《使用RFID技术来构建物联网.ppt》由会员分享,可在线阅读,更多相关《使用RFID技术来构建物联网.ppt(13页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、Building the Internetof Things Using RFIDGeng Qiang2010-6-7OutlineAbstractionBackgroundThe RFID EcosystemUser-level toolsRFID-Based Web ApplicationsConclusionAbstractionAt the University of Washington,the RFID Ecosystem creates a microcosm for the Internet of Things.The authors developed a suite of
2、Web-based,user-level tools and applications designed to empower users by facilitating their understanding,management,and control of personal RFID data and privacy settings.They deployed these applications in the RFID Ecosystem and conducted a four-week user study to measure trends in adoption and ut
3、ilization of the tools and applications as well as users qualitative reactions.BackgroundThe rapid proliferation of passive RFID tags in the past decade has given rise to various concepts that integrate the physical world with the virtual one.Given numerous predictions that well have hundreds of bil
4、lions of RFID-tagged objects at approximately five cents per tag by 2015,1 were not only approaching such a world,were on its doorstep.BackgroundThe incredible amount of information captured by a trillion RFID tags will have a tremendous impact on our lives.However,questions remain if we are to use
5、RFID in the IoT.How do we transform low-level RFID data into meaningful,high-level information?Can we design and build applications that are truly useful and not just novelties?If so,will their utility outweigh the potential loss of privacy,and how can we help users understand and control their priv
6、acy settings?The RFID EcosystemWe built the RFID Ecosystem around an Electronic Product Code(EPC)Class-1 Generation-2 RFID deployment that spans all seven floors of our 8,000-square-meter computer science and engineering building.All readers in our deployment run custom software that processes new R
7、FID data before streaming it to the central server.User-level toolsTransforming Low-Level RFID DataControlling PrivacyTransforming Low-Level RFID DataTo support transforming TREs into higher-level events,we built tools that let users directly define metadata and associate it with tags and antennas.O
8、ne such tool,the Tag Manager,presents a highly interactive set of menus,tables,and Web forms for creating and managing metadata on a users tags and personal objects.Transforming Low-Level RFID DataA second tool,the Place Manager,supports creating and editing high-level location information items,cal
9、led places.A place in the RFID Ecosystem is a set of one or more RFID antennas with a label.Controlling PrivacyRFID security and privacy present many challenges,and potential solutions,from hardware and wireless protocol security to the management,regulation,and sharing of collected RFID data.Our pr
10、ivacy work in the RFID Ecosystem has focused on controlling access to collected RFID data.Controlling PrivacyAs such,we accomplish privacy control in the ecosystem chiefly through personal data auditing and by enforcing novel access-control policies.Two tools let users directly interact with their p
11、ersonal RFID data and with the access-control framework that governs data disclosure.Both can operate in conjunction with our physical access control(PAC)policyRFID-Based Web ApplicationsA Search Engine for ThingsWe implemented a Web interface that lets users view the last recorded location for thei
12、r tagged objects or search for a particular objects location.Social ApplicationsSome of the most popular Web services offer information and updates on activities in our social networksEvent-Based Desktop SearchThe log of events that applications such as the Digital Diary collect can also enable sear
13、ch based applications that leverage a users memory of events in the physical world.ConclusionBased on our study results,we feel that RFID-based personal object and friend tracking are promising,basic services for the IoT that our tools can quickly enable.One key problem we must overcome is achieving
14、 a sufficient density of tags and users.Another problem is finding techniques that improve or compensate for low tag-read rates were currently exploring using stricter tag-mounting strategies as well as probabilistic data management.We also conclude that although context-aware access control seems to be a useful,easily understood abstraction for managing location privacy,more evaluation is needed to determine whether it meets users needs when privacy concerns are magnified.