RFID for Identification of Stolen/Lost Items

RFID for Identification of Stolen/Lost Items

John Ayoade (American University of Nigeria, Nigeria) and Judith Symonds (Auckland University of Technology, New Zealand)
Copyright: © 2009 |Pages: 15
DOI: 10.4018/978-1-60566-298-5.ch003
OnDemand PDF Download:


Standards organisations such as EPC Global work to provide global compatibility between RFID readers and tags (EPCGlobal, 2007). This is essential to ensure that product identification numbers can be accessed along a supply chain by a range of producers, manufacturers and retailers. If all that is stored on the RFID tag is a universal product code, then public access is appropriate. However, where the tag might store more information than just the product identification details, and this data might be private, there is a need to protect such information. The objective of this chapter is to test a security framework designed to authenticate RFID readers before allowing them to access private data stored on RFID tags.
Chapter Preview


Authentication is one of the best methods to deter the growing concerns of unauthorized readers from accessing the RFID tag information which could result into the violations of information stored in the tag (Ayoade, 2005). Ayoade et al developed (Ayoade, 2005) a framework that makes it compulsory for the readers to authenticate themselves with the APF (Authentication Processing Framework) database prior to having access to registered tags information.

In this chapter our objective is to develop a system that will demonstrate the RFID Authentication framework in action. The system will be used to identify stolen high cost items recovered by the police. This is an interesting application on which to test the RFID Authentication Framework because, in the hands of the wrong people, the private information stored on the RFID tags could work against the authorities. Our system will read RFID tags attached to expensive items like laptops, PDAs, mobile computer systems, cars, and other expensive equipments and to identify such items by a specific (authentic) reader. For security purposes, the system will make sure that only authentic readers authorized to access specific tags embedded in the items can have access to those tags.The business benefits expected from this system are:

  • i.

    It will be a means of protecting items in various departments in the universities, or industries.

  • ii.

    It will enhance police effort in locating and recovering stolen items.

  • iii.

    It will help police to determine the rightful owner of the recovered item.

Most times it is very difficult for the police to identify recovered stolen items. However, with the help of this system, once the stolen item is within the range of the RFID reader in the hand of the police officers, it will be possible for the police to identify the item embedded with the RFID tag quickly and accurately. This technology would be a great benefit to police officers as the process of identifying and returning recovered equipment to its owners is a very difficult and painstaking process that uses up precious time and resources. In a nutshell, this research work will be of great benefit to the community which deploys it.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Olaf Diegel
Judith Symonds, John Ayoade, David Parry
Chapter 1
Chin Boo Soon
This chapter describes the history and development of Radio Frequency Identification (RFID). Key information on RFID such as the ratification of the... Sample PDF
Radio Frequency Identification History and Development
Chapter 2
John Garofalakis, Christos Mettouris
The continuous evolution of wireless technologies has made them ideal for use in many different applications, including user positioning. Until now... Sample PDF
Using Bluetooth for Indoor User Positioning and Informing
Chapter 3
John Ayoade, Judith Symonds
Standards organisations such as EPC Global work to provide global compatibility between RFID readers and tags (EPCGlobal, 2007). This is essential... Sample PDF
RFID for Identification of Stolen/Lost Items
Chapter 4
Filippo Gandino, Erwing Ricardo Sanchez, Bartolomeo Montrucchio, Maurizio Rebaudengo
This chapter deals with the use of RFID technology for improving management and security of agri-food products. In order to protect health and to... Sample PDF
RFID Technology for Agri-Food Tracability Management
Chapter 5
Lena Mamykina, Elizabeth Mynatt
In the last decade, novel sensing technologies enabled development of applications that help individuals with chronic diseases monitor their health... Sample PDF
Interpreting Health and Wellness Information
Chapter 6
Bryan Houliston
Hospitals are traditionally slow to adopt new information systems (IS). However, health care funders and regulators are demanding greater use of IS... Sample PDF
RFID in Hospitals and Factors Restricting Adoption
Chapter 7
David Parry, Judith Symonds
Radio-frequency Identification (RFID) offers a potentially flexible and low cost method of locating objects and tracking people within buildings.... Sample PDF
RFID and Assisted Living for the Elderly
Chapter 8
Ashir Ahmed, Ly-Fie Sugianto
This chapter introduces an activity-based framework for the adoption of radio frequency identification (RFID) in emergency management. The framework... Sample PDF
RFID in Emergency Management
Chapter 9
Bin Shen, Yu-Jin Zhang
This chapter is concerned with online object tracking, which aims to locate a given object in each of the consecutive frames. Many algorithms have... Sample PDF
Subsequence-Wise Approach for Online Tracking
Chapter 10
John Ayoade
The aim of Fixed-Mobile Convergence (FMC) is to provide both fixed-line and mobile telephony services to users through the same handset which could... Sample PDF
From Fixed to Mobile Convergence
Chapter 11
Sarita Pais, Judith Symonds
RFID tags can store more data and can update this data through local processing. This is in contrast to the EPC global standard of data-on-network.... Sample PDF
Handling RFID Data Using a Data-on-Tag Approach
Chapter 12
Maryam Purvis, Toktam Ebadi, Bastin Tony Roy Savarimuthu
The objective of this research is to describe a mechanism to provide an improved library management system using RFID and agent technologies. One of... Sample PDF
An Agent-Based Library Management System Using RFID Technology
Chapter 13
Tommaso Di Noia, Eugenio Di Sciascio, Francesco Maria Donini, Michele Ruta, Floriano Scioscia, Eufemia Tinelli
We propose a novel object discovery framework integrating the application layer of Bluetooth and RFID standards. The approach is motivated and... Sample PDF
Semantic-Based Bluetooth-RFID Interaction for Advanced Resource Discovery in Pervasive Contexts
Chapter 14
Indranil Bose, Chun Wai Lam
Radio frequency identification (RFID) has generated vast amounts of interest in the supply chain, logistics, and the manufacturing area. RFID can be... Sample PDF
Facing the Challenges of RFID Data Management
Chapter 15
Masoud Mohammadian, Ric Jentzsch
The cost of health care continues to be a world wide issue. Research continues into ways and how the utilization of evolving technologies can be... Sample PDF
A Mobile Computing Framework for Passive RFID Detection System in Healthcare
Chapter 16
Masoud Mohammadian, Ric Jentzsch
When dealing with human lives, the need to utilize and apply the latest technology to help in saving and maintaining patients’ lives is quite... Sample PDF
Intelligent Agents Framework for RFID Hospitals
Chapter 17
David Wyld
We are in the midst of what may become one of the true technological transformations of our time. RFID (radio frequency identification) is by no... Sample PDF
Radio Frequency Identification (RFID) Technology
About the Contributors