Vous êtes sur la page 1sur 385

From RFID to the

Internet of Things
Pervasive networked systems
Further Information
DG INFSO Contact:
http://cordis.europa.eu/ist/audiovisual/
IST Information Desk
European Commission
Information Society and Media Directorate-General
Office BU31 01/19
Belgium, 1049 Brussels
ist@ec.europa.eu
Information about the IST Programme, its activities and people involved.
- European Commission -
Information Society and Media Directorate-General
http://europa.eu/information_society/
- CORDIS -
The European Union window to research and technological development
http://cordis.europa.eu/ist/
In addition, the IST Programme maintains a network of national contact points throughout
Europe and the world. It is available to you with information, advice, guidance and training.
Find your nearest contact point at:
http://cordis.europa.eu/ist/ncps.htm
F
r
o
m

R
F
I
D

t
o

t
h
e

I
n
t
e
r
n
e
t

o
f

T
h
i
n
g
s


P
e
r
v
a
s
i
v
e

n
e
t
w
o
r
k
e
d

s
y
s
t
e
m
s
E
N

K
K
-
X
1
-
0
6
-
0
1
3
-
E
N
-
C
DG Information
Society and Media
Directorate D
CoverRFID + 17,5mm 25/07/06 9:01 Page 1
A great deal of additional information on the European Union is available on the Internet.
It can be accessed through the Europa server (http://europa.eu/)
Cataloguing data can be found at the end of this publication.
Luxembourg: Office for Publications of the European Commission, 2006
ISBN: 92-79-01941
European Communities, 2006
Reproduction is authorised provided the source is acknowledged.
Printed in Belgium
CoverRFID + 17,5mm 25/07/06 9:01 Page 2
1
Viviane Reding Commissioner for Information Society and Media
There are over 2 billion mobile terminals in use today
and more than 1 billion Internet users
worldwide. Wireless, mobile and Internet technolo-
gies have enabled a first wave of pervasive commu-
nication systems and applications and created very
significant economic opportunities. Still, this may only
be the beginning: evolutionar y networked
technologies such as radio frequency identity (RFID)
tags could potentially be deployed in hundreds of
billions, for a virtually unlimited range of applications.
In the longer term, todays simple tags are expected
to evolve further towards smarter networked objects
with increased storage, processing, and sensing
capabilities. This will in turn open up an entirely new
range of networked applications such as machine-to-machine and context-aware commu-
nications. I expect the resulting innovation to create opportunities for increased competitive-
ness of the European industry, for new businesses, new jobs and new consumer services.
These are indeed key issues for Europe that I have placed at the heart of my i2010
strategy framework for the Information Society.
Experts agree that the emergence of pervasive networking, also known as an Internet of
things still requires a significant amount of research. Such a scenario has been recently
developed in an ITU report
1
detailing a world in which billions of objects will report their
location, identity, and histor y over wireless and Internet-enabled connections. The
proceedings of this conference outline the many technological implications of pervasive
networking application scenarios, and provide research and industrial communities with a
useful overview of the challenges they face in the coming years and how these are
addressed in other regions of the world.
Beyond the purely technological challenges lie important societal ones. Issues such as
consumer acceptability, privacy, identity discovery or digital identification of people and their
habits, networks and movements will take centre stage in the debate. Other issues, such as
the interoperability of RFID systems or spectrum availability, also need to be addressed.
These are clearly policy issues that we have to address in order to enable a successful
deployment of RFID like technologies whilst safeguarding consumers and citizen interests.
1
http://www.itu.int/osg/spu/
Book RFID 01-40 25/07/06 8:15 Page 1
2
Only if we address these concerns will RFID be able to develop its clear economic potential.
This is why I have launched a public policy debate to build consensus on the right balance
to strike between economic interests and the protection of citizens rights
2
.
As we prepare the EUs 7th framework programme for research and development (FP7,
2007-2013), pervasive networking is a perfect example of a phenomenon that is critical
for our future competitiveness and that needs to be addressed from both a technological
and a public policy perspective. This book provides insights into both.
2
http://www.rfidconsultation.eu
Book RFID 01-40 25/07/06 8:15 Page 2
3
1 Executive summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
2 Overview and background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
3 System perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
4 Technology perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
4.1 Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
4.2 Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
4.3 Security and privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
4.4 Radio spectrum aspects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
4.5 European IST research projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
5 International perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
5.2 The USA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
5.3 Japan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
5.4 Korea . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
6 Applications perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
6.2 Application list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
7 Non-research perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
7.1 Closing session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
7.2 Panel discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
8 Annex: conference agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
8.1 Welcome address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
8.2 Stream A1: State of the art & vision the system and technological perspective . . . .28
8.3 Stream A2: The security, privacy and society dimensions . . . . . . . . . . . . . . . . . . . . . . .29
8.4 Stream B1: The application and industrial perspective . . . . . . . . . . . . . . . . . . . . . . . . .29
8.5 Stream B2: The application and industrial perspective (continued) . . . . . . . . . . . . . . .30
8.6 Stream C: Snapshot of IST initiatives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
8.7 Stream D: Beyond Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
8.8 Panel Discussion: evolution & collaborative research requirements . . . . . . . . . . . . . .31
8.9 Stream E: Possible barriers to deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Table of Contents
Book RFID 01-40 25/07/06 8:15 Page 3
The Internet of Things describes a worldwide network of intercommunicating devices. It charac-
terises the way that information and communication technologies will develop over the next
decade or so. Concept are now sufficiently formulated that we can discuss it and pursue research
actvities.
The concept describes fundamentally worthwhile technology that is capable of supporting the pub-
lic good, economic growth and personal enrichment of life. It enables pervasiveness of communi-
cation technologies in many sectors, with subsequent prospects of ICT based growth and wealth
creation through innovation. Example applications of the technology include public disaster man-
agement, industrial asset management, and personal lifestyle support.
The Internet of Things will realise its potential only in the context of a global communications plat-
form that can be used by millions of independent devices co-operating together in large or small
combinations, and in shared or separated federations.
The global platform implies not only a communications resource, but also a set of commonly
agreed methods of communicating and operating.
For reasons of flexibility, adaptability, mobility and survivability, the dominant means of access to,
and communication within, the Internet of Things will be wireless.
Within the competitive business conditions that prevail today, industry and other players have con-
tributed to an endemic climate of hype. Economic prospects related to networking of large num-
ber of simple devices like RFID are huge. Still, the economic prospects related to more sophisticat-
ed computing devices such as sensors need further research with industrial players
The Internet of things is not a revolutionary concept. It should be understood with an evolution-
ary perspective, corresponding to the evolution on the networking technologies of today (Internet,
wireless, service platforms, etc.). It provides in particular an evolutionary roadmap for mobile and
wireless systems.
Even if evolutionary, a great deal of genuinely creative, innovative research is required to realise the
Internet of Things. It is not simply a matter of re-engineering existing technology. Trillions of con-
nected devices are pushing current communication technologies, networks and services approach-
es to their limits and require new technological investigations. These cannot happen quickly and
need to be tackled through a long-term perspective.
In particular, research is required in the field of Internet architecture evolution, wireless system
access architectures, protocols, device technologies, service oriented architecture able to support
dynamically changing environments, security and privacy. Research is also required in the field of
dedicated applications integrating these technologies within a complete end-to-end system.
4
1. Executive summary
Book RFID 01-40 25/07/06 8:15 Page 4
The issue is considered very seriously in other regions of the world. Japan, Korea and the USA are
all considering network and communication technology roadmaps that are related to pervasive
networking. Initiatives like GENI in the USA (NSF), and others in Korea and Japan are particularly
relevant in that context.
Recent experience has shown the existence of research of moderate value in this field. Examples
include realisations and demonstrations of established technology, or experiments making modest
or minimal advances over previous work. Research needs to take a system approach, with cross
sector partnerships.
It is important that researchers when pursuing less constrained, blue-sky topics should remain
aware of industrial and real-world problems. Industry and academic institutions should be encour-
aged to keep in close contact, even and especially where the academic research might not attract
internal funding within an industrial organisation. Industry should lower and minimise the barriers
raised by confidentiality concerns.
Public entities need to be made aware that the pervasive networking concepts pose new challenges
in terms of personal privacy.
Public entities should carefully check the robustness of their privacy policies and frameworks to
the new challenges implied by the emergence of an Internet of things, where the resulting object
identity may eventually be linked to user identity, profiles and consumption habits.
The Internet of Things is a pervasive federated network in which unregulated personal area and
local area networks will interoperate with and through more traditionally regulated electronic
communications services.
Regulators need to carefully monitor the challenges posed by these networks, taking action as nec-
essary to regulate for technical interoperability, consumer protection, support for competition and
the appearance of opportunities for the exploitation of market power. Here again, the challenges
posed to traditional infrastructure regulatory frameworks should be evaluated.
A foreseen area where there is risk of monopoly market power is that of the ownership of the
data resources in name servers.These are the resources that networks must use to determine the
way to reach a given person, device or resource.The implications in terms of Object Name Server
(ONS) management should be evaluated.
Existing regulatory issues that have been and are being tackled in existing, networks, for example
access, roaming and billing, may raise their heads in different guises.
The manner of allocation and regulation of radio spectrum is a key issue for the development of the
Internet of Things. Spectrum scarcity will remain an issue and flexible approaches to spectrum man-
agement have to be pursued, especially for devices that will primarily be deployed in unlicensed bands.
5
Book RFID 01-40 25/07/06 8:15 Page 5
The Internet of Things is a network of billions or trillions of machines communicating with one
another. It is a major or dominant theme for the evolution of information and communications over
the next few decades, and in its simplest form it is already here. There were 1.3 billion radio-
frequency identification tags (RFIDs) and two billion mobile service users, worldwide, in 2005. The
idea has grown from advanced concepts from the last twenty years:
ubiquitous communications
pervasive computing
ambient intelligence
This concept is not only the result of a technology push. The conference clearly showed that tech-
nology push in this field is mirrored by a market pull, with shorter term objectives and tangible appli-
cation prospects, at least for simple devices such as RFID.The longer term view is pushed by the vis-
ible trend towards ever more networked devices, but the economics related to the networking of a
myriad of advanced objects with much more advanced computing capabilities require further
research. The conference addressed these two perspectives.
From a generic point of view, it can be concluded that the trend towards an ever larger population
of connected intelligent objects is irreversible, because the economic value of a system of objects and
devices is directly related to the fact that they are networked. Networking is the real added value.
From the technological perspective, the Internet of Things will enable computing to melt invisibly into
the fabric of our business, personal and social environments, supporting our economic, health,
community and private lives.
Here are three simple examples.
Asset management. Electronic tagging and remote sensing tracks the location of baggage in an air-
port, or of goods in a factory production process
Healthcare. Blood pressure and heart rate sensors relay regular readings from a patients home to
a monitoring centre. A computer detects adverse movements and signals a doctor to review the
patients case
Environment monitoring.A network of sensors monitors river heights and rainfall, predicting floods
and supporting water management measures for flood relief.
The potential applications of pervasive networking are limitless. Some proposals appear essential, for
example people and resource tracking in a disaster scenario such as a tunnel fire. Others may at first
sight seem unrealistic. To make this technology really worthwhile, there is a need to address large
classes of potential applications in order to better understand the various requirements (e.g. real
time, quality of service) that will eventually drive the needed generic technology developments.
The Internet of Things is currently a very popular subject. It receives lots of attention from various
regions of the world and from diverse research communities. Therefore it would benefit from a
strong industrial drive and a clear industrial commitment implying an application perspective that
goes beyond the classical RFID devices.
6
2. Overview and background
Book RFID 01-40 25/07/06 8:15 Page 6
Much fundamental research remains to be done to make the economic and application promises of
pervasive networking happen. Be not afraid of moving slowly, be afraid of standing still, is a motto
that was presented as particularly appropriate in this context.
Application drive alone will not deliver the wide variety of solutions that have to be brought
together. Our target network architectures are often conceptual frameworks using devices we can-
not yet obtain, assembled with tools we do not yet have.The list of research we need to acquire those
tools and materials is a long one that ranges across a range of industrial sectors, beyond the
classical telecommunication technology providers.
These technologies also bring us face-to-face with questions about the sort of society we wish to
create (for example, the surveillance society). Pervasive technologies are clearly related to problems
that go far beyond the purely technological issues, and that need to be addressed by public authori-
ties. The way we conduct effective research in a competitive environment is another issue that
emerged for a field which is particularly complex, as it ranges from the device/component to the sys-
tem, network and service architecture.
