Abstract
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various sources of error in passive RFID systems, which can make the reliable operation of RFID augmented applications a challenge. To illustrate these sources of error, we equipped playing cards with RFID tags and measured the performance of the RFID system during the different stages of a typical card game. The paper also shows how appropriate system design can help to deal with the imperfections associated with RFID.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Decker, C., Kubach, U., Beigl, M.: Revealing the retail black box by interaction sensing. In: Proceedings of the ICDCS 2003, Providence, Rhode Island (2003)
Finkenzeller, K.: RFID Handbook: Radio-Frequency Identification Fundamentals and Applications. John Wiley & Sons, Chichester (2000)
Römer, K., Domnitcheva, S.: Smart playing cards: A ubiquitous computing game. Journal for Personal and Ubiquitous Computing (PUC) 6 (2002)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–470. Springer, Heidelberg (2003)
Vogt, H.: Efficient object identification with passive RFID tags. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, pp. 98–113. Springer, Heidelberg (2002)
Wan, D.: Magic medicine cabinet: A situated portal for consumer healthcare. In: Proceedings of the International Symposium on Handheld and Ubiquitous Computing, Karlsruhe, Germany (1999)
Want, R., Fishkin, K.O., Gujar, A., Harrison, B.L.: Bridging physical and virtual worlds with electronic tags. In: Proc. of ACM SIGCHI, May 1999, pp. 370–377 (1999)
Weiser, M.: The computer of the 21st century. Scientific American, 94–100 (September 1991)
Wieselthier, J.E., Ephremides, A., Michaels, L.A.: An exact analysis and performance evaluation of framed aloha with capture. IEEE Transactions on Communications, COM 37(2), 125–137 (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Floerkemeier, C., Lampe, M. (2004). Issues with RFID Usage in Ubiquitous Computing Applications. In: Ferscha, A., Mattern, F. (eds) Pervasive Computing. Pervasive 2004. Lecture Notes in Computer Science, vol 3001. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24646-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-24646-6_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21835-7
Online ISBN: 978-3-540-24646-6
eBook Packages: Springer Book Archive