180 likes | 302 Views
Evan Welbourne University of Washington, CSE July 2008 Seattle, WA. Image credit: Tom Reese, The Seattle Times. RFID = Radio Frequency Identification. Radio Frequency Identification. Wireless identification and tracking Information on: Identity Location Time. A. B. C.
E N D
Evan WelbourneUniversity of Washington, CSEJuly 2008Seattle, WA
Image credit: Tom Reese, The Seattle Times RFID=Radio Frequency Identification
Radio Frequency Identification • Wireless identification and tracking • Information on: • Identity • Location • Time A B C
Elements of an RFID System Applications Data ManagementSystem Network Infrastructure RFID Tags RFID Reader Reader Antenna
The Third Wave is Coming… 1960 1970 1980 1990 2000 mainframe eraone-to-many PC eraone-to-one pervasive computing eramany-to-one • RFID is a key enabling technology • Cheap • Wireless • No batteries • Already pervasive • But there are many challenges!
Method 1: Large-Scale Commercial Ventures and Government Projects
Image credit: http://www.daniel-libeskind.com/ New Songdo City, Korea’s High-Tech Utopia http://www.songdo.com/http://rfidsoup.pbwiki.com/New%20Songdo%20City
Method 2: Research Testbeds, Careful Design and Evaluation with Controlled User Studies
The RFID Ecosystem Project • Simulate an RFID-saturated future at scale • 100s of readers and antennas, 1000s of tags • Explore applications, systems, and social impact • Do it while there is still time to learn and adapt
Data Management & Systems • Contribution: Open source release of Cascadia code in Java Cascadia System for Managing Streams of RFID Data: 1) Manages uncertainty in RFID events 2) Allows developers and users to specify events declaratively 3) Facilitates development with a RDBMS and event-based API
Security and Privacy • The Panopticon • Key problem: asymmetricvisibility • Privacy vs. Utility: • What information to disclose by default? • Who to disclose information to by default? • How to support applications and preserve privacy? Image credit: Prison building at Presidio Modelo, Isla De Juventud, Cuba (Wikipedia)
Security and Privacy • Contribution: A default policy for socially-oriented RFID systems • Physical Access Control (PAC) policy: • Each user has a personal data store (or personal view of the data) • Store contains events that occurred when and where the user was physically present • Requirements: • Each user carries a personal tag • Line-of-sight information between each pair of antennas is known and static • Key points: • Provides symmetric visibility • Models sense of sight • Enables applications which augment user’s memory
Ambient Awareness Friend and Object Finders Time Use Analysis Tools RFID-based Reminders Context-Aware Social Networking Applications For Home and Office
Applications • Contribution: Ongoing user studies in a controlled environment Goals for applications: 1) Explore applications for home and office environment 2) Focus on socially-oriented applications 3) Study design of user interfaces: - Privacy control - Visualizing and understanding uncertainty - Events and preferences