This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Building the Internet of Things Using RFID: The RFID Ecosystem Experience
May/June 2009 (vol. 13 no. 3)
pp. 48-55
Evan Welbourne, University of Washington
Leilani Battle, University of Washington
Garret Cole, University of Washington
Kayla Gould, Western Oregon University
Kyle Rector, University of Washington
Samuel Raymer, University of Washington
Magdalena Balazinska, University of Washington
Gaetano Borriello, University of Washington
At the University of Washington, the RFID Ecosystem creates a microcosm for the Internet of Things. The authors developed a suite of Web-based, user-level tools and applications designed to empower users by facilitating their understanding, management, and control of personal RFID data and privacy settings. They deployed these applications in the RFID Ecosystem and conducted a four-week user study to measure trends in adoption and utilization of the tools and applications as well as users' qualitative reactions.

1. Complete RFID Analysis and Forecasts, 2008–2018, www.idtechex.com/researchreports/.
2. T. Kriplean et al., "Physical Access Control for Captured RFID Data," IEEE Pervasive Computing, vol. 6, no. 4, 2007, pp. 48-55.
3. V. Rastogi et al., "Access Control over Uncertain Data," Proc. 34th Int'l Conf. Very Large Databases (VLDB 08), VLDB Endowment, 2008, pp. 821–832.
4. E. Welbourne et. al., "Cascadia: A System for Specifying, Detecting, and Managing RFID Events," Proc. 6th Int'l Conf. Mobile Systems, Applications and Services (MobiSys 08), ACM Press, 2008, pp. 281–294.
5. J. Hightower et al., "Learning and Recognizing the Places We Go," Proc. 7th Int'l Conf. Ubiquitous Computing (Ubicomp 05), vol. 3660, Springer, 2005, pp. 159–176, 2005.
6. A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas in Comm., vol. 24, Feb. 2006, pp. 381–394.
7. M. Langheinrich, "A Survey of RFID Privacy Approaches," Personal and Ubiquitous Computing, Springer, Oct. 2008.
8. A. Nemmaluri et al., "Sherlock: Automatically Locating Objects for Humans," Proc. 6th Int'l Conf. Mobile Systems, Applications and Services (MobiSys 08), ACM Press, 2008, pp. 187–198.
9. M. Philipose et al., "Inferring Activities from Interactions with Objects," IEEE Pervasive Computing, vol. 3, no. 4, 2004, pp. 10–17.
10. E. Welbourne et al., "Longitudinal Study of a Building-Wide RFID Ecosystem," to appear in Proc. 7th Int'l Conf. Mobile Systems, Applications, and Services (Mobicomp), June 2009.

Index Terms:
Internet of Things, Web 2.0, RFID, user study, applications, tools
Citation:
Evan Welbourne, Leilani Battle, Garret Cole, Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, Gaetano Borriello, "Building the Internet of Things Using RFID: The RFID Ecosystem Experience," IEEE Internet Computing, vol. 13, no. 3, pp. 48-55, May-June 2009, doi:10.1109/MIC.2009.52
Usage of this product signifies your acceptance of the Terms of Use.