)Online publication date: 2013
    • (2012)Automation of the Approval and Control Process of DocumentsOrganizational Integration of Enterprise Systems and Resources10.4018/978-1-4666-1764-3.ch016(289-302)Online publication date: 2012
    • (2012)A Security Framework for Networked RFIDInternet and Distributed Computing Advancements10.4018/978-1-4666-0161-1.ch004(85-114)Online publication date: 2012
    • (2011)Mutual Authentication Protocol for Networked RFID SystemsProceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2011.54(417-424)Online publication date: 16-Nov-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media