In the opening of the conference, the issues considered as being of relevance were introduced as
being:
The system perspective, how networked systems are likely to evolve.
The implications of device connectivity on future network architectures and technologies.
The specific security, privacy, trust and confidence issues.
The service architectures that are needed to support the applications of trillions of connected
devices.
The service composition and delivery prospects.
The role of open (software) models.
The role of wireless technologies.
The related non R&D issues, such as governance, spectrum and consumer acceptability.
The developments in other regions of the world and prospects for collaboration.
These were introduced as questions to be answered in order to understand the requirements for
the global network of tomorrow, how it can be built and what it should look like.
This report aims to analyse and summarise the presentations, discussions and conclusions on these
various issues.
7
Book RFID 01-40 25/07/06 8:15 Page 7
The Internet of Things is a network of communicating devices. Devices have four degrees of sophis-
tication.The final stage makes Proactive Computing
1
possible.These devices, aware of their con-
text in the physical world, react to that context with some form of action. This may respond to the
context and cause the context to change.
Purely passive devices (RFIDs) that give out a fixed piece of data when remotely queried.
Devices with moderate processing power to format the message and maybe vary it with time and
place.
Sensing devices that generate and send information about their surroundings, for example pressure,
temperature, light level, location.
Devices with more processing power that can decide, without human intervention or without
needing first to be being queried, to communicate with another device.
The power of the Internet of Things and the applications it supports arises because devices are inter-
connected. Devices in the Internet of Things are sometimes called Smart Devices, though groups
of devices need not be equally smart. A gateway device may filter, aggregate and format data from
a group of simple sensors before sending it somewhere else.This issue is in particular related to wire-
less access and architecture choices, which may vary as a function of the application requirements.
Radio communication is vital to the Internet of Things. Firstly and obviously, it supports ubiquity
and mobility. Devices can move and go anywhere. Secondly, it supports a flexibility that would be
impossible with wired communication.A device can move into a group and then move out of it again.
New devices can join an existing group, so increasing the number and power of the things that the
group can do collectively.
The Internet of Things calls for a new class of network, introduced as Capillary Networks
2
. These
short-distance, edge networks extend existing networks and services to all devices equipped with
sensors and actuators and the physical environment in general.
Different device requirements clearly emerge, driving different architectural choices: devices may
need to communicate with one another at any distance, and different communication media and tech-
nologies are appropriate for the following categories.
A few cm (Body Area Network, BAN)
A few m (Personal Area Network, PAN)
10s or 100s m (Local Area Network, LAN)
A few km (Metropolitan Area Network, MAN)
10s or 100s km (Wide Area Network, WAN)
1000s km (Global Area Network)
8
3. System perspective
1
This terminology was introduced by Intel as a conceptual driver.
2
Terminology introduced by France Telecom to illustrate how pervasiveness may be achieved.
Book RFID 01-40 25/07/06 8:15 Page 8
Long distance communication will most likely continue using a communication service provider, for
example a cellular, 3G or fixed network operator as at present. Capillary Networks apply to the BAN,
PAN and possibly LAN environments, with gateway devices providing the interface between levels
where needed.
Capillary networks will be autonomous, self-organising mesh networks, because of flexibility and
economy. Small networks cannot bear the cost of configuration, management and maintenance, there-
fore the Internet of Things will need arrive and operate just as we require plug and play with wired
computers. Neighbouring devices will exchange messages to discover one another and configure for
themselves the best topology for exchanging and relaying messages to, from and through one another.
In this way, the network can react when a device arrives, leaves or moves, and can keep going when
there is interference and disruption to transmission paths. The self-organising, dynamic routeing
capability forms a basis for the survivability and dependability of the networks of the Internet of Things.
Service platforms must evolve beyond the current limitation of static service configurations
and to move towards service oriented architectures. Today, services are rather programmed and do
not dynamically adapt to changing application requirements and contexts. Interoperability does still
require that client services "know" the features offered by service providers beforehand.This "closed-
world" approach implies that all services and service features are known in advance. On the other
hand, semantic modelling should make it possible for service requestors to "understand" what serv-
ice providers have to offer. This is a key issue for moving towards an open-world" approach where
new, unknown or modified devices/services may appear at any time.This has also implications on mid-
dleware requirements, as these are needed to interface between the devices, that may be seen as
services, and the application. This is a key issue to progress towards device networks capable of
dynamically adapting to context changes as may be imposed by application scenarios (e.g. moving
from monitoring mode to alarm mode to alert mode may imply different services and application
behaviours).
Devices in the Internet of Things must be able to communicate with any other device anywhere in
the world. This implies a naming and addressing scheme, and means of search and discovery.
These will find whether a desired device exists, where it is, and which communications channel is
required to reach it. This implies in turn that information provided by these devices may eventually
be aggregated and used with more classical information, as found on a traditional web server.The fact
that devices may be related to an identity (through naming and addressing) raises in turn a number
of privacy and security challenges.
The Internet of Things must conform to standards and standard methods of operation. While
it might be possible for any individual application to use its own application specific devices, proto-
cols and methods of operation, there are beneficial economies when standard interoperable plat-
forms are readily available.
The Internet of Things must be reliable and dependable in the face of device malfunction, abnor-
mal traffic loads and patterns and malicious attack. It should safeguard policies regarding ownership
of information and authority to access devices, giving due respect to peoples rights of privacy.
9
Book RFID 01-40 25/07/06 8:15 Page 9
4.1 Devices
The principal device challenges appear below.
Size
Cost
Powering and energy efficiency
Sensors
Device installation
Special environments
The size of existing RFIDs is about:
10 cm x 4 cm for 900 MHz operation
6 cm x 1 cm for 2.45 GHz operation.
It was reported that Hitachi has an embedded microchip for an RFID that is 0.15 mm square and 7.5
m thick. Progress with many applications, for example identity cards, banknotes and tagging small
items, will depend on size reduction.The truly invisible sensors needed for pervasive networking need
more dramatic size reductions. People spoke of grain-sized devices (smart sand) and even smaller
(smart dust), though these are aspirations rather than forecasts.
RFID costs are in the region of 0.50 for retail product tags and supply chain tracking applications,
but rise dramatically beyond 25 for the more sophisticated devices used for example in highway toll
collection. The drive for wider application depends on much lower costs. Printed circuitry is a possi-
ble approach, and a major driver in practice will be manufacturing scale and volume.
The feasibility of many applications depends on powering and power economy, yet there are deep
challenges here. Devices must have long lifetimes without the need to change batteries. Consumers
will not accept goods where the run-down of an active device or the need to buy and fit a new bat-
tery dominates the practical lifetime of the item. In other applications, for example environmental
monitoring, the cost of access to change batteries might be prohibitive. All devices and applications
face the problem of power scavenging, since only with a minority of electrical goods will there be a
ready source of power. It was reported under the IST project e-SENSE that an energy efficiency of
20 nJ per transmitted and received bit is a challenging objective, with a current state of the art figure
of 50 nJ and the average in the hundreds. While the simplest passive RFIDs do not require power, it
is needed for any significant amount of processing.
Sensor technology itself needs to evolve; in many cases, miniaturised sensors require further R&D. In
addition, sensors have to be fitted with communication capability and also with service features, to cover
the most extensive use cases.These issues are clearly in the R&D domain, as the impact of these com-
munication and service features on the devices are expected to have non-negligible cost impact.
The placement of tags and sensors is not always easy, so work is needed to develop ways of mak-
ing tags adhere stably in some applications. This is especially important if a sensor has to remain in
firm contact with the thing it is measuring, such as surface temperature. It was reported that meth-
ods of 3D printing, laser sintering and material deposition as techniques of bonding sensors to sur-
faces may be suitable approaches.
10
4. Technology perspective
Book RFID 01-40 25/07/06 8:15 Page 10
Already, applications are foreseen in specialised environments where the normal transmission of
radio does not work well. These include underground, coastal and submarine sensors. These issues
are in particular explored in the context of US programmes, and are putting specific design con-
straints on the devices.
4.2 Networking
Networking of devices is a multifaceted issue that has impacts at various layers, at the periphery and
within the network. An extensive range of networking issues was presented during the conference.
The main reported challenges are outlined below.
Network heterogeneity
Standards
Lightweight protocols
Protocol delayering (layers co-design)
Autonomous self-organising networks and adaptivity
Network discovery
Dynamic routeing
Network survivability and dependability
Network scalability
Naming and addressing strategies
Declarative programming
Programming platforms and application program interfaces (APIs)
Traffic and congestion management
Real time resolution and delay tolerance
Error detection and correction
Most networking aspects of the Internet of Things are in the domain of research problems.They need
high-quality and original thinking, as they are not reapplications of existing solutions. The network
requirements described in the Systems Perspectives section are currently met only in the most lim-
ited ways, if at all.
Networking aspirations may conflict with the physical reality of devices. We would like clever proto-
cols, for example for network self-discovery or to implement system resilience, but find that these
call for processing power. At the same time, we want them to run on infinitesimally sized devices that
consume no power. This set of conflicting requirements calls for early end-to-end system design and
optimisation.
11
Book RFID 01-40 25/07/06 8:15 Page 11
Some key requirements must be designed from the beginning. These include adaptivity, evolvability
and (as described in later sections) security and privacy. It is unlikely to be effective to introduce these
features as later increments.
The Internet of Things will be a heterogeneous network, being made up of federated,
heterogeneous networks. It must accommodate devices:
from different makers
of different dates and release versions
of different capabilities and sophistication
of different speeds
using different technical interfaces
converging differing functions
Devices and gateways will have to recognise these differences and mediate where necessary.
Technical standards are essential for an open, evolving platform. Standards are required for:
intercommunication and interoperation
sensor and actor co-ordination and communication
self-organisation and adaptivity
service description and capability declaration
routeing and transport methods
radio interfaces and media access
localisation and synchronisation
publication and subscription of devices and resources
resource management and reservation, and admission control
security
encryption (end-to-end and hop-by-hop) and key distribution
user interfaces
Standards must be extensible, allowing devices to communicate together at the level of their com-
mon functionality. Devices should behave predictably when presented with a message they may not
understand, while transit devices should pass on end-to-end messages even if they might not under-
stand the entire content.
Existing data communication protocols may be inappropriate in the Internet of Things. Present-day
protocols typically need hundreds and more of kilobytes of program code (software) to run them. It
was reported that even the simple ZigBee protocol common in RFID applications requires a 48 kb
stack, which is overly complex for tiny sensors. The ISO Seven-layer model has conditioned a whole
generation of telecommunications and information technology protocols.This approach is now show-
ing its limitations and pervasive networking requires new approaches. Lighter protocols and lighter
implementations that melt down (compress) the explicit protocol layers into a single communications
module are now required.
The Internet of Things requires self-organising networking to give ready-to-go arrive and oper-
ate, mobility, economy and flexibility as well as network resilience. Self-organising adaptivity is a nec-
essary counterpart of an unpredictable world, and must be addressed from the beginning. Self-discov-
12
Book RFID 01-40 25/07/06 8:15 Page 12
ering and self-organising mesh networks remain a research topic: we must find the key problems,
developing methods and protocols that result in optimised or adequately performing networks. Self-
organising networks must cope with varying requirements for physical and virtual link topologies.
Service discovery and reuse by different applications has very high priority. Different applications may
require topologies such as stars, rings or full interconnection, and the requirement may vary with nor-
mal, alert, alarm, disaster and other modes of operation.
Dynamic routeing is the ongoing counterpart of self-organisation, where networks re-route them-
selves after the initial discovery and set up.This might occur when a new device arrived, a better path
became available (for example when a mobile node moved nearer to a gateway) or under problem
conditions like interference, loss of a device or breakage of a transmission path. Earlier approaches
such as Manet for ad-hoc networks have been reported as not fully convincing, and this remains an
important subject for research.
The Internet of Things must scale to potentially very large networks of many objects and devices.
This implies the right design choices. Centralising network knowledge or relying on discovery proce-
dures that require a querying process to access very many other nodes, militates against scalability.
Scalability implies distribution of the control plane and of data processing, and these contribute also
to survivability and security.
The Internet of Things must have a naming and addressing strategy by which objects can iden-
tify themselves, and can locate other objects and the communication paths to them. Because the net-
work is heterogeneous, supporting many different devices offering different service types, a declara-
tive interface, like IDL or XML, will be needed. This will to allow a device or node to describe what
it presents to others.
A consistent set of middleware offering application programming interfaces, communications
and other services to applications will simplify the creation of services and applications. Service
approaches need to move from a static programmable approach towards a configurable and dynam-
ic composition capability.
The Internet of Things must incorporate traffic and congestion management.This will sense and
manage information flows, detect overflow conditions and implement resource reservation for time-
critical and life-critical data flows. There will be a high research content here, since no one really
knows the traffic characteristics of the Internet of Things. It was reported that known traffic asym-
metry profiles in todays networks generated by interactive usage over broadband Internet access
connections may radically change in the future. It could well happen that in the future, the main net-
work load does not happen downstream from the network towards the terminals, but rather
upstream from the devices towards the networks.This will in turn call for intelligent strategies at the
level of traffic shaping and filtering, and require further processing capabilities at the edge of the net-
work. Edge networking capability is also expected to be application dependent, as some safety criti-
cal applications with real time constraints may not be compatible with the extra latency imposed by
such edge network processing.
The networks must support real time resolution. For many applications the sequence and timing
of messages may matter, yet self-organising networks and packet-based transmission guarantee nei-
ther transit time nor even the sequence of received messages.
13
Book RFID 01-40 25/07/06 8:15 Page 13
Finally, the Internet of Things will need error management. A graded set of facilities will be neces-
sary to match different application requirements. On the one hand error management adds overhead
costs to processing power, data rates, data volumes and transmission time. On the other hand, errors
may be of modest concern in some applications and yet life-threatening for others.
4.3 Security and privacy
People will resist the Internet of Things if there is no public confidence in it. The Internet of Things
will affect and control events in the real world and will contain information of value. It is bound to
attract unwelcome attention. Digital crime is becoming an industry in itself, and criminals are early
adopters. Where society places high reliance on a pervasive technological infrastructure, some may
want to disrupt it. Public fears are likely to focus on a handful of security and privacy factors.
Vulnerability to attack
Tag cloning and identity theft
Access rights to data
Quality and integrity
Capture of personal data
Retention of personal data
There are various ways to attack the functioning of a network:
Node destruction
Transmission impairment or destruction, for example using interfering signals
Flooding a network with false messages (denial of service attacks)
Resilience is something we can engineer into a network, using the techniques of network engineer-
ing. Adequate security architecture must be developed at the outset. It is likely to include securi-
ty and distributed database architectures, and layered network philosophy allowing devices to retreat
to trusted links and components when under threat. It is essential to understand and model the
detailed nature of potential threats, to be sure that networks are indeed survivable.The following are
relevant technical approaches at network level.
Dynamic routeing
Error correction
Traffic management and information flow control
Dynamic selection of the radio channel
Diverse routeing
Redundant provision of devices, nodes and processing resources
Network design principles for integrity and quality of service
Security and reliability architecture
Security and reliability toolbox
Reliability-aware components
People and things can pretend to be what they are not. For example a counterfeit product may
acquire a tag that marks it as genuine; a person may try to acquire anothers identity.The conference
named this phenomenon tag cloning.
14
Book RFID 01-40 25/07/06 8:15 Page 14
One of the presentations described a physical method of creating an unclonable tag, by coating it with
an opaque material containing particles of high dielectric constraint. The random pattern of the
particles gives the device a fingerprint that is difficult or impossible to replicate.
At system level, it was argued that security is better when you have to join things up rather than rely
on a single component. It was also indicated that good security depended on a system-oriented view
that allowed multiple identities varying over contexts and time. Attempts to create security using a
single component, the unbreakable key, may fail and so do more harm than good. An example is
biometric identity data that a person cannot revoke: what if someone found a way of faking it? Some
principles for good security were reported as follows.
Dont have a constant identifier.
Spread the security over system components.
Allow multiple forms of the personal identity.
Vary the required form of identity over time, or by exchanging a message at each access.
Lock identity data to particular contexts.
Give people the capability to revoke their identity key.
Take a risk management view.
Focus on security, not surveillance.
Privacy is an issue that worries many people. The Internet of Things will collect much data about
personal movements, purchases and actions.With the cost of storage below one nano-euro per byte,
information can be retained indefinitely.This places the individual in a position of denied oblivion with
universal observability. The technical measures to safeguard privacy include:
ownership of data
access rights
ownership of processes
authorisation for intercommunication and interoperability
the ability to neutralise a tag (tag clipping)
context sensitive tag behaviour
However, technical countermeasures will achieve very little if incentives are misaligned or the real
motives are against privacy.
4.4 Radio spectrum aspects
Radio is fundamental to the Internet of Things. It is a flexible network of wirelessly interconnected
devices, where radio provides the magic that is the ubiquity capability. It would be severely
restricted and might not develop at all if all connections had to be wired. In todays world, there are
about two billion mobile phone users and the overall ratio of radios to human beings is one to one.
According to an ITU report, we are entering an era where this ratio could exceed 1000 to one.What
spectrum these radios will use, and how will it be allocated and managed, are open questions.
This section of the report addresses only technology issues. The section on Non-research perspec-
tives deals with policy and regulatory issues.
15
Book RFID 01-40 25/07/06 8:15 Page 15
Efficiency of spectrum usage is seen both as a requirement and a trend. Currently the state of
the art is in the range one to five bits per second per Hz per cell. A gain of at least a factor of two
and maybe an order of magnitude is a common research objective.
The air interface technologies for the Internet of Things, known as alternative wireless technolo-
gies (AWTs), remain in the main to be developed. Existing technologies are candidates to form the
bases for them, including:
ZigBee (IEEE 802.15.4)
WiMax (IEEE 802.16)
WiFi (IEEE 802.11 variants)
Bluetooth (IEEE 802.15.1)
UWB (IEEE 802.15.3a)
Flash OFDM (IEEE 802.20)
Only in the 0.7 7 km range, the standard mobile telephony cell, are there as yet clearly established
technologies.
It is likely that the Internet of Things, or at least significant parts of it, will use spread spectrum
technologies in preference to the more traditionally current single frequency approaches.
Spread spectrum technologies send the signal over a wide frequency band but with very low powers
in any one particular band. The signals resemble white noise, except to receivers equipped with the
codes to decipher them. The reasons in favour of spread spectrum technologies are as follows.
They are spectrally more efficient.
They are less vulnerable to interference than a mono-frequency signal. This could prove critical in
environments such as the car.
They are more adaptable. They can move the energy of the signal into less crowded bands.
This gives them more interference tolerance, while simultaneously inflicting less interference on
neighbouring users.
The Internet of Things calls for major steps forward in radio technology.
Cognitive radio: the radio senses the transmissions reaching it and the ambient level of interfer-
ence.
Gap finding: the radio finds the best frequency bands to use.
Software defined radio: a transmitter and receiver is not tied to one frequency, media access
control (MAC) protocol and messaging format, but can vary these as defined by a stored data tem-
plate.
Smart antennae: aerial systems can vary their strength, direction and radiation pattern accord-
ing to a stored data template.
Advanced radio technologies substitute computer power for simple transmission around one
frequency. Sometimes, computer power will be the scarce resource. It seems questionable whether
the smallest and cheapest of devices, working on minimal power budgets, can possibly have all or any
of these advanced capabilities.
16
Book RFID 01-40 25/07/06 8:15 Page 16
4.5 European IST research projects
Experts from seven currently funded IST research projects presented their views on the conference
themes. These projects represented were:
PROMISE (6th Framework, integrated project, 507100) Product lifecycle management and infor-
mation tracking using smart embedded systems
EYES (5th Framework IST-2001-34734) Energy efficient sensor networks
e-SENSE (6th Framework, integrated project, 027227) Capturing ambient intelligence for mobile
communications through wireless sensor networks
MAGNET (6th Framework, integrated project, 507102) Personal adaptive global networks
RUNES (6th Framework, integrated project, 004536) Reconfigurable ubiquitous networked
embedded systems
UbiSec&Sens (6th Framework, specific targeted research project, 506926) Ubiquitous networks
with a secure provision of services, access, and content delivery
CRUISE (6th Framework, network of excellence, 027738) Creating ubiquitous intelligent sensing
environments
Their contributions are synthesised in the other sections of this report. These projects are address-
ing various aspects of pervasive networking, such as PAN, BAN, low power sensor architectures and
security models. The variety of the presentations highlighted a need to bring these activities under a
more systematic and co-ordinated umbrella under FP7.
5 International perspective
5.1 Introduction
Three presentations updated the conference with views on research progress and initiatives in other
countries.
Ian Akyildiz from the Georgia Institute of Technology, on the USA
Shingo Ohmori, from the National Institute of Information and Communications Technology, on
Japan
Daeyoung Kim, from the Auto-ID Labs Korea Information and Communications University, on
Korea
17
Book RFID 01-40 25/07/06 8:15 Page 17
5.2 The USA
The first talk outlined the major research programmes currently being funded by the National
Science Foundation (NSF) and the Department of Defense (DoD) of the USA.The NSF programmes
are:
The GENI (Global environment for networking investigations)
FIND (Future internet network design)
GENI deals with:
new architectures for pervasive computing, mobile, wireless and sensor networks
building new services and applications
deployment and validation
FIND addresses architecture, mobile wireless and sensor technologies.
The DoD programmes are:
Automated wide-area network configuration from high-level specifications
Robust self-forming human networks: making organizations work
Modification of WiFi communication devices to support the urban warrior
Scalable mobile wireless mesh networks
xG (Dynamic spectrum access). Cognitive radio networks
CBMANET (Control based mobile ad-hoc networks)
The presentation drew attention to some research papers showing the formidable amount of work
needed to address the research challenges. The presentation put emphasis primarily on the network
architecture challenges, taking into account various application scenarios. Most of them are reported
in section 5.2 above.
It was also indicated that pervasive networking with computing and sensor networks has become a
very popular subject, with a huge number of publications over the recent years having diverse scien-
tific value.
5.3 Japan
Japan is a technologically advanced nation with world-leading positions in the cost of broadband
internet access and the proportion of internet-enabled mobile phones. It was presented how Japan
had launched a government industry initiative in January 2001, the e-Japan Strategy designed to
make Japan one of the most advanced IT nations within 5 years. The e-Japan strategy met it its 2005
targets for high-speed enabled homes well before time.
The next step after e-Japan was the UNS of July 2005. UNS stands for Universal communications,
new generation networks, new security and safety for the ubiquitous networked society, and pres-
ents the vision of the forthcoming networked society of 2010. UNS combines universal communica-
tions and new generation networks with security and safety. Elements of UNS include:
18
Book RFID 01-40 25/07/06 8:15 Page 18
ubiquitous sensors and RFID
ubiquitous ad-hoc networks
universal personal area networks using UWB
context aware software, recognising the users intentions
multi-agent software
biometric authentication
proper and efficient handling of copyright of digital contents
distributed and co-operative functionality
adaptive context-aware services
Targeted applications include:
the ubiquitous home
traceability of food
Super intelligent urban card, starting at Tokyo railway stations
A short video of the ubiquitous home demonstrated a home displaying among other facilities:
a home robot, following the householder and helping her find things
automated, sympathetic choice of TV programmes
checking by RFIDs of the contents of a handbag.
This presentation clearly showed that future home networks and environments are key targets for
these technologies.
5.4 Korea
The third speaker presented the Korean u-IT839 strategy. This strategy is a master plan for the IT
industry, in an effort to gain more growth momentum from the IT sector in Korea. It aims to
promote eight services, build three infrastructures and develop nine growth engines, as an evolution
of the former 839 strategy.
The eight services are:
2.3 GHz mobile Internet (WiBro)
DMB / DTV service
u-Home service
Telematics service
RFID-based service
W-CDMA service
IT service
VoIP service
The three infrastructures are:
BcN / IPv6 (Broadband convergence network)
USN (Ubiquitous sensor network)
Software Infrastructure
19
Book RFID 01-40 25/07/06 8:15 Page 19
The nine growth engines are:
New generation mobile phone
Digital TV
Home network
IT SoC
Post PC
Embedded software
Digital contents
RFID / USN
Intelligent Robot
The RFID / USN strategy, termed Ubiquitous life (U-life), aims at key technology development and
secure state-of-the-art technology by 2007 occupying 5% of the world RFID / USN market. A later,
realisation stage follows in 2010. This aims to occupy 7% ($53.7 million) of the world RFID / USN
market, having by then applications to traffic, medicine, environment and logistics.
A promoting organisational structure has been formed, incorporating research institutes and various
forum groups. It is planning pilot applications and main projects. These include the following.
A U-City project, the Songdo special economic zone.
Public ubiquitous sensor networks.
A hardware and software architecture and platform for the above.
The Haroobang pilot platform supporting disaster management and U-Tourism (tested on Halla
Mountain and in Cheju University, on Jeju Island).
6 Applications perspective
6.1 Overview
The potential uses of the technology of the Internet of Things are without limit.The conference cov-
ered many applications ideas, including:
current applications earning revenue with a strong business case
trial and demonstrator applications
planned applications
hypothetical applications
RFID applications have established themselves and are here to stay.Technical standards are beginning
to emerge.The majority of currently successful applications employ RFIDs in the process of industri-
al and commercial asset tracking and management. Some of these are quick wins. One of the pre-
sentations claimed that returns on investment within 6-12 months have been achieved. The biggest
returns are to be had when tracking is applied to high value, mobile items that hitherto did not have
structured handling. The return is likely to be less dramatic in situations where RFIDs replace struc-
tured handling using earlier technology, for example barcodes or manual paper-based systems.
20
Book RFID 01-40 25/07/06 8:15 Page 20
The Internet of Things represents a fusion of the physical and digital worlds. It creates a map of
the real world within the virtual world.The computers view of the physical world may, depending on
the characteristics of sensor network, possess a high temporal and spatial resolution. In other words,
it may hold lots of detailed information. The computers view of the real world need not reflect a
human view of the real world, but can free itself of constraints imposed by the limitations of human
understanding.
The Internet of Things may react autonomously to the real world.This is known as proactive com-
puting
1
. A computers view of the world allows it to interact with the physical world and influence
it. It may run processes that trigger actions, without needing a human to press the button. Reflecting
the requirement for autonomous adaptivity, the following quote was made: In order to operate at
the speed of business, manufacturers have to move from a react to forecast mindset to an adaptive
mindset. The Internet of Things is not merely a tool to extend the human capability. It becomes part
of the environment in which humans live and work, and in doing that it creates an economically,
socially and personally better environment. In industry and commerce, the Internet of Things may
bring a change of business processes.
The redesign of business process is not necessarily straightforward. Some applications may function
without human input. In other cases, human attendance and involvement will be difficult to remove,
even at the simplest level of having someone to push the button and say,Go. Some applications may
aim at supplementing, aiding and enriching rather than replacing the human control of a process.
The automotive sector is likely to be a major user of the Internet of Things. It was stated that the
proportion of cars containing inbuilt telematics would rise from 20% in 2007 to 43% in 2010. The
motivations for using on-board radio, notwithstanding that this is an electrically difficult environment
for wireless transmission, were configurability, flexibility, innovation and simplification of manufacture.
An in-car telematic platform and architecture were under development. This sector would use com-
munications for:
in-car monitoring
in-car telematics
car-to-infrastructure and infrastructure-to-car communication
vehicle-to-vehicle co-operation
Manufacturers may use sensor technology to create extended products. This adds value to physical
goods by providing a service element. Robot technology is today normally associated with manufac-
turing and business; however one presentation suggested that the home robotic market might exceed
the industrial market within ten to twenty years time.The home market, notably the healthcare sec-
tor, adds extra requirements for lightweight, wearable devices.
The development of successful applications depends on the development of technical platforms and
where appropriate standards within the application domain. These include:
21
1
Terminology introduced by Intel.
Book RFID 01-40 25/07/06 8:15 Page 21
Service object architecture (SOA)
Digital manufacturing
Flexible manufacturing
Manufacturing intelligence
Data mining
Data management
Manufacturing and user interfaces
Usability
Product representations
Means of personalisation
Sensor networks and pervasive networking approaches are also of high interest to the mobile indus-
try. Context aware applications using mobile devices with dynamically varying service platforms are
currently under investigation by mobile operators. Pilots already exist showing the possibility of using
a mobile device to interact with the environments, e.g. in various consumer contexts. A major EU
manufacturer has also launched an initiative called Sensor Planet, which consists of a test platform
for mobile-centric wireless sensor network research. The vast majority of the research challenge in
the context of mobile communications with devices is related to the service platform and to the
requirement of making available context aware services that can dynamically react and adapt to the
environment.
6.2 Application list
There now follows a list of applications raised at the conference, organised into a simple logical taxon-
omy.This report does not claim to have captured every possibility that was either stated or implied in
the presentations and discussions. However, it gives a view of the spectrum of possibilities. Many more
may be imagined. Note that there are no obvious killer applications. This is an added reason why a
standard infrastructure is necessary, as opposed to leaving it to the market to create application-specif-
ic infrastructures in a piecemeal fashion. This in turn drives the requirements towards development of
generic technologies that may be subsequently reused in diverse application contexts.
Military applications
Oil & gas industry
Mining industry
Intelligent buildings
Building automation
Transportation
Monitoring railway vehicle bearing temperatures
Predictive mid-life maintenance
Monitoring early-life performance
Transport logistics
Shipping
Ticketing and payment
Mobile phone interacting with payment systems
22
Book RFID 01-40 25/07/06 8:15 Page 22
Automotive
Intelligent tyre
Vehicle identity
Motorway signs
Vehicle to vehicle, co-operative driving
Internal vehicle control architecture
In-vehicle telematics
Infrastructure-to-vehicle communication: road and service information
Recycling of materials in vehicles
Detection: seat belts, door / trunk opening, temperature, rain
Parking sensing
Environmental monitoring
Tagging bird population
Meteorological monitoring
Radiation detection
Coastal and wave monitoring
Tsunami detection
River level monitoring
Water pollution monitoring
Golf course ground management
General supply chain and product management
Supply chain integration
Product life cycle integration
Inventory management
Spare-part warehousing
Warehouse management
Warehouse batching for delivery
Quality control
Serial number look-up
Field service management
Mobile asset management
Airport secure vehicle tracking
Aeroplane maintenance tools tracking
Pallet tracking
Scrap handling
Hazardous waste management
Geolocation
23
Book RFID 01-40 25/07/06 8:15 Page 23
Process management
Semiconductor wafer fabrication, batch movements
Industrial robotics
Telerobotics (distant robot control)
Telepresence: camera / video recorder
Gas pipeline monitoring
Compliance monitoring activities
Fire shutters
Fire doors
Smoke alarms
Escape routes
Premises cleaning
Conveyor systems
Agriculture
Monitoring of food supply chain (from field to fork)
Monitoring of animals
Plant protection
Retail management
Shelf stocking
Shopping basket / shopping list
In-store direction finding
Display advertising
Sensor-based checkout
Vending machines
Tagged merchandise
Mobile phone interacting with payment systems
Hired equipment tracking
Healthcare
Drug identification and tracking
Healthcare monitoring: ECG, pulse, temperature, blood pressure
Life support monitoring
Security
Detection of counterfeit goods
Access control
Banknotes
Passports
24
Book RFID 01-40 25/07/06 8:15 Page 24
Government and public sector
Disaster management
Tunnel fire management
Tourism support
Homeland security: special event control
Information systems
Billboards and signs
Home
Remote door lock monitoring
Remote home metering
Follow-me visual communication
Home appliance network
Home automation
Home robotics
Lifestyle assistant (follows you, helps you find things)
Lifestyle: lighting control
Lifestyle: choosing music, TV programmes
Entertainment environments
Food monitoring (internet fridge)
Energy management
Automatic shutters
Leisure and recreation
Sports equipment: user performance monitoring
Education and learning
Intelligent teddy-bears (talk, demonstrate scientific principles)
7 Non-research perspectives
This section of the report addresses non-technical issues of possible concern to governments, regu-
lators and other policy-making bodies. It captures the proceedings of the final session of four presen-
tations and the preceding panel discussion.
7.1 Closing session
The important issue of naming and addressing was outlined. If one wants to connect with some-
thing, one must know where it is. In the Internet, a hierarchy of domain name servers (DNS)
allows one to do this.The root server is queried, which directs to another server, and so on, until the
one that knows the physical address is found. An extension of this system, object name servers
(ONS), is expected to serve RFIDs and the Internet of Things. There is a governance issue because
name servers are owned resources that confer monopoly control of data on their owners. Problems
have already surfaced within the Internets existing DNS system. The Internet of Things presents a
further challenge that mobile objects may need to re-register their presence on different name
25
Book RFID 01-40 25/07/06 8:15 Page 25
servers as a consequence of moving. This requires redelegation, redelegation requires authorisation
and authorisation needs means of controlling the authority, or else someone could steal the identi-
ty.The Internet of Things must learn from the DNS discussions.The presentation further crystallised
the problem thus: (Though) the end node is no longer under control of the network provider, and
neither are the services, network providers might use RFID as yet another application they want to
control, instead of seeing it as another end-to-end solution using their network.
The second speaker listed many issues, including access, roaming, billing, legal liability, data retention,
competition, privacy and threat vulnerabilities.This was a timely distillation of issues generic to many
types of network, as any of these could in due course become a hot button issue.
The privacy position was also reviewed, noting that RFID technologies provide for identification of
people and collect data about their personal activities. Applications may be:
mandatory (e.g. passports, identity cards)
conditional but without a realistic opt-out (e.g. transport payment)
conditional with opt-out facilities (e.g. tag neutralisation, loyalty card contracts)
genuinely optional (e.g. personal enhancement, sports applications)
It was concluded, RFID smart tags are not, by themselves, a threat against privacy (or business
secrets), but unsecured, non-publicly regulated information systems supporting RFID-empowered
applications definitely are. Hence, a need for additional privacy regulated regulation was called for.
Reviewing the present state of the European legal framework in protecting sensitive personal data, it
was also noted that since the directive entered into force in October 1998, the Commission has not
received notifications from the UK, France, Italy, Ireland, Sweden or Luxembourg. Furthermore, none
of the new ten Member States has yet notified the use of contractual clauses or other safeguards to
the Commission.
Radio is fundamental to the Internet of Things, and the allocation of radio spectrumis possibly the
most important key issue for many regulatory and government agencies.A number of proposals were
put forward.
There are four ways to allocate spectrum to users and applications:
managed methods, the traditional command and control model
market methods, the property model
unlicensed spectrum methods, the commons model
mixed methods, using a combination of the above methods according to function and economic
purpose
Although we are unsure which of the methods will catalyse maximum economic growth, recent stud-
ies are pointing in the direction of the last two.
Growing demand for radio usage implies either the spread of unlicensed bands in breadth and num-
ber, or the spread of new technology which:
allows transparent overlap of multiple signals (direct spread spectrum)
adapts and compensates for already occupied spectrum with cognitive radio and software defined
radio
26
Book RFID 01-40 25/07/06 8:15 Page 26
Against the belief that spectrum is scarce, it was argued, Todays spectrum scarcity is very much an
artificial product of archaic public policies. Quoting Mark McHenry, the speaker went on to say, On
average, only slightly more than 5% of the USA radio spectrum is used nationally at any given time.
Hence, the need for revisiting the way spectrum is managed was outlined, which is an issue not con-
strained to the RFID applications, but ranging across all applications of radio spectrum.
7.2 Panel discussion
The discussion explored a number of issues.
The most important research topics
Funding priorities
Why is public funding necessary?
How can research be accelerated?
What about privacy and the ethical dimension?
Should we qualify software for quality and security?
Will the automotive industry trust an external sensor?
The most important research topics, according to panel members, would be system depend-
ability and system integration. The need to take a system perspective encompassing all the various
issues was reaffirmed.
Funding priorities should support a long-term perspective. Fundamental, blue sky research is
going to be essential, though it needs to be strongly articulated with industrial perspectives.
Companies must share the true problem issues with the academic world, not letting confidentiality
concerns obstruct this.
How can research be accelerated?
The simple answer is that it probably cannot.Truly creative innovation needs time.We can, of course,
try to stop the spending of research time on less creative paper chase activities. Infrastructure issues
are in general related to long innovation cycles, because of the magnitude of the required invest-
ments.
What about privacy and the ethical dimension?
This question provokes two types of response.The first is that privacy should be a primary and urgent
concern, even to the point of slowing development of the technology. The second is to say, Forget
it. Pandoras box has opened and cannot be closed, privacy is lost, the technology is interesting, so
lets get on with it.
