JIS  Vol.4 No.2 , April 2013
RFID Applications: Prospects and Challenges in Bangladesh
ABSTRACT

Radio frequency identification (RFID) is an emerging technology, radio wave communication between a microchip and an electronic reader, consisting of data gathering, distribution, and management systems that has the ability to identify or scan information for remoting recognition of objects with increased speed and accuracy. An attempt has been made to know how using of RFID technology helps to improve services and business process efficiency in public and private sectors of Bangladesh. With this aim, we have conducted extensive literature survey. At the end of this attempt, we have come to the conclusion that the potential use of this technology includes RFID chipped passports, human implants, item-level tagging, inventory tracking and access control systems. RFID technology is at its early stage of adoption in Bangladesh with a few business applications and pilot studies. However, when tags begin to be associated with individuals, privacy is threatened. RFID is a new type of threat to personal information and must be treated as such; indeed, it must be recognized that existing privacy legislation is not adequate. This paper also explores some current and emerging applications of RFID in Bangladesh and examines the challenges including privacy and ethical issues arising from its use, as well as addressing potential means of handling those issues.


Cite this paper
A. Masum, F. Bhuiyan and K. Azam, "RFID Applications: Prospects and Challenges in Bangladesh," Journal of Information Security, Vol. 4 No. 2, 2013, pp. 73-79. doi: 10.4236/jis.2013.42009.
References
[1]   Danish Board of Technology, “RFID from Production to Consumption—Risks and Opportunities from RFID Technology in the Value Chain,” 2006. www.tekno.dk/pdf/projekter/p06_rapport_RFID.pdf

[2]   C. C. Chao, J. M. Yang and W. Y. Jen, “Determining Technology Trends and Forecasts of RFID by a Historical Review and Bibliometric Analysis from 1991 to 2005,” Technovation, Vol. 27, No. 5, 2007, pp. 268-279. doi:10.1016/j.technovation.2006.09.003

[3]   OECD, “RFID Implementation in Germany: Challenges and Benefits,” 2007. www.oecd.org/dataoecd/ 19/23/39693586.pdf

[4]   M. Martin, “The History of RFID Technology,” RFID Journal, 2007. http://www.rfidjournal.com/ article/articleview/1338/1/129/

[5]   C. Delaunay, E. Sahin and Y. Dallery, “A Literature Review on Investigations Dealing with Inventory Management with Data Inaccuracies in RFID Eurasia, 1st Annual,” 2007, pp. 1-7.

[6]   W. Minli, W. Gang and H. Dajun, “Device Management in RFID Public Service Platform,” 3rd International Conference on Convergence and Hybrid Information Technology, Busan, Vol. 1, 2008, pp. 1133-1136.

[7]   Y. Choi, D. Kang, H. Chae and K. Kim, “An Enterprise Architecture Framework for Collaboration of Virtual Enterprise Chains,” The International Journal of Advanced Manufacturing Technology, Vol. 35, No. 11-12, 2008, pp. 1065-1078. doi:10.1007/s00170-006-0789-7

[8]   T. Phillips, T. Karygiannis and R. Kuhn, “Security Standards for the RFID Market,” IEEE Security and Privacy, 2005, pp. 85-88.

[9]   A. Dolgui and J. M. Proth, “RFID Technology in Supply Chain Managment: State of the Art and Perspectives,” 17th World Congress the International Federation of Automatic Control, Seoul, 2008, pp. 4465-4475.

[10]   A. Sarac, N. Absi and S. Dauzere-Peres, “A Literature Review on the Impact of RFID Technologies on Supply Chain Management,” International Journal of Production Economics, Vol. 128, No. 1, 2010, pp. 77-95. doi:10.1016/j.ijpe.2010.07.039

[11]   S. Veronneau and J. Roy, “RFID Benefits, Costs, and Possibilities: The Economical Analysis of RFID Deployment in a Cruise Corporation Global Service Supply Chain,” International Journal of Production Economics, Vol. 122, No. 2, 2009, pp. 692-702. doi:10.1016/j.ijpe.2009.06.038

[12]   V. D. Hunt, A. Puglia and M. Puglia, “RFID: A Guide to Radio Frequency Identification,” John Wiley & Sons Inc., New Jersey, 2007. doi:10.1002/0470112255

[13]   Y. Xiao, S. Yu, K. Wu, Q. Ni, C. Janecek and J. Nordstad, “Radio Frequency Identification: Technologies, Applications,” Wireless Communications and Mobile Computing, Vol. 7, No. 4, 2007, pp. 45-472. doi:10.1002/wcm.365

[14]   B. Bacheldor, “RFID Takes Root in Bangladesh,” RFID Journal, 2008.

[15]   P. Nmeth, L. Toth and T. Hartvanyi, “Adapting RFID in Supply Chains,” 3rd International Conference on Mechatronics, 2006, pp. 263-266.

[16]   M. A. Khan, M. Sharma and R. B. Prabhu, “A Survey of RFID Tags,” International Journal of Recent Trends in Engineering, Vol. 1, No. 4, 2007, pp. 68-71.

[17]   Y. Choi, D. Kang, H. Chae and K. Kim, “An Enterprise Architecture Framework for Collaboration of Virtual Enterprise Chains,” The International Journal of Advanced Manufacturing Technology, Vol. 35, No. 11-12, 2008, pp. 1065-1078. doi:10.1007/s00170-006-0789-7

[18]   M. Ohkubo, K. Suzuki and S. Kinoshita, “RFID Privacy Issues and Technical Challenges,” Communications of the ACM, Vol. 48, No. 9, 2005, pp. 66-71. doi:10.1145/1081992.1082022

[19]   M. L. Chuang and W. H. Shaw, “RFID: Integration Stages in Supply Chain Management,” IEEE Engineering Management Review, Vol. 35, No. 2, 2007, pp. 80-87. doi:10.1109/EMR.2007.899757

[20]   S. B. Miles, S. E. Sarma and J. R. Williams, “RFID Technology and Applications,” Cambridge University Press, Cambridge, 2008. doi:10.1017/CBO9780511541155

 
 
Top