RFID as Electronic Surveillance: Technology Performs Well in Feasibility Study

Sep 10, 2008

Despite modern surveillance technology, retail outlets continue to be plagued by theft. Shoplifters have discovered various methods to deceive or elude electronic-surveillance systems.

Radio-frequency identification of products is one possible tool to combat theft, and the technology performed well in a new feasibility study on its use as a potential sales-floor theft-deterrent system. The study, conducted by researchers in the RFID Research Center at the University of Arkansas, demonstrated RFID’s usefulness in several shoplifting scenarios, including many items moving through a security/reader portal at a high rate of speed and many items stuffed into a “booster bag,” a traditional shopping bag lined with aluminum foil.

Bill Hardgrave, director of the research center and professor of information systems in the Sam M. Walton College of Business, announced the findings Sept. 10 at a two-day forum on item-level RFID hosted by the research center, the Voluntary Interindustry Commerce Solutions Association and the Council of Supply Chain Management Professionals.

“The most interesting data came from scenarios involving the booster bag and testers running through portals with many items,” Hardgrave said. “These scenarios included many multiple RFID tags, and we were able to obtain a great deal of information at the entry/exit portal.”

Researchers tested two types of ultra-high frequency, generation 2 RFID tags in various baseline and shoplifting scenarios. The tests involved comparisons to two conventional systems, acousto-magnetic and low-level radio-frequency electronic article surveillance, currently used in many retail stores.

In the baseline tests, the researchers experimented with various tag locations and orientations as the tags moved through portal readers. In each test, the RFID system performed as well as or better than the conventional systems. The specific strength of RFID, as demonstrated in the baseline tests, was its ability to capture individual tags at various locations and orientations. Perhaps more importantly, the RFID technology recorded the total number of individual tags, while the other technologies simply noted the presence of any tag in the read field.

“Because RFID can uniquely identify individual tags, it can provide information on the number of stolen items within a bag or the number of items held by a shoplifter,” Hardgrave said. “Conventional systems cannot uniquely identify individual tags, which means they can report only one item in a bag that may have 20 or 50 stolen items.”

-- Fifty tagged items in a booster bag lined with aluminum foil. (The presence of metal tends to reflect ultra-high frequency signals and therefore reduces read rates.)
-- A tagged shoe worn by a shoplifter/tester exiting the store.
-- A tagged shirt, worn under a coat.
-- Tagged socks carried through the portal under a hat worn by a 6-foot-tall tester.
-- A standard shopping bag of 10 tagged items – an assortment of underwear, socks and shirts – moving through the portal at running speed.
-- Tagged socks held in a tester’s hand and tucked under the opposite arm.
-- A tagged item in the center of a full shopping bag of untagged items.

In the first scenario, both RFID and the conventional surveillance technologies achieved 100 percent success at detecting at least one stolen item. The researchers were encouraged that the RFID system captured 77.2 percent of all tags, despite the aluminum foil. Again, because the conventional systems do not uniquely identