DESIGNINGAND DEPLOYINGRFID APPLICATIONS EditedbyCristinaTurcu Designing and Deploying RFID Applications Edited by Cristina Turcu Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Davor Vidic Technical Editor Teodora Smiljanic Cover Designer Martina Sirotic Image Copyright Albert Lozano, 2010. Used under license from Shutterstock.com First published August, 2011 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Designing and Deploying RFID Applications, Edited by Cristina Turcu p. cm. ISBN 978-953-307-265-4 free online editions of InTech Books and Journals can be found at www.intechopen.com Contents Preface IX Chapter 1 Impacts of RFID on Business Models 1 Ela Sibel Bayrak Meydanoğlu Chapter 2 Commercial and Implementation Issues Relating to the Widespread Acceptance and Adoption of Radio Frequency Identification Technology 11 Mark J. Rodrigues and Kieran James Chapter 3 The Role of RFID Technology in Supply Chain Risk Management 23 May Tajima Chapter 4 Secure RFID for Humanitarian Logistics 41 Gianmarco Baldini, Franco Oliveri, Hermann Seuschek, Erwin Hess and Michael Braun Chapter 5 Applications of RFID Technology in the Complex Product Assembly Executive Process 59 Huibin Sun Chapter 6 Using RFID Technology for Simplification of Retail Processes 77 Azra Bayraktar, Erdal Yılmaz and Şakir Erdem Chapter 7 A Solution with Security Concern for RFID-Based Track & Trace Services in EPCglobal-Enabled Supply 95 Wei He, Yingjiu Li, Kevin Chiew, Tieyan Li and Eng Wah Lee Chapter 8 Discovery Services in the EPC Network 109 Martin Lorenz, Jürgen Müller, Matthieu-P. Schapranow, Alexander Zeier and Hasso Plattner VI Contents Chapter 9 Advantages and New Applications of DHT-Based Discovery Services in EPCglobal Network 131 Juan Pedro Muñoz-Gea, Pilar Manzanares-Lopez and Josemaria Malgosa-Sanahuja Chapter 10 Application of RFID and Mobile Technology to Plaster Board Waste in the Construction Industry 157 Lizong Zhang, Anthony S. Atkins and Hongnian Yu Chapter 11 RFID-Based Equipment Monitoring System 175 Mohd Helmy Abd Wahab, Herdawatie Abdul Kadir, Zarina Tukiran, Nor’aisah Sudin, Mohd Hafiz A. Jalil and Ayob Johari Chapter 12 Developing RFID-Based Instruments Maintenance Management in Construction Lab 189 Yu-Cheng Lin, Weng-Fong Cheung, Yi-Chuan Hsieh, Fu-Cih Siao and Yu-Chih Su Chapter 13 What are Authentic Pharmaceuticals Worth? 203 Matthieu Schapranow, Jürgen Müller, Martin Lorenz, Alexander Zeier and Hasso Plattner Chapter 14 Security Control and Privacy Preservation in RFID enabled Wine Supply Chain 221 Manmeet Mahinderjit-Singh, Xue LI and Zhanhuai LI Chapter 15 An RFID-Based Anti-Counterfeiting Track and Trace Solution 251 Ioan Ungurean, Cornel Turcu, Vasile Gaitan and Valentin Popa Chapter 16 A Knowledge-Based Approach for Detecting Misuses in RFID Systems 267 Gennaro Della Vecchia and Massimo Esposito Chapter 17 A Study on Implementation and Service of Digital Watermark Technology Architecture for Distribution Management 289 Manabu Hirakawa Chapter 18 RFID Middleware Design and Architecture 305 Mehdia Ajana El Khadda, Mohammed Boulmalf, Hamid Harroud and Mohammed Elkoutbi Chapter 19 A Study on the Influence of RFID Tagging on Circulation Services and Collection Management: a Case Study of the Taipei Public Library 327 Shu-hsien Tseng and Chien-ju Chou Contents VII Chapter 20 The Right UHF RFID Tags for Libraries – Criteria, Concern and Issues 345 Steve H Ching, Alice Tai, Henry Ip, Lau Lap Fai and Michael Cheng Chapter 21 RFID- Application in Info-Documentary Systems 363 Angela Repanovici and Luciana Cristea Preface Radio Frequency Identification (RFID), a method of remotely storing and receiving data using devices called RFID tags, brings many real business benefits to today worldʹs organizations.Itexertsamajorinfluence indifferentlifeareaslikeinventory tracking, modern supply chain management, automated manufacturing, healthcare, etc. The benefits are multiple and inclu de expedited data capture/lead retrieval, accurate and trusted data, reduced cost, time and work processes, increased speed, productivityandbusinessefficiency,improvedsecurity,etc. Today, there are many companies offering RFID hardware, RFID tags, or dedicated solutionsforboth. It isajointeffortofresearchers andscientiststoenablecustomers from different areas to deploy high performance solutions by understanding their demands.Thesedemandsareconvertedintoinnovativeproductswhicharedelivered asviableandreliablesolutions,atcompetitiveprices. Over the years, RFID research has resulted in many concrete achievements and also contributedtothecreationofcommunitiestha tbringscientistsandengineerstogether withusers. This book includesvaluableresearchstudiesoftheexperiencedscientists inthefieldofRFID,includingmostrecentdevelopments. Chapter 1 aims at illustratingand clarifyingthe impact of RFID on business models, anessentialfactforcompaniestocreateabusinessvaluebyusingRFIDtechnologyin ordertogaincompetitiveadvantage. Chapter 2 examines the perceptions of RFID among Australian RFID suppliers/integrators,andtheroleandimportancethatperceptionsplayintheactual adoptionprocess.Theauthors’interview‐basedresearchstudyshowsthatintegrators’ perceptionscanaffecttheadoptionprocess.Thus,integ ratorperceptionscanactupon presentexpectationsofRFIDtechnology. Chapter 3 deals with the role of RFID technology in supply chain risk management. This research shows that RFID technology holds great promiseformanaging supply disruptions and for containing their harmful ripple effects. Also, a review of the literature is co nducted to identify specific risks associated with RFID’s capability to provide supply chain visibility. The research goes on to examine the existing X Preface mitigation approaches for dealing with RFID’s visibility‐related risks. Finally, the managementimplicationsofRFIDuseinsupplychainriskmanagement areoutlined, basedonbothadvantagesandrisks. Chapter4describesthemainfeaturesandchallengesofhumanitarianlogistics,along with the role of RFID technology in disaster supply chains and the implementation andd eploymentofsecureRFID. Chapter5introd uces twotypicalapplicationcasesofRFIDtechnologyintheexecutive process of complex product assembly. The first one solves the asynchrony problem between the logistics stream and the information stream in the executive process of complex product assembly. The second one address es the guidance of the on‐spot assemblyoperation,andachievesdynamicmatchingmechanismbetween3Dmodels and real‐size counter parts. Both these cases are discussed from methodology and implementation. They illustrate the potential of applying RFID technology in enhancing the controlling and monitoring methods of the executive process of complexproductassembly. The broad objective of chapter 6 is to show how RFID technology can be used to simplify the retail processes. The major aim of the considered study is to create a simpleRFID‐based processmodelfor retailers.Also,theauthorspresentacasestudy ofTurkishretailindu stry. In chapter 7 the authors analyze and discuss the technology and issues on RFID applications in supply chains for track & trace services, such as item identification, event capture and management, information storage and sharing among all participants in a supply chain. Also, they introduce an RFID‐based track & trace solutionwithsecurityconcernsinsupplychainsbasedonEPCglobalstandards. In chapter 8, the authorsexaminecloselythe discovery services in the EPC network. EPCglobal provides an infrastructure to increase visibility and efficiency throughout the supply chain as well as to guarantee higher quality information flow between companiesandtheirtradingp artners.Thepresentchaptershowsrealworldus ecases thatrequireadiscoveryservice.Furthermor e,theauthorsderivefunctionalaswellas non‐functional requirements from these use cases. They also discuss the implications oftheserequirementsregardingpossiblediscoveryservicedesigns. In chapter 9 th e authors analyze the advantages of implementing the Discovery Services (DS) component of the EPCglobal Network architecture using a Distributed Hash Table (DHT) application. Moreover, they demonstrate the possibility of developingnewapplicationsovertheDHT‐baseddiscoveryservices. Thecurrentplasterboarddisposalsituationwasintroducedinchapter10andalso,the logistic problem, a barrier to an increased recycling rate, was addressed in the same context.Aprototypesystemforwastemanagementwasoutlined. [...]... 