This last view must, in its extreme form, surely be unacceptable. A presentation reminded, One of
the most fundamental rights in a healthy society is the right of every citizen to be left alone. Article
12 of the UN Universal Declaration of Human Rights, states that No one shall be subjected to arbi-
trary interference with his/her privacy, family, home or correspondence.
It follows that governments must give emphasis to a legal framework that will cause these issues to
receive right consideration.
27
Book RFID 01-40 25/07/06 8:15 Page 27
Should we qualify software for quality and security?
This is a good objective, but the panel doubted that throwing tools at checking for quality would be
productive.
Will the automotive industry trust an external sensor?
It is most unlikely that in-car systems will trust life-critical decisions to external systems in the short
term.
8 Annex: conference agenda
8.1 Welcome address
Dr Joo Da Silva, Director Network and Communication technologies,
European Commission, DG Information Society and Media
8.2 Stream A1: State of the art & vision
the system and technological perspective
This stream aimed to provide vision on future evolutions towards pervasive networked systems and devices, with a
mid-term to long-term perspective. It was intended to give insight into the various economic, technological and appli-
cation trends driving the evolution of the architectures to be considered for future systems of networked objects.
The stream aimed finally to introduce open technological issues and generic future challenges at system level.
Session Chair: Prof. Ramjee Prasad, University of Aalborg
Research Views
Wireless sensor networks: is it worthwhile after at all?
Prof. Petri Mahnen, University of Aachen
Ubiquitous digitisation: connecting people and objects to people and objects
Dr. Pekka Silvennoinen, Director,VTT Technical Research Centre of Finland
Industry Views
From smart devices to ambient communication
Dr. Gilles Privat, Senior Scientist, France Telecom R&D Division
The Internet of Things
Dr. George Bilchev, Pervasive ICT Centre, BT
A view from the ITU
Pervasive, ambient, ubiquitous: the magic of radio
Mrs. Lara Srivastava, New Initiatives Programme Manager, ITU
Concluding remarks, bridging research and business
Bridging the gap between research and business in the on demand era
Dr. Krishna Nathan,VP Services, Director Zurich Research Laboratory, IBM
28
Book RFID 01-40 25/07/06 8:15 Page 28
8.3 Stream A2:The security, privacy and society dimensions
This stream took a system perspective of the various security issues that can be encountered in pervasive
networked systems having to support high flexibility and reconfigurability constraints.
RFID-Tags: Privacy and Security Issues
Dr. Pim Tuyls, Senior Scientist, Philips Research
How to secure visible, physical, (of only one holding) objects through a digital trustworthy infrastruc-
ture?
Prof. Michel Riguidel, Head of ICT Dept, Ecole Nationale Suprieure des Tlcommunications (ENST)
From central command & control to distributed dependability & empowerment
Dr. Stephan J. Engberg, Founder, Open Business Innovation, Priway
Privacy, ethics and society: implications of pervasive computing
Dr. Frank Stajano, Lecturer, University of Cambridge Computer Laboratory
RFID in asset management: European case studies
Mr. Paul Stam de Jonge, Group Director - RFID Solutions, Logica CMG
8.4 Stream B1:The application and industrial perspective
This stream aimed at a mid-term to long-term perspective in identifying requirements for future applications
taking advantage of pervasive networked technologies such as RFID and their likely evolution towards smart
objects.
Afternoon Session Chair: Prof. Michel Riguidel, Head of ICT Dept, Ecole Nationale Suprieure des
Tlcommunications (ENST)
The Internet of Things in production, logistics, and services
Prof. Dr. Elgar Fleisch, Institute of Technology Management, University of St Gallen Pervasive net-
worked technologies for automotive application
Ing. Francesco Lilli, Head of Technologies Department, Telematics Systems, Centro Ricerche, FIAT
The Internet of Things: - an industrial perspective
Dr. Martin Elixmann, Head of the Connectivity Dept, Philips Research Europe (Aachen)
Proactive computing: RFID & sensor networks
Mary Murphy-Hoye, Senior Principal Engineer & Joe Butler, Co-Director, IT Research, Intel
Corporation
29
Book RFID 01-40 25/07/06 8:15 Page 29
8.5 Stream B2:The application and industrial perspective (continued)
Intelligent and networked products: a product and manufacturing perspective
Prof. Dr.-Ing. Klaus-Dieter Thoben, University of Bremen
RFID activities at Siemens: from shop floor to board room
Dr. Claus Biermann, Corporate Technology, Siemens
Ubiquitous sensing, computing and communication
Dr. Tapani Ryhnen, Head of Strategic Research, Mobile Devices, Nokia Research Centre
An application and industrial perspective
Prof. Dr.-Ing. Hendrik Berndt, CTO, DoCoMo Euro Labs, Munich
8.6 Stream C: Snapshot of IST initiatives
This stream introduced the main research topics of a number of running or completed IST projects in the
field of pervasive networked devices, outlining the main challenges for future collaborative R&D.
Morning Session Chair: Mr Rainer Zimmermann, Head of Unit, Communication Technologies,
DG INFSO, European Commission
PROMISE (enterprise management): Smart Items & Future Manufacturing
Dr. Uwe Kubach, Director, SAP Research, Dresden
EYES (objects networking) project overview
Dr. Nirvana Meratnia, Researcher, University of Twente
e-SENSE (RFID/objects networking): Capturing ambient intelligence for mobile communications
through wireless sensor networks
Dr. Pierre R. Chevillat, Manager Sensor Networks, Zurich Research Laboratory, IBM
MAGNET (PAN/BAN): The unpredictable future: personal networks paving the way towards 4G
Mr. Juha Saarnio, Head of Industrial Initiatives, Nokia
An overview of the RUNES project
Dr. Cecilia Mascolo, Advanced Research Fellow and Senior Lecturer, University College, London
UbiSec&Sens (security aspects of networked objects) overview
Dr. Dirk Westhoff, Senior Researcher, NEC Labs Europe
CRUISE (Network of excellence on technologies)
Dr. Ir. Neeli R. Prasad, Head of Wireless Security and Sensor Networks Lab, Aalborg University
30
Book RFID 01-40 25/07/06 8:15 Page 30
8.7 Stream D: Beyond Europe
This stream presented views from the US and in Asia on current and expected developments in the field of
networked ubiquitous systems and smart networked devices.
The USA: Prof. Dr. Ian F. Akyildiz, Georgia Institute of Technology
Japan: Dr. Shingo Ohmori, Vice President, National Institute of Information and Communications
Technology (NICT)
Korea: Prof. Dr. Daeyoung Kim, Auto-ID Labs Korea Information and Communications University.
8.8 Panel Discussion: evolution & collaborative research requirements
Afternoon Panel Moderator and Session Chair: Prof. Petri Mahnen, University of Aachen
The moderated panel discussion gathered speakers from the morning presentations and other contributors,
providing an opportunity for exchange of views and interactive debate with the audience.
Previous speakers included Ian Akyildiz, Pierre Chevillat, Cecilia Mascolo, Neeli Prasad, Ramjee Prasad,
Frank Stajano and Dirk Westhoff. Others, not being previous speakers, were Prof. Gianfranco Manes
(University of Florence) and Dr.-Ing. Andreas Willig (Technical University of Berlin).There were ques-
tions and contributions from the audience.
8.9 Stream E: Possible barriers to deployment
This stream went beyond R&D issues to address economic, privacy, regulatory, policy and consumer accept-
ance issues that follow from the implementation of networked pervasive technologies.
A brief look at ONS and DNS, and Internet of Things
Dr. Patrik Fltstrm, Member of Internet Architecture Board, Senior Consulting Engineer, Cisco
RFID tags & ambient, ubiquitous networks (Consumer and privacy issues of ubiquitous technolo-
gies)
Dr. Ewan Sutherland, Former Executive Director, International Telecommunications Users Group
(INTUG)
From digital object identification to digital identification of people: institutional answers tested by
reality
Dr. Franoise Roure, President, Legal and Economic Section, National Advisory Board on Information
Technologies
The issue of spectrum: radio spectrum management and ubiquitous network society
Mr. Simon Forge, SCF Associates Ltd
31
Book RFID 01-40 25/07/06 8:15 Page 31
32
Book RFID 01-40 25/07/06 8:15 Page 32
Mr Tom Aelbrecht Johnson & Johnson, Belgium
Mr Manfred Aigner Graz University of Technology, Austria
Pr Ian Akyildiz Georgia Institute of Technology, USA
Mr Ferenc Balazs Budapest University of Tech., Hungary
Mrs Emilie Barrau BEUC, Belgium
Mr Henri Barthel GS1, Belgium
Dr Valter Bella Telecom Italia, Italy
Dr Simon Bergulf Hill & Knowlton, Belgium
Prof Guy Bernard Institut National des Tlcoms, France
Dr Hendrik Berndt NTT DoCoMo Labs Europe
Mr Laurent Beslay EDPS, Belgium
Dr Nicola Bicocchi Universit. di Modena (UNIMORE), Italy
Dr Claus Biermann Siemens AG, Germany
Dr Georges Bilchev BT sensor group
Ms Elizabeth Board EPCglobal Inc, United States
Mrs Anna Bonetti Telecom Italia spa, Italy
Mr Heinz Paul Bonn GUS-GROUP AG&Co, Germany
Mr Maarten Botterman, Netherlands
Mr Jean-Louis Boucon TURBOMECA, France
Ms Susana Braz GPlus Europe, Belgium
Mr Andrew Britts AIM Global
Mr John Buckley UK
Ms Antal Bulanza Universit Libre de Bruxelles, Belgium
Mr Joe Butler Intel, Ireland
Mr Juan Caas Ministry IndustryTourism Trade, Spain
Mr Florian Cartoux Weber Shandwick, Belgium
Mr Gilles Casanova STMicroelectronics, France
Mr Tim Chandler Intel of Canada Ltd., Canada
Mr Paulo Chaves INOV, Portugal
Mr Paul Cheshire Atos Origin, United Kingdom
