Radio Frequency Identification (RFID) systems are emerging as one of the most pervasive computing technologies due to their low cost and their broad applicability. They consist of tiny integrated circuits equipped with antennas (RFID tags) that communicate with their reading devices (RFID readers) using radio-frequency waves without line of sight. This creates tremendous opportunities for linking various objects from the real world. These objects are numbered, identified, cataloged, and tracked. RFID systems present many advantages and features that cannot be found in other ubiquitous computing environments. RFID communication is fast, convenient and its application can substantially save time, improve services, reduce labor cost, thwart product counterfeiting and theft, increase productivity gains and maintain quality standards. Common applications range from highway toll collection, supply chain management, public transportation, controlling building access, animal tracking,
developing smart home appliances and remote keyless entry for automobiles to locating children. In addition, RFID technology also offers a viable approach to implement physical user interfaces. Through these interfaces the services available in the local environment are advertised by RFID tags. Users browse the services and activate the desired service by simply touching the corresponding tag with a mobile terminal that is equipped with an RFID reader. In the near future, these user interfaces would introduce RFID tags into our everyday lives. While RFID technology provides promising benefits such as inventory visibility and business process automation, some significant challenges need to be overcome before these benefits can be realized. One important issue is how to process and manage RFID data, which is typically in large volume, noisy and unreliable, time-dependent, dynamically changing, and of varying ownership. Another issue is how to seamlessly integrate low-level RFID data into (existing) enterprise information infrastructures (e.g., upper-level business processes). Finally, RFID systems present a number of inherent vulnerabilities with serious potential security implications. Indeed, given the ability of inexpensively tagging and thus monitoring a large number of items and/or people, RFID raises some serious security and privacy concerns. RFID systems are vulnerable to a broad range of malicious attacks ranging from passive eavesdropping to active interference. RFID privacy and security are stimulating research areas that involve rich interplay among many disciplines, such as signal processing, hardware design, supply-chain logistics, privacy rights, and cryptography. The IWRT 2010 aims at providing a forum for discussion on some emerging developments in the RFID research ground. There were 16 papers submitted from 10 different countries. The international Program Committee eventually selected 7 full papers and 5 short papers. It is our intention to select a sufficient number of papers that would cover, as wide as possible, the majority of core research domains in the field of RFID. In addition, a number of selected papers from IWRT 2010 will be invited to submit their extended versions to a special issue in an international journal. We thank all authors who submitted their papers and the Program Committee members for their excellent work. We hope that the present proceedings will contain enough food for thought to push the RFID utilization to new heights. Finally, our thanks go to Helder Coelhas for his great support.
Vol. 1 - 978-989-8425-11-9