Understanding data volume problems of RFID-enabled supply chains

被引:9
|
作者
Ilic, Alexander [1 ]
Groessbauer, Andrea [1 ]
Michahelles, Florian [1 ]
Fleisch, Elgar [1 ,2 ,3 ]
机构
[1] Swiss Fed Inst Technol, Dept Management Technol & Econ, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Dept Management Technol & Econ, Informat Management, Zurich, Switzerland
[3] Univ St Gallen, Inst Technol Management, St Gallen, Switzerland
关键词
Radio frequencies; Supply chain management; Data handling; Simulation;
D O I
10.1108/14637151011092982
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose - The widespread application of radio frequency identification (RFID) tags in supply chains is said to cause enormous data volume problems that could render RFID event-driven supply chains unmanageable. An unbiased and quantitative understanding of the characteristics and extent of these data volume problems is necessary to identify and remove adoption barriers. This paper aims to address the issues. Design/methodology/approach - The paper presents a simulation study based on a real-world scenario that reveals quantitative characteristics of the data volumes problem in an RFID-enabled supply chain and discusses its implications. Findings - The results suggest that data volumes will be much lower than currently assumed by practitioners. Thus, this work can be seen as a first basis for eliminating unjustified adoption concerns regarding data volumes complexity. However, it finds that the data volume problems bear still significant challenges for researchers and developers of RFID infrastructures with real-time decision-making applications. Research limitations/implications - The simulation study is based on a single product case study of a retail supply chain in Europe. Since a simulation is always a simplification of the real world, the results need to be interpreted carefully in different contexts. The nature and extent of the problem might vary across different products, industries and geographic regions. Practical implications - Researchers, end-users and solution providers might use our paper as a guideline how to approach and quantify the data volume problem in their particular case. Moreover, the result data can be used to benchmark and optimize RFID applications. Originality/value - This paper is one of the first scholarly works that analyze RFID data volume problems in supply chains with a quantitative methodology.
引用
收藏
页码:904 / 916
页数:13
相关论文
共 50 条
  • [1] Security and Privacy for Data Mining of RFID-Enabled Product Supply Chains
    Yao, Xiaoming
    Du, Wencai
    Zhou, Xiaoyi
    Ma, Jixin
    [J]. PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1037 - 1046
  • [2] Identifying Discrepant Tags in RFID-enabled Supply Chains
    Gu, Caidong
    Gong, Wei
    Nayak, Amiya
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 162 - 173
  • [3] A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains
    Xie, Xin
    Liu, Xiulong
    Guo, Song
    Qi, Heng
    Li, Keqiu
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [4] Semantic access control model for RFID-enabled supply chains
    Li, Zang
    Chu, Chao-Hsien
    Yao, Wen
    [J]. Cryptology and Information Security Series, 2010, 4 : 95 - 108
  • [5] Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
    Cai, Shaoying
    Li, Yingjiu
    Zhao, Yunlei
    [J]. INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 501 - 512
  • [6] RFID-ENABLED TRACEABILITY SYSTEM FOR PERISHABLE FOOD SUPPLY CHAINS
    Zhu, Lijing
    Lee, Chulung
    [J]. INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, 2018, 25 (01): : 54 - 66
  • [7] Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains
    Abughazalah, Sarah
    Markantonakis, Kostantinos
    Mayes, Keith
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 871 - 878
  • [8] Efficient Distributed Query Processing in Large RFID-enabled Supply Chains
    Liu, Jia
    Xiao, Bin
    Bu, Kai
    Chen, Lijun
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 163 - 171
  • [9] Tamper detection in RFID-enabled supply chains using fragile watermarking
    ShuiHua Han
    Chu, Chao-Hsien
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, : 111 - +
  • [10] SecTTS: A secure track & trace system for RFID-enabled supply chains
    Shi, Jie
    Li, Yingjiu
    He, Wei
    Sim, Darren
    [J]. COMPUTERS IN INDUSTRY, 2012, 63 (06) : 574 - 585