Dr Pierre Chevillat IBM Zurich, Austria
Mrs Susanne Christen Pleon, Belgium
Mr James Clarke Waterford Institute of Technol, Ireland
Policy Officer Daniela Coleman AMCHAM EU, Belgium
Mr Paul Couderc INRIA, France
Mrs Sylvie Couronne Fraunhofer IIS, Germany
Mr Johan Criel Alcatel BELL
Mr Bruno Crispo
Mr Florian Damas, France
Mr Denis Darquennes Law Faculty FUNDP (Namur), Belgium
33
List of Participants
Book RFID 01-40 25/07/06 8:15 Page 33
Mr Christian de Prost ATMEL, France
Mrs Pascal Declaye EUROPEAN COMMISSION, Belgium
Mr Philippe Defraigne Cullen International, Belgium
Dr Ir Stphane Deketelaere multitel ASBL, Belgium
Mr Henri Delahaie BASIC, France
Mr Jean-Franois Delaigle Multitel, Belgium
Mr Pietro Di Giovanni ACOServices, Belgium
Mr Jan Dirksen, Germany
Dr Hans-Joachim Dreier Philips GmbH, Germany
Dr Martin Elixmann Philips
Mr Heinze Elzinga Philips, Netherlands
Dr Stephan Engerg Open Business Innovation and Priway
Mr Alexander Enns BIBA, Germany
Dr Alea Fairchild University of Twente, Netherlands
Dr Patric Fltstrm Cisco Systems
Dr Emmanuel Fernandes MUWAC, Belgium
Mr Estanislao Fernandez Telefnica I+D, Spain
Pr Elgar Fleisch Auto-ID Labs St-Gallen, Switzerland
Mr Simon Forge SCF Associates LTD, United Kingdom
Mr Mirko Freitag Student, Germany
Mr Ulrich Friedrich Atmel Germany, Germany
Prof Anthony Furness AIM UK, United Kingdom
Mr Axel Gabriel Representation of the State No, Germany
Ms Maya Gadzheva ICRI - KUL, Belgium
Mr Eduardo Garca INgENIUS TEAM, Spain
Mr Fabrizio Gatti Telecom Italia, Italy
Mr Jens Geelhaar Bauhaus-University, Germany
Dr George Giaglis ATHENS UNIVERSITY OF ECONOMICS, Greece
Mr. Massimiliano Giannandrea ADIE, Italy
Mr Fabio Gilio ICRI-KULeuven, Belgium
Dr Frank Gillert UbiConsult, Germany
Mr Damien Giry UCL Crypto Group, Belgium
Mrs Elisabeth Gonzalez VUB, Belgium
Mr Laurent Gonzalez Trevise Consulting, France
Mr Dov Goshen Israeli Mission of Defence, Belgium
Mr John Greaves NCR Corporation, United States
Mr Heiko Gsell BIBA, Germany
Mr Cheng Guo Delft University of Technology, Netherlands
Mr Jean-Franois Heering Multitel ASBL, Belgium
Mr Uwe Herzog Eurescom, Germany
34
Book RFID 01-40 25/07/06 8:15 Page 34
Prof Mireille Hildebrandt Vrije Universiteit Brussel, Netherlands
Mr Martijn Hunteler LogicaCMG, Netherlands
Mr Bernard Istasse EISIS, France
Mr Nicolas Jacobeus UCL Crypto Group, Belgium
Prof Jean-Marie Jacquet University of Namur, Belgium
Mr Kai Jakobs RWTH Aachen, Germany
Mrs Marisa Jimenez Martin Deutsche Post world net
Mr Mattias Johansson Ericsson AB, Sweden
Mr Kim Jongsu K.U.Leuven, Belgium
Mr Stamatis Karnouskos SAP Research, Germany
Mr Daniel Kitscha University, Dsseldorf
Dr Cornel Klein Siemens AG, Germany
Ms Caroline Konrad Brunswick, Belgium
Mr Nico Kortemeier Landesvertretung NRW bei der E, Germany
Prof Gerd Kortuem Lancaster University, United Kingdom
Mrs Eleni Kosta ICRI - K.U.Leuven, Belgium
Dr Costis Koumpis Sira Ltd., United Kingdom
Dr Uwe Kubach SAP Research
Mr Frank Kuhlmann GS1 Germany, Germany
Mr Mika Laakkonen Rovaniemi Uni. of Applied Sc., Finland
Mr Cees J.M. Lanting Hermes Partnership, Belgium
Miss Coline Lavorel EUROSMART, Belgium
Dr. Anton Lavrin University of Technology, Slovakia
Mr Yann Le Borgne Universit Libre de Bruxelles, Belgium
Mr Hugh Leather University of Edinburgh, United Kingdom
Mr Felix S. Leder University of Bonn, Germany
Mr Andy Lee Cisco Systems, United Kingdom
Mrs Sophie Lepallec GS1 France, France
Mr Francis Letellier INRIA / ObjectWeb France
Mr Edward Lewin Hewlett-Packard, United Kingdom
Mr Andreas Ligtvoet RAND Europe, Netherlands
Mr Javier Llobet Telefonica I+D, Spain
Mr Pierre Louis Dechert LLP, Belgium
Mr James Lovegrove AeA Europe, Belgium
Pr Petri Mahonen University Aachen, Germany
Prof Gianfranco Manes Universit di Firenze, Italy
Mr Henk Mannekens BT plc, Belgium
Dr Cecilia Mascolo University College London, United Kingdom
Dr Francesco Massidda DIEE- University of Cagliari, Italy
Mr Peter Matthews CA, United Kingdom
35
Book RFID 01-40 25/07/06 8:15 Page 35
Mrs Debora Mattiuzzo Confcommercio International, Italy
Dr Oscar Mayora CREATE-NET, Italy
Dr Nirvana Meratnia University of Twente, Netherlands
Mr Mark Miller Cotecna, Switzerland
Ms Marianne Mortensen FEDMA, Belgium
Mr Bernd Mueller Unisys Deutschland GmbH, Germany
Mrs Mary Murphy-Hoye RFID & Sensor Networks Strategic Initiatives
Dr Philip Myers European Retail Round Table, Belgium
Mr Bard Myhre SINTEF ICT, Norway
Mr Pablo Najera University of Malaga, Spain
Dr Krishna Nathan IBM Zurich, Austria
Mr Pierre Nguyen EDF, France
Dr John O'Flaherty MAC Ltd, Ireland
Dr Shingo Ohmori NICT, Japan
Mrs Maitane Olabarria Uzquiano, EMOTA
Mr Maachi Ouael Student ULB, Belgium
Mrs Aline Pajot Electricite de France, France
Mr Ioannis-E. Papasliotis Microsoft, Belgium
Dr Marina Petrova RWTH Aachen, Germany
Mr Wang Phi Phi Student ULB, Belgium
Mr Daniel Piret SYNERGETEK SA, Belgium
Mr Patrizio Pisani Consorzio Roma Ricerche, Italy
Mr Patrick Pizzera Student, University of Lugano, Switzerland
Mr Klaus-Dieter Platte Platte Strauss, Belgium
Mr Joris Pollet Procter & Gamble, Belgium
Mr Martin Potts Martel, Switzerland
Mr Fakun Prakash Student, ULB Belgium
Pr Ramjee Prasad University Aalborg, Denmark
Dr. Neeli Prasad CTIF, Aalborg University, Denmark
Dr Erich Prem eutema Technology Management, Austria
Dr Nicolas Prigent Thomson R&D France, France
Mr Gilles Privat FT R&D
Mr Lukas Pustina University of Bonn Germany
Mrs Luiza Ramona Nita
Dr Reza Razavi University of Luxembourg, Luxembourg
Mr Janne Riihijari RWTH Aachen, Germany
Mr Matthias Robeck MGI METRO Group Information Te, Germany
Mrs Martina Rohde European Commission DG INFSO, Belgium
Mr Rodrigo Roman University of Malaga, Spain
Mr Michael Rose Johnson & Johnson, United States
36
Book RFID 01-40 25/07/06 8:15 Page 36
Dr Pawel Rotter European Commission, JRC, IPTS, Spain
Mr Michel Rousseau filrfid.org, France
Dr Tapani Ryhanen NOKIA, Finland
Mr Juha Saarnia NOKIA
Dr Mikko Sallinen VTT, Finland
Mr Santiago Sanchez DG Transport, Spain
Mr Orestes Sanchez-Benavente Telefonica I+D, Spain
Dr Alberto Sanna FONDAZIONE CENTRO SAN RAFFAELE, Italy
Mrs Hannah Sarzedas Europe Unlimited, Belgium
Mr Andreas Schaller Motorola, Germany
Mr Alexander Schelhase Infineon AG, Germany
Mrs Helen Schindler European Commission, Belgium
Mr Laurent Sciboz RFID Center - University of ap, Switzerland
Mr Beau Sherriff Dow Corning, Belgium
Dr Pekka Silvennoinen VTT, Finland
Prof Knud Erik Skouby CICT- DTU, Denmark
Dr Sarah Spiekermann Humboldt-Universitt zu Berlin, Germany
Mrs Kalliopi Spyridaki The Centre, Belgium
Mrs Lara Srivastava ITU Policy
Pr Frank Stajano University of Cambridge, UK
Dr Paul Stam de Jonge LogicaCMG
Mr William Stevens Europe Unlimited, Belgium
Mrs Flavia Straulino New Zealand Trade and Enterpri, Italy
Dr Jens Strueker University of Freiburg, Germany
Mrs Michle Struvay Philips, Belgium
Mr Adam Subkow West Midlands in Europe, Belgium
Mr Ewan Sutherland Intug
Dr Lauri Sydanheimo Tampere Univ of Tech Rauma Lab, Finland
Mr Dario Tarchi EC - JRC IPSC, Italy
Dr Frederic Tatout Ministry of industry, France
Mr Jeroen Terstegge Philips Electronics, Netherlands
Mrs Patricia Testa NCR Corp.
Mr Aristeidis Theotokis Athens University of Economics, Greece
Mr Jesper Thestrup In-JeT ApS, Denmark
Mrs Michle Thonnet Ministre de la Sant, France
Mr Lieven Trappeniers Alcatel, Belgium
Mr Pim Tuyls Philips Research, Netherlands
Mrs Jennifer Underwood US Mission to the EU, Belgium
Dr Franois Vacherand CEA-LETI, France
Mrs Clementine Valayer University of Brussels, Belgium
37
Book RFID 01-40 25/07/06 8:15 Page 37
Mr Antonio Valentini CRIT, Italy
Dr Gerjan van Bakel LogicaCMG, Netherlands
Prof Paul Van Binst University of Brussels, Belgium
Mr Jan Van den Abeele Alcatel BELL, Belgium
Mr Jeroen van Ingen IdeAtics, NEN commission membe, Netherlands
Mr Werner Van Leekwijck Alcatel, Belgium
Mr Marc van Lieshout TNO, Netherlands
Mr Wim Vandenberghe Ghent University, Belgium
Mrs Eva Veivo Council of the European Union
Dr. Ovidiu Vermesan SINTEF, Norway
Mrs Maribel Vidal GS1 Sapin, Spain
Mr Andras Vilmos Motorola, Hungary
Ms Antonia Voerste METRO AG, Germany
Mr Thomas Von der Gruen Fraunhofer IIS, Germany
Dr Norbert von Thienen Ministry of Innovation NRW, Germany
Ms Sabrina Vulfs ICHEC, Belgium
Miss Katarzyna Wac University of Geneva, Switzerland
Mr Wsewolod Warzanskyj Telefonica I+D, Spain
Mr John Waterhouse Cellspot Technologies Ltd, United Kingdom
Dr Dirk Westhoff NEC Europe Ltd, Germany
Dr Reiner Wichert Fraunhofer IGD, Germany
Dr. Andreas Willig TU Berlin, Germany
Mr Jean-Marie Willigens Deutsche Lufthansa, Germany
Dr Konrad Wrona SAP Research, France
Mr Eisaku Yamaji Mission of Japan to the EU, Japan
Mr Lu Yan TUCS, Finland
Ms Emel Yavuz, Emota
Mr Paul Ytterstad Telenor, Norway
Mr Laurent Zanello Conseil Stratgique des Technologies de l'Information CSTI, France
38
Book RFID 01-40 25/07/06 8:15 Page 38
Welcome address
Dr Joo Da Silva, Director Network and Communication technologies
European Commission, DG Information Society and Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Stream A1, State of the Art & Vision The System and Technological perspective
Research Views
- Prof Petri MAHOENEN, University Aachen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
- Dr Pekka SILVENNOINEN, Director,VTT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
Industry Views
- Dr Gilles PRIVAT, Senior Scientist, France Telecom R&D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
- Dr George BILCHEV, Head of Sensor Networks Research BT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91
A view from the ITU
- Mrs Lara SRIVASTAVA, New Initiatives Programme Manager, ITU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108
- Dr. Krishna NATHAN, Director IBM Zurich Research Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119
Stream A2:The security, Privacy and Society Dimension
- Dr Pim TUYLS, Senior Scientist, Philips Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131
- Prof Michel RIGUIDEL, Head of ICT Dept,
Ecole Nationale Suprieure des Tlcommunications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142
- Dr Stephan J. ENGBERG, Founder, Open Business Innovation and Priway . . . . . . . . . . . . . . . . . . . . . . . . . .148
- Dr Frank STAJANO, Lecturer, University of Cambridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156
- Mr Paul Stam de JONG, Group Director - RFID Solutions, Logica (security appli) . . . . . . . . . . . . . . .161
Stream B1: The application and Industrial perspective
- Prof. Dr. Elgar FLEISCH, Head of Dept, Auto-ID Labs St. Gallen
(production, logistics and services) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .172
- Ing Francesco LILLI, Head of Technologies Department, Telematics Systems,
Centro Ricerche, FIAT (automotive appli) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189
- Dr. Martin ELIXMANN, Head of the Connectivity Dept, Philips Research
(home, medical, or car) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
- Mary MURPHY-HOYE, Senior Principal Engineer & Joe BUTLER, Co-Director,
IT Research, Intel Corporation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .210
Stream B2: The application and Industrial perspective (cd)
- Prof. Dr.-Ing. Klaus-Dieter THOBEN, University of Bremen (production and manufacturing) . . . .220
- Dr. Claus BIERMANN, representing Mr. Reinhold ACHATZ,VP Siemens, (health) . . . . . . . . . . . . . . . . .231
- Dr. Tapani RYHAENEN, Head strategic research, Mobile devices, Nokia research . . . . . . . . . . . . . . . . .238
- Prof.Dr. -Ing Hendrik BERNDT, Senior VP, CTO, NTT DoCoMo Labs Europe . . . . . . . . . . . . . . . . . . . . .244
- Dr Uwe KUBACH, Director, SAP research Dresden (PROMISE, enterprise management) . . . . .258
39
Overview of presentations included in this book
Book RFID 01-40 25/07/06 8:15 Page 39
Stream C, Snapshot of IST initiatives
EYES (objects networking)
- Dr Nirvana MERATNIA, Researcher, University of Twente . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .266
E_SENSE (RFID/objects networking):
- Dr Pierre R. CHEVILLAT, Manager Sensor Networks, IBM Zurich . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .271
MAGNET (PAN/BAN)
- Mr. Juha SAARNIO, Head of Industrial Initiatives, Nokia Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .280
RUNES
- Dr. Cecilia MASCOLO, Advanced Research Fellow and Senior Lecturer,
University college London . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .289
UBISEC&SENSE (security aspects of networked objects)
- Dr. Dirk WESTHOFF, Senior Researcher, NEC Labs Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .295
CRUISE (Noe on technologies)
- Dr. Ir. Neeli R. PRASAD, Head of Wireless Security and Sensor Networks Lab,
Aalborg University . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303
Stream D, Beyond Europe
USA
- Chair Prof/Dr. Ian F. AKYILDIZ Georgia Institute of Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .309
JAPAN
- Dr Shingo OHMORI,Vice President NICT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323
KOREA
- Prof. Dr. Daeyoung KIM, Auto-ID Labs Information and Communications University. . . . . . . . . . . .339
Stream E: Possible barriers to deployment
- Dr Patrik FALTSTROM, Member of Internet architecture board, Cisco . . . . . . . . . . . . . . . . . . . . . . . . . . . . .349
- Dr Ewan SUTHERLAND, Former Executive Director,
International Telecommunications Users Group (INTUG) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .358
- Dr. Franoise ROURE, Conseil gnral des technologies de l'information . . . . . . . . . . . . . . . . . . . . . . . . . .366
- Mr Simon FORGE, SCF Associates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .371
40
Book RFID 01-40 25/07/06 8:15 Page 40
41
Book RFID 41-130 25/07/06 8:53 Page 41
42
Book RFID 41-130 25/07/06 8:53 Page 42
43
Book RFID 41-130 25/07/06 8:53 Page 43
44
Book RFID 41-130 25/07/06 8:53 Page 44
45
Book RFID 41-130 25/07/06 8:53 Page 45
46
Book RFID 41-130 25/07/06 8:54 Page 46
47
Book RFID 41-130 25/07/06 8:54 Page 47
48
Book RFID 41-130 25/07/06 8:54 Page 48
49
Book RFID 41-130 25/07/06 8:54 Page 49
50
Book RFID 41-130 25/07/06 8:54 Page 50
51
Book RFID 41-130 25/07/06 9:06 Page 51
52
Book RFID 41-130 25/07/06 9:06 Page 52
53
Book RFID 41-130 25/07/06 9:06 Page 53
54
Book RFID 41-130 25/07/06 9:06 Page 54
55
Book RFID 41-130 25/07/06 9:06 Page 55
56
Book RFID 41-130 25/07/06 9:06 Page 56
57
Book RFID 41-130 25/07/06 9:06 Page 57
58
Book RFID 41-130 25/07/06 9:06 Page 58
59
Book RFID 41-130 25/07/06 9:06 Page 59
60
Book RFID 41-130 25/07/06 9:07 Page 60
61
Book RFID 41-130 25/07/06 9:22 Page 61
62
Book RFID 41-130 25/07/06 9:22 Page 62
63
Book RFID 41-130 25/07/06 9:22 Page 63
64
Book RFID 41-130 25/07/06 9:22 Page 64
65
Book RFID 41-130 25/07/06 9:22 Page 65
66
Book RFID 41-130 25/07/06 9:22 Page 66
67
Book RFID 41-130 25/07/06 9:22 Page 67
68
Book RFID 41-130 25/07/06 9:22 Page 68
69
Book RFID 41-130 25/07/06 9:22 Page 69
70
Book RFID 41-130 25/07/06 9:22 Page 70
71
Book RFID 41-130 25/07/06 9:35 Page 71
72
Book RFID 41-130 25/07/06 9:35 Page 72
73
Book RFID 41-130 25/07/06 9:35 Page 73
74
Book RFID 41-130 25/07/06 9:35 Page 74
75
Book RFID 41-130 25/07/06 9:35 Page 75
76
Book RFID 41-130 25/07/06 9:35 Page 76
77
Book RFID 41-130 25/07/06 9:35 Page 77
78
Book RFID 41-130 25/07/06 9:35 Page 78
79
Book RFID 41-130 25/07/06 9:35 Page 79
80
Book RFID 41-130 25/07/06 9:35 Page 80
81
Book RFID 41-130 25/07/06 9:47 Page 81
82
Book RFID 41-130 25/07/06 9:47 Page 82
83
Book RFID 41-130 25/07/06 9:47 Page 83
84
Book RFID 41-130 25/07/06 9:47 Page 84
85
Book RFID 41-130 25/07/06 9:47 Page 85
86
Book RFID 41-130 25/07/06 9:47 Page 86
87
Book RFID 41-130 25/07/06 9:47 Page 87
88
Book RFID 41-130 25/07/06 9:47 Page 88
89
Book RFID 41-130 25/07/06 9:47 Page 89
90
Book RFID 41-130 25/07/06 9:47 Page 90
91
Book RFID 41-130 25/07/06 10:00 Page 91
92
Book RFID 41-130 25/07/06 10:00 Page 92
93
Book RFID 41-130 25/07/06 10:01 Page 93
94
Book RFID 41-130 25/07/06 10:01 Page 94
95
Book RFID 41-130 25/07/06 10:01 Page 95
96
Book RFID 41-130 25/07/06 10:01 Page 96
97
Book RFID 41-130 25/07/06 10:01 Page 97
98
Book RFID 41-130 25/07/06 10:01 Page 98
99
Book RFID 41-130 25/07/06 10:01 Page 99
100
Book RFID 41-130 25/07/06 10:01 Page 100
101
Book RFID 41-130 25/07/06 10:13 Page 101
102
Book RFID 41-130 25/07/06 10:13 Page 102
103
Book RFID 41-130 25/07/06 10:14 Page 103
104
Book RFID 41-130 25/07/06 10:14 Page 104
105
Book RFID 41-130 25/07/06 10:14 Page 105
106
Book RFID 41-130 25/07/06 10:14 Page 106
107
Book RFID 41-130 25/07/06 10:14 Page 107
108
Book RFID 41-130 25/07/06 10:14 Page 108
109
Book RFID 41-130 25/07/06 10:14 Page 109
110
Book RFID 41-130 25/07/06 10:14 Page 110
111
Book RFID 41-130 25/07/06 10:27 Page 111
112
Book RFID 41-130 25/07/06 10:27 Page 112
113
Book RFID 41-130 25/07/06 10:27 Page 113
114
Book RFID 41-130 25/07/06 10:27 Page 114
115
Book RFID 41-130 25/07/06 10:27 Page 115
116
Book RFID 41-130 25/07/06 10:28 Page 116
117
Book RFID 41-130 25/07/06 10:28 Page 117
118
Book RFID 41-130 25/07/06 10:28 Page 118
119
Book RFID 41-130 25/07/06 10:28 Page 119
120
Book RFID 41-130 25/07/06 10:28 Page 120
121
Book RFID 41-130 25/07/06 10:40 Page 121
122
Book RFID 41-130 25/07/06 10:40 Page 122
123
Book RFID 41-130 25/07/06 10:40 Page 123
124
Book RFID 41-130 25/07/06 10:40 Page 124
125
Book RFID 41-130 25/07/06 10:40 Page 125
126
Book RFID 41-130 25/07/06 10:40 Page 126
127
Book RFID 41-130 25/07/06 10:40 Page 127
128
Book RFID 41-130 25/07/06 10:41 Page 128
129
Book RFID 41-130 25/07/06 10:41 Page 129
130
Book RFID 41-130 25/07/06 10:41 Page 130
131
Book RFID 131-171 25/07/06 10:52 Page 131
132
Book RFID 131-171 25/07/06 10:52 Page 132
133
Book RFID 131-171 25/07/06 10:52 Page 133
134
Book RFID 131-171 25/07/06 10:52 Page 134
135
Book RFID 131-171 25/07/06 10:52 Page 135
136
Book RFID 131-171 25/07/06 10:52 Page 136
137
Book RFID 131-171 25/07/06 10:53 Page 137
138
Book RFID 131-171 25/07/06 10:53 Page 138
139
Book RFID 131-171 25/07/06 10:53 Page 139
140
Book RFID 131-171 25/07/06 10:53 Page 140
141
Book RFID 131-171 25/07/06 11:04 Page 141
142
Book RFID 131-171 25/07/06 11:04 Page 142
143
Book RFID 131-171 25/07/06 11:04 Page 143
144
Book RFID 131-171 25/07/06 11:04 Page 144
145
Book RFID 131-171 25/07/06 11:05 Page 145
146
Book RFID 131-171 25/07/06 11:05 Page 146
147
Book RFID 131-171 25/07/06 11:05 Page 147
148
Book RFID 131-171 25/07/06 11:05 Page 148
149
Book RFID 131-171 25/07/06 11:05 Page 149
150
Book RFID 131-171 25/07/06 11:05 Page 150
151
Book RFID 131-171 25/07/06 11:16 Page 151
152
Book RFID 131-171 25/07/06 11:16 Page 152
153
Book RFID 131-171 25/07/06 11:16 Page 153
154
Book RFID 131-171 25/07/06 11:16 Page 154
155
Book RFID 131-171 25/07/06 11:16 Page 155
156
Book RFID 131-171 25/07/06 11:16 Page 156
157
Book RFID 131-171 25/07/06 11:16 Page 157
158
Book RFID 131-171 25/07/06 11:16 Page 158
159
Book RFID 131-171 25/07/06 11:17 Page 159
160
Book RFID 131-171 25/07/06 11:17 Page 160
161
Book RFID 131-171 25/07/06 11:31 Page 161
162
Book RFID 131-171 25/07/06 11:31 Page 162
163
Book RFID 131-171 25/07/06 11:31 Page 163
164
Book RFID 131-171 25/07/06 11:31 Page 164
165
Book RFID 131-171 25/07/06 11:31 Page 165
166
Book RFID 131-171 25/07/06 11:31 Page 166
167
Book RFID 131-171 25/07/06 11:31 Page 167
168
Book RFID 131-171 25/07/06 11:31 Page 168
169
Book RFID 131-171 25/07/06 11:31 Page 169
170
Book RFID 131-171 25/07/06 11:31 Page 170
171
Book RFID 131-171 25/07/06 11:31 Page 171
172
Book RFID 172-219 25/07/06 12:32 Page 172
173
Book RFID 172-219 25/07/06 12:32 Page 173
174
Book RFID 172-219 25/07/06 12:32 Page 174
175
Book RFID 172-219 25/07/06 12:32 Page 175
176
Book RFID 172-219 25/07/06 12:32 Page 176
177
Book RFID 172-219 25/07/06 12:32 Page 177
178
Book RFID 172-219 25/07/06 12:32 Page 178
179
Book RFID 172-219 25/07/06 12:32 Page 179
180
Book RFID 172-219 25/07/06 12:32 Page 180
181
Book RFID 172-219 25/07/06 12:33 Page 181
182
Book RFID 172-219 25/07/06 12:33 Page 182
183
Book RFID 172-219 25/07/06 12:53 Page 183
184
Book RFID 172-219 25/07/06 12:53 Page 184
185
Book RFID 172-219 25/07/06 12:53 Page 185
186
Book RFID 172-219 25/07/06 12:53 Page 186
187
Book RFID 172-219 25/07/06 12:53 Page 187
188
Book RFID 172-219 25/07/06 12:53 Page 188
189
Book RFID 172-219 25/07/06 12:53 Page 189
190
Book RFID 172-219 25/07/06 12:53 Page 190
191
Book RFID 172-219 25/07/06 12:54 Page 191
192
Book RFID 172-219 25/07/06 12:54 Page 192
193
Book RFID 172-219 25/07/06 13:11 Page 193
194
Book RFID 172-219 25/07/06 13:11 Page 194
195
Book RFID 172-219 25/07/06 13:12 Page 195
196
Book RFID 172-219 25/07/06 13:12 Page 196
197
Book RFID 172-219 25/07/06 13:12 Page 197
198
Book RFID 172-219 25/07/06 13:12 Page 198
199
Book RFID 172-219 25/07/06 13:12 Page 199
200
Book RFID 172-219 25/07/06 13:12 Page 200
201
Book RFID 172-219 25/07/06 13:12 Page 201
202
Book RFID 172-219 25/07/06 13:12 Page 202
203
Book RFID 172-219 25/07/06 13:33 Page 203
204
Book RFID 172-219 25/07/06 13:33 Page 204
205
Book RFID 172-219 25/07/06 13:33 Page 205
206
Book RFID 172-219 25/07/06 13:33 Page 206
207
Book RFID 172-219 25/07/06 13:33 Page 207
208
Book RFID 172-219 25/07/06 13:33 Page 208
209
Book RFID 172-219 25/07/06 13:33 Page 209
210
Book RFID 172-219 25/07/06 13:34 Page 210
211
Book RFID 172-219 25/07/06 13:34 Page 211
212
Book RFID 172-219 25/07/06 13:34 Page 212
213
Book RFID 172-219 25/07/06 13:45 Page 213
214
Book RFID 172-219 25/07/06 13:45 Page 214
215
Book RFID 172-219 25/07/06 13:45 Page 215
216
Book RFID 172-219 25/07/06 13:45 Page 216
217
Book RFID 172-219 25/07/06 13:46 Page 217
218
Book RFID 172-219 25/07/06 13:46 Page 218
219
Book RFID 172-219 25/07/06 13:46 Page 219
220
Book RFID 220-265 25/07/06 14:00 Page 220
221
Book RFID 220-265 25/07/06 14:00 Page 221
222
Book RFID 220-265 25/07/06 14:00 Page 222
223
Book RFID 220-265 25/07/06 14:00 Page 223
224
Book RFID 220-265 25/07/06 14:01 Page 224
225
Book RFID 220-265 25/07/06 14:01 Page 225
226
Book RFID 220-265 25/07/06 14:01 Page 226
227
Book RFID 220-265 25/07/06 14:01 Page 227
228
Book RFID 220-265 25/07/06 14:01 Page 228
229
Book RFID 220-265 25/07/06 14:01 Page 229
230
Book RFID 220-265 25/07/06 14:15 Page 230
231
Book RFID 220-265 25/07/06 14:15 Page 231
232
Book RFID 220-265 25/07/06 14:15 Page 232
233
Book RFID 220-265 25/07/06 14:15 Page 233
234
Book RFID 220-265 25/07/06 14:15 Page 234
235
Book RFID 220-265 25/07/06 14:15 Page 235
236
Book RFID 220-265 25/07/06 14:15 Page 236
237
Book RFID 220-265 25/07/06 14:15 Page 237
238
Book RFID 220-265 25/07/06 14:15 Page 238
239
Book RFID 220-265 25/07/06 14:15 Page 239
240
Book RFID 220-265 25/07/06 14:37 Page 240
241
Book RFID 220-265 25/07/06 14:37 Page 241
242
Book RFID 220-265 25/07/06 14:37 Page 242
243
Book RFID 220-265 25/07/06 14:37 Page 243
244
Book RFID 220-265 25/07/06 14:37 Page 244
245
Book RFID 220-265 25/07/06 14:37 Page 245
246
Book RFID 220-265 25/07/06 14:37 Page 246
247
Book RFID 220-265 25/07/06 14:38 Page 247
248
Book RFID 220-265 25/07/06 14:38 Page 248
249
Book RFID 220-265 25/07/06 14:38 Page 249
250
Book RFID 220-265 25/07/06 14:52 Page 250
251
Book RFID 220-265 25/07/06 14:52 Page 251
252
Book RFID 220-265 25/07/06 14:52 Page 252
253
Book RFID 220-265 25/07/06 14:52 Page 253
254
Book RFID 220-265 25/07/06 14:52 Page 254
255
Book RFID 220-265 25/07/06 14:52 Page 255
256
Book RFID 220-265 25/07/06 14:52 Page 256
257
Book RFID 220-265 25/07/06 14:53 Page 257
258
Book RFID 220-265 25/07/06 14:53 Page 258
259
Book RFID 220-265 25/07/06 14:53 Page 259
260
Book RFID 220-265 25/07/06 15:09 Page 260
261
Book RFID 220-265 25/07/06 15:09 Page 261
262
Book RFID 220-265 25/07/06 15:09 Page 262
263
Book RFID 220-265 25/07/06 15:09 Page 263
264
Book RFID 220-265 25/07/06 15:09 Page 264
265
Book RFID 220-265 25/07/06 15:09 Page 265
266
Book RFID 266-308 26/07/06 8:18 Page 266
267
Book RFID 266-308 26/07/06 8:18 Page 267
268
Book RFID 266-308 26/07/06 8:18 Page 268
269
Book RFID 266-308 26/07/06 8:19 Page 269
270
Book RFID 266-308 26/07/06 8:19 Page 270
271
Book RFID 266-308 26/07/06 8:19 Page 271
272
Book RFID 266-308 26/07/06 8:19 Page 272
273
Book RFID 266-308 26/07/06 8:19 Page 273
274
Book RFID 266-308 26/07/06 8:19 Page 274
275
Book RFID 266-308 26/07/06 8:19 Page 275
276
Book RFID 266-308 26/07/06 8:49 Page 276
277
Book RFID 266-308 26/07/06 8:50 Page 277
278
Book RFID 266-308 26/07/06 8:50 Page 278
279
Book RFID 266-308 26/07/06 8:50 Page 279
280
Book RFID 266-308 26/07/06 8:50 Page 280
281
Book RFID 266-308 26/07/06 8:50 Page 281
282
Book RFID 266-308 26/07/06 8:50 Page 282
283
Book RFID 266-308 26/07/06 8:50 Page 283
284
Book RFID 266-308 26/07/06 8:50 Page 284
285
Book RFID 266-308 26/07/06 8:50 Page 285
286
Book RFID 266-308 26/07/06 9:05 Page 286
287
Book RFID 266-308 26/07/06 9:05 Page 287
288
Book RFID 266-308 26/07/06 9:05 Page 288
289
Book RFID 266-308 26/07/06 9:05 Page 289
290
Book RFID 266-308 26/07/06 9:05 Page 290
291
Book RFID 266-308 26/07/06 9:05 Page 291
292
Book RFID 266-308 26/07/06 9:05 Page 292
293
Book RFID 266-308 26/07/06 9:05 Page 293
294
Book RFID 266-308 26/07/06 9:05 Page 294
295
Book RFID 266-308 26/07/06 9:05 Page 295
296
Book RFID 266-308 26/07/06 9:22 Page 296
297
Book RFID 266-308 26/07/06 9:22 Page 297
298
Book RFID 266-308 26/07/06 9:22 Page 298
299
Book RFID 266-308 26/07/06 9:22 Page 299
300
Book RFID 266-308 26/07/06 9:22 Page 300
301
Book RFID 266-308 26/07/06 9:22 Page 301
302
Book RFID 266-308 26/07/06 9:22 Page 302
303
Book RFID 266-308 26/07/06 9:23 Page 303
304
Book RFID 266-308 26/07/06 9:23 Page 304
305
Book RFID 266-308 26/07/06 9:23 Page 305
306
Book RFID 266-308 26/07/06 9:23 Page 306
307
Book RFID 266-308 26/07/06 9:23 Page 307
308
Book RFID 266-308 26/07/06 9:23 Page 308
309
Book RFID 309-348 26/07/06 9:50 Page 309
310
Book RFID 309-348 26/07/06 9:50 Page 310
311
Book RFID 309-348 26/07/06 9:50 Page 311
312
Book RFID 309-348 26/07/06 9:50 Page 312
313
Book RFID 309-348 26/07/06 9:50 Page 313
314
Book RFID 309-348 26/07/06 9:51 Page 314
315
Book RFID 309-348 26/07/06 9:51 Page 315
316
Book RFID 309-348 26/07/06 9:51 Page 316
317
Book RFID 309-348 26/07/06 9:51 Page 317
318
Book RFID 309-348 26/07/06 9:51 Page 318
319
Book RFID 309-348 26/07/06 10:11 Page 319
320
Book RFID 309-348 26/07/06 10:12 Page 320
321
Book RFID 309-348 26/07/06 10:12 Page 321
322
Book RFID 309-348 26/07/06 10:12 Page 322
323
Book RFID 309-348 26/07/06 10:12 Page 323
324
Book RFID 309-348 26/07/06 10:12 Page 324
325
Book RFID 309-348 26/07/06 10:12 Page 325
326
Book RFID 309-348 26/07/06 10:12 Page 326
327
Book RFID 309-348 26/07/06 10:12 Page 327
328
Book RFID 309-348 26/07/06 10:12 Page 328
329
Book RFID 309-348 26/07/06 10:33 Page 329
330
Book RFID 309-348 26/07/06 10:34 Page 330
331
Book RFID 309-348 26/07/06 10:34 Page 331
332
Book RFID 309-348 26/07/06 10:34 Page 332
333
Book RFID 309-348 26/07/06 10:34 Page 333
334
Book RFID 309-348 26/07/06 10:34 Page 334
335
Book RFID 309-348 26/07/06 10:34 Page 335
336
Book RFID 309-348 26/07/06 10:34 Page 336
337
Book RFID 309-348 26/07/06 10:34 Page 337
338
Book RFID 309-348 26/07/06 10:34 Page 338
339
Book RFID 309-348 26/07/06 10:47 Page 339
340
Book RFID 309-348 26/07/06 10:47 Page 340
341
Book RFID 309-348 26/07/06 10:47 Page 341
342
Book RFID 309-348 26/07/06 10:47 Page 342
343
Book RFID 309-348 26/07/06 10:47 Page 343
344
Book RFID 309-348 26/07/06 10:47 Page 344
345
Book RFID 309-348 26/07/06 10:47 Page 345
346
Book RFID 309-348 26/07/06 10:48 Page 346
347
Book RFID 309-348 26/07/06 10:48 Page 347
348
Book RFID 309-348 26/07/06 10:48 Page 348
349
Book RFID 349-383 26/07/06 11:03 Page 349
350
Book RFID 349-383 26/07/06 11:03 Page 350
351
Book RFID 349-383 26/07/06 11:03 Page 351
352
Book RFID 349-383 26/07/06 11:03 Page 352
353
Book RFID 349-383 26/07/06 11:03 Page 353
354
Book RFID 349-383 26/07/06 11:04 Page 354
355
Book RFID 349-383 26/07/06 11:04 Page 355
356
Book RFID 349-383 26/07/06 11:04 Page 356
357
Book RFID 349-383 26/07/06 11:04 Page 357
358
Book RFID 349-383 26/07/06 11:04 Page 358
359
Book RFID 349-383 26/07/06 11:04 Page 359
360
Book RFID 349-383 26/07/06 11:04 Page 360
361
Book RFID 349-383 26/07/06 11:04 Page 361
362
Book RFID 349-383 26/07/06 11:04 Page 362
363
Book RFID 349-383 26/07/06 11:04 Page 363
364
Book RFID 349-383 26/07/06 11:33 Page 364
365
Book RFID 349-383 26/07/06 11:33 Page 365
366
Book RFID 349-383 26/07/06 11:33 Page 366
367
Book RFID 349-383 26/07/06 11:33 Page 367
368
Book RFID 349-383 26/07/06 11:33 Page 368
369
Book RFID 349-383 26/07/06 11:33 Page 369
370
Book RFID 349-383 26/07/06 11:33 Page 370
371
Book RFID 349-383 26/07/06 11:33 Page 371
372
Book RFID 349-383 26/07/06 11:33 Page 372
373
Book RFID 349-383 26/07/06 11:34 Page 373
374
Book RFID 349-383 26/07/06 11:47 Page 374
375
Book RFID 349-383 26/07/06 11:47 Page 375
376
Book RFID 349-383 26/07/06 11:47 Page 376
377
Book RFID 349-383 26/07/06 11:47 Page 377
378
Book RFID 349-383 26/07/06 11:47 Page 378
379
Book RFID 349-383 26/07/06 11:48 Page 379
380
Book RFID 349-383 26/07/06 11:48 Page 380
381
Book RFID 349-383 26/07/06 11:48 Page 381
382
Book RFID 349-383 26/07/06 11:48 Page 382
383
Book RFID 349-383 26/07/06 11:48 Page 383

Vous aimerez peut-être aussi