2008 (AIM RFID Connections, 2003) Recent research from IDTechEx reports that ‘the next 10 years will see a rapid gain in market share of mainstream printed 16 Designing and Deploying RFID Applications and chipless RFID tags, and that the numbers sold globally will rise from 40 million in 2009 to 624 billion in 2 019 (Das and Harrop, 2 010 ) ABI Research sees continuing strong growth potential in RFID markets... their consequences’ (Thomas and Znaniecki, 19 27, p.8, cited in Rogers, 19 95, p.209) This project also examines how integrators’ perceptions can act upon present expectations of RFID technology An understanding of what leading integrators think at this moment may benefit vendors and others to create applications that will eventually secure more 12 Designing and Deploying RFID Applications widespread acceptance... Üstündağ, A (2008) RFID ve Tedarik Zinciri, Sistem Yayıncılık, ISBN 978-975-322- 515 -1, İstanbul Weber, T (2003) The Future of Shopping, BBC News Article, 04. 01. 2 011 , Available from http://news.bbc.co.uk/2/hi/business/3 712 2 61. stm 2 Commercial and Implementation Issues Relating to the Widespread Acceptance and Adoption of Radio Frequency Identification Technology 1Master Mark J Rodrigues1 and Kieran James2... deployment of RFID tags from 2005 to 2 015 (Raafat et al., 2007) In an environment, in which the use of RFID increases rapidly, companies have to use RFID in order to outmatch and not to lose market share Year Kategories in which tags are used Item Pallet/Case Other All Kategories Total 2005 2 010 2 015 0.5 0.4 0.4 1. 3 27.0 30.0 5.7 62.7 1, 000.0 35.0 12 .5 1, 047.5 Table 4 Forecast for global sales of RFID tags... Systems, 2003) 8 • Designing and Deploying RFID Applications As mentioned above RFID enhances transaction efficiency that gives rise also to cost reductions For example, automation of some processes (e.g checkouts, incoming goods control) via RFID causes a reduction both at labor costs and costs that incur to rectify errors caused by manual execution (Erickson and Kelly, 2007) 6.4 RFID and value creation... by RFID: 6 • • • Designing and Deploying RFID Applications Through creating a new way of conducting economic transactions among trading partners: RFID enables to form new strategic networks such as buyer-supplier partnerships, pay-per-use business models As RFID used in these networks provides various advantages (e.g cost reduction, superior customer service level) for companies, they want to be a partner... Despite this declaration it seems that the rapid deployment of RFID cannot be prevented, because both technical and regulative countermeasures are available to protect data privacy 8 References Betz, F (2002) Strategic Business Models, Engineering Management Journal, Vol 14 , No 1, (March, 2002), pp 21- 27 10 Designing and Deploying RFID Applications Bohn, J., Coroamă, V., Langheinrich, M., Mattern,... Standards and Technology (NIST), NIST Special Publication 800-98, Computer Security Division Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg Kavas, A (2007): Radyo Frekans Tanımlama Sistemleri, Elektrik Mühendisliği Dergisi, Sayı 430, (Nisan, 2007), pp 74-80 Kış, M (2006) RFID nin Geleceği, 21. 01. 2 011 , Available from http://kodveus.blogspot.com/2006/05/rfidnin-gelecei.html... Using RFID in Supply Chain Management for Customer Service, Proceedings of 2006 IEEE International Conference on Systems, Man and Cybernetics, pp 13 77 -13 81, ISBN: 1- 4244-0099-6, Tapei, Taiwan, October 8 -11 , 2006 Osterwalder, A.; Pigneur, Y & Tucci, C L (2005) Clarifying Business Models: Origins, Present, and Future of the Concept, Communications of the Association for Information Systems (CAIS), Vol 15 ,... (2002, p.6 91) where they state that ‘[t]echnology exists and the company is trying to use it In doing so, the company may find 14 Designing and Deploying RFID Applications problems that no one knew existed’ When this occurs people may modify or stop using the technology Rogers (19 95, p.320) explains that, just as critical mass is added quickly, it can also rapidly fall away as people abandon an innovation . DESIGNING AND DEPLOYING RFID APPLICATIONS EditedbyCristinaTurcu Designing and Deploying RFID Applications Edited by Cristina. Alexander Zeier and Hasso Plattner Chapter 14 Security Control and Privacy Preservation in RFID enabled Wine Supply Chain 2 21 Manmeet Mahinderjit-Singh, Xue LI and Zhanhuai LI Chapter 15 An RFID- Based. value can be proposed by RFID: Designing and Deploying RFID Applications 6 • Through creating a new way of conducting economic transactions among trading partners: RFID enables to form new