The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2009 vol.13)
pp: 48-55
Evan Welbourne , University of Washington
Leilani Battle , University of Washington
Garret Cole , University of Washington
Kayla Gould , Western Oregon University
Kyle Rector , University of Washington
Samuel Raymer , University of Washington
Magdalena Balazinska , University of Washington
Gaetano Borriello , University of Washington
ABSTRACT
At the University of Washington, the RFID Ecosystem creates a microcosm for the Internet of Things. The authors developed a suite of Web-based, user-level tools and applications designed to empower users by facilitating their understanding, management, and control of personal RFID data and privacy settings. They deployed these applications in the RFID Ecosystem and conducted a four-week user study to measure trends in adoption and utilization of the tools and applications as well as users' qualitative reactions.
INDEX TERMS
Internet of Things, Web 2.0, RFID, user study, applications, tools
CITATION
Evan Welbourne, Leilani Battle, Garret Cole, Kayla Gould, Kyle Rector, Samuel Raymer, Magdalena Balazinska, Gaetano Borriello, "Building the Internet of Things Using RFID: The RFID Ecosystem Experience", IEEE Internet Computing, vol.13, no. 3, pp. 48-55, May/June 2009, doi:10.1109/MIC.2009.52
REFERENCES
1. Complete RFID Analysis and Forecasts, 2008–2018, www.idtechex.com/researchreports/.
2. T. Kriplean et al., "Physical Access Control for Captured RFID Data," IEEE Pervasive Computing, vol. 6, no. 4, 2007, pp. 48-55.
3. V. Rastogi et al., "Access Control over Uncertain Data," Proc. 34th Int'l Conf. Very Large Databases (VLDB 08), VLDB Endowment, 2008, pp. 821–832.
4. E. Welbourne et. al., "Cascadia: A System for Specifying, Detecting, and Managing RFID Events," Proc. 6th Int'l Conf. Mobile Systems, Applications and Services (MobiSys 08), ACM Press, 2008, pp. 281–294.
5. J. Hightower et al., "Learning and Recognizing the Places We Go," Proc. 7th Int'l Conf. Ubiquitous Computing (Ubicomp 05), vol. 3660, Springer, 2005, pp. 159–176, 2005.
6. A. Juels, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas in Comm., vol. 24, Feb. 2006, pp. 381–394.
7. M. Langheinrich, "A Survey of RFID Privacy Approaches," Personal and Ubiquitous Computing, Springer, Oct. 2008.
8. A. Nemmaluri et al., "Sherlock: Automatically Locating Objects for Humans," Proc. 6th Int'l Conf. Mobile Systems, Applications and Services (MobiSys 08), ACM Press, 2008, pp. 187–198.
9. M. Philipose et al., "Inferring Activities from Interactions with Objects," IEEE Pervasive Computing, vol. 3, no. 4, 2004, pp. 10–17.
10. E. Welbourne et al., "Longitudinal Study of a Building-Wide RFID Ecosystem," to appear in Proc. 7th Int'l Conf. Mobile Systems, Applications, and Services (Mobicomp), June 2009.
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool