1 / 18

Evan Welbourne University of Washington, CSE July 2008 Seattle, WA

Evan Welbourne University of Washington, CSE July 2008 Seattle, WA. Image credit: Tom Reese, The Seattle Times. RFID = Radio Frequency Identification. Radio Frequency Identification. Wireless identification and tracking Information on: Identity Location Time. A. B. C.

armine
Download Presentation

Evan Welbourne University of Washington, CSE July 2008 Seattle, WA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Evan WelbourneUniversity of Washington, CSEJuly 2008Seattle, WA

  2. Image credit: Tom Reese, The Seattle Times RFID=Radio Frequency Identification

  3. Radio Frequency Identification • Wireless identification and tracking • Information on: • Identity • Location • Time A B C

  4. Elements of an RFID System Applications Data ManagementSystem Network Infrastructure RFID Tags RFID Reader Reader Antenna

  5. Where is RFID Used Today?

  6. The Third Wave is Coming… 1960 1970 1980 1990 2000 mainframe eraone-to-many PC eraone-to-one pervasive computing eramany-to-one • RFID is a key enabling technology • Cheap • Wireless • No batteries • Already pervasive • But there are many challenges!

  7. How Will We Get There?

  8. Method 1: Large-Scale Commercial Ventures and Government Projects

  9. Image credit: http://www.daniel-libeskind.com/ New Songdo City, Korea’s High-Tech Utopia http://www.songdo.com/http://rfidsoup.pbwiki.com/New%20Songdo%20City

  10. Method 2: Research Testbeds, Careful Design and Evaluation with Controlled User Studies

  11. The RFID Ecosystem Project • Simulate an RFID-saturated future at scale • 100s of readers and antennas, 1000s of tags • Explore applications, systems, and social impact • Do it while there is still time to learn and adapt

  12. Project Goals

  13. Data Management & Systems • Contribution: Open source release of Cascadia code in Java Cascadia System for Managing Streams of RFID Data: 1) Manages uncertainty in RFID events 2) Allows developers and users to specify events declaratively 3) Facilitates development with a RDBMS and event-based API

  14. Security and Privacy • The Panopticon • Key problem: asymmetricvisibility • Privacy vs. Utility: • What information to disclose by default? • Who to disclose information to by default? • How to support applications and preserve privacy? Image credit: Prison building at Presidio Modelo, Isla De Juventud, Cuba (Wikipedia)

  15. Security and Privacy • Contribution: A default policy for socially-oriented RFID systems • Physical Access Control (PAC) policy: • Each user has a personal data store (or personal view of the data) • Store contains events that occurred when and where the user was physically present • Requirements: • Each user carries a personal tag • Line-of-sight information between each pair of antennas is known and static • Key points: • Provides symmetric visibility • Models sense of sight • Enables applications which augment user’s memory

  16. Ambient Awareness Friend and Object Finders Time Use Analysis Tools RFID-based Reminders Context-Aware Social Networking Applications For Home and Office

  17. Applications • Contribution: Ongoing user studies in a controlled environment Goals for applications: 1) Explore applications for home and office environment 2) Focus on socially-oriented applications 3) Study design of user interfaces: - Privacy control - Visualizing and understanding uncertainty - Events and preferences

More Related