Browse > Article
http://dx.doi.org/10.5573/IEIESPC.2014.3.2.74

Design of Tourism Application Based on RFID Technology  

Lee, JiHyun (School of Electrical and Computer Engineering, Korea University)
Lee, JoonGoo (School of Electrical and Computer Engineering, Korea University)
Kim, SeonWook (School of Electrical and Computer Engineering, Korea University)
Publication Information
IEIE Transactions on Smart Processing and Computing / v.3, no.2, 2014 , pp. 74-82 More about this Journal
Abstract
Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.
Keywords
RFID; Tourism; Automatic Identification; Mobile; NFC;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. J. Soon, "QR Code," Synthesis Journal, pp. 59-78, 2008.
2 X. Zhu, S. K. Mukhopadhyay, and H. Kurata, "A Review of RFID Technology and Its Managerial Applications in Different Industries," Journal of Engineering and Technology Management, vol. 29, no. 1, pp. 152-167, 2012.   DOI
3 T.-W. Kan, C.-H. Teng, and M. Y. Chen, "QR Code Based Augmented Reality Applications," in Handbook of Augmented Reality. Springer, pp. 339-354, 2011.
4 T. Sun and D. Zhou, "Automatic Identification Technology-Application of Two-dimensional Code," in Automation and Logistics (ICAL), 2011 IEEE International Conference on. IEEE, pp. 164-168, 2011.
5 R. Want, "An Introduction to RFID Technology," Pervasive Computing, IEEE, vol. 5, no. 1, pp. 25-33, 2006.   DOI   ScienceOn
6 C. M. Roberts, "Radio Frequency Identification (RFID)," Computers& Security, vol. 25, no. 1, pp. 18-26, 2006.   DOI   ScienceOn
7 B. Nath, F. Reynolds, and R. Want, "RFID Technology and Applications," IEEE Pervasive Computing, vol. 5, no. 1, pp. 22-24, 2006.   DOI   ScienceOn
8 J. Ondrus and Y. Pigneur, "An Assessment of NFC for Future Mobile Payment Systems," in Management of Mobile Business, 2007. ICMB 2007. International Conference on the. IEEE, pp. 43-43, 2007.
9 K. Hozak, "Managerial Guidance for Applying RFID in The Tourism Industry," Interdisciplinary Journal of Contemporary Research in Business, vol. 4, no. 2, pp. 18-30, 2012.
10 M. Fisher, "Conducting an Online Payment Transaction Using an NFC Enabled Mobile Communication Device,"US Patent 8,352,323, Jan. 8 2013.
11 G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, "NFC Devices: Security and Privacy," in Availability, Reliability and Security, 2008. ARES 08. Third International Conference on. IEEE, pp. 642-647, 2008.
12 J. Haartsen, "Bluetooth-The Universal Radio Interface for Ad Hoc, Wireless Connectivity," Ericsson review, vol. 3, no. 1, pp. 110-117, 1998.
13 F. Borrego-Jaraba, I. Luque Ruiz, and M. A. G'omez-Nieto, "A NFC-based Pervasive Solution for City Touristic Surfing," Personal Ubiquitous Comput., vol. 15, no. 7, pp. 731-742, Oct. 2011.   DOI
14 J. J. Gummeson, B. Priyantha, D. Ganesan, D. Thrasher, and P. Zhang, "Engarde: Protecting the Mobile Phone from Malicious NFC Interactions," in Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '13. New York, NY, USA: ACM, pp. 445-458, 2013.
15 J. Pesonen and E. Horster, "Near Field Communication Technology in Tourism," Tourism Management Perspectives, vol. 4, pp. 11-18, 2012.   DOI
16 B. Ozdenizci, K. Ok, V. Coskun, and M. Aydin, "Development of an Indoor Navigation System Using NFC Technology," in Information and Computing (ICIC), 2011 Fourth International Conference on, pp. 11-14, 2011.
17 B. Benyo, A. Vilmos, K. Kovacs, and L. Kutor, "NFC Applications and Business Model ofThe Ecosystem," in Mobile and Wireless Communications Summit, 2007. 16th IST. IEEE, pp. 1-5, 2007.
18 R. Barthel, K. Leder Mackley, A. Hudson-Smith, A. Karpovich, M. Jode, and C. Speed, "An Internet of Old Things as an Augmented Memory System," Personal Ubiquitous Comput., vol. 17, no. 2, pp. 321-333, Feb. 2013.   DOI
19 A. Neumann, J. Barnickel, and U. Meyer, "Security and Privacy Implications of URL Shortening Services," in Proceedings of the Workshop on Web, vol. 2, 2011.
20 F. Klien and M. Strohmaier, "Short Links Under Attack: Geographical Analysis of Spam in a URL Shortener Network," in Proceedings of the 23rd ACM conference on Hypertext and social media. ACM, pp. 83-88, 2012.
21 D. Guinard, C. Floerkemeier, and S. Sarma, "Cloud Computing, REST and Mashups to Simplify RFID Application Development and Deployment," in Proceedings of the Second International Workshop on Web of Things. ACM, p. 9, 2011.