使用RFID技术来构建物联网.ppt

上传人:wuy****n92 文档编号:62811444 上传时间:2022-11-22 格式:PPT 页数:13 大小:207.99KB
返回 下载 相关 举报
使用RFID技术来构建物联网.ppt_第1页
第1页 / 共13页
使用RFID技术来构建物联网.ppt_第2页
第2页 / 共13页
点击查看更多>>
资源描述

《使用RFID技术来构建物联网.ppt》由会员分享,可在线阅读,更多相关《使用RFID技术来构建物联网.ppt(13页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、Building the Internetof Things Using RFIDGeng Qiang2010-6-7OutlineAbstractionBackgroundThe RFID EcosystemUser-level toolsRFID-Based Web ApplicationsConclusionAbstractionAt the University of Washington,the RFID Ecosystem creates a microcosm for the Internet of Things.The authors developed a suite of

2、Web-based,user-level tools and applications designed to empower users by facilitating their understanding,management,and control of personal RFID data and privacy settings.They deployed these applications in the RFID Ecosystem and conducted a four-week user study to measure trends in adoption and ut

3、ilization of the tools and applications as well as users qualitative reactions.BackgroundThe rapid proliferation of passive RFID tags in the past decade has given rise to various concepts that integrate the physical world with the virtual one.Given numerous predictions that well have hundreds of bil

4、lions of RFID-tagged objects at approximately five cents per tag by 2015,1 were not only approaching such a world,were on its doorstep.BackgroundThe incredible amount of information captured by a trillion RFID tags will have a tremendous impact on our lives.However,questions remain if we are to use

5、RFID in the IoT.How do we transform low-level RFID data into meaningful,high-level information?Can we design and build applications that are truly useful and not just novelties?If so,will their utility outweigh the potential loss of privacy,and how can we help users understand and control their priv

6、acy settings?The RFID EcosystemWe built the RFID Ecosystem around an Electronic Product Code(EPC)Class-1 Generation-2 RFID deployment that spans all seven floors of our 8,000-square-meter computer science and engineering building.All readers in our deployment run custom software that processes new R

7、FID data before streaming it to the central server.User-level toolsTransforming Low-Level RFID DataControlling PrivacyTransforming Low-Level RFID DataTo support transforming TREs into higher-level events,we built tools that let users directly define metadata and associate it with tags and antennas.O

8、ne such tool,the Tag Manager,presents a highly interactive set of menus,tables,and Web forms for creating and managing metadata on a users tags and personal objects.Transforming Low-Level RFID DataA second tool,the Place Manager,supports creating and editing high-level location information items,cal

9、led places.A place in the RFID Ecosystem is a set of one or more RFID antennas with a label.Controlling PrivacyRFID security and privacy present many challenges,and potential solutions,from hardware and wireless protocol security to the management,regulation,and sharing of collected RFID data.Our pr

10、ivacy work in the RFID Ecosystem has focused on controlling access to collected RFID data.Controlling PrivacyAs such,we accomplish privacy control in the ecosystem chiefly through personal data auditing and by enforcing novel access-control policies.Two tools let users directly interact with their p

11、ersonal RFID data and with the access-control framework that governs data disclosure.Both can operate in conjunction with our physical access control(PAC)policyRFID-Based Web ApplicationsA Search Engine for ThingsWe implemented a Web interface that lets users view the last recorded location for thei

12、r tagged objects or search for a particular objects location.Social ApplicationsSome of the most popular Web services offer information and updates on activities in our social networksEvent-Based Desktop SearchThe log of events that applications such as the Digital Diary collect can also enable sear

13、ch based applications that leverage a users memory of events in the physical world.ConclusionBased on our study results,we feel that RFID-based personal object and friend tracking are promising,basic services for the IoT that our tools can quickly enable.One key problem we must overcome is achieving

14、 a sufficient density of tags and users.Another problem is finding techniques that improve or compensate for low tag-read rates were currently exploring using stricter tag-mounting strategies as well as probabilistic data management.We also conclude that although context-aware access control seems to be a useful,easily understood abstraction for managing location privacy,more evaluation is needed to determine whether it meets users needs when privacy concerns are magnified.

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育专区 > 大学资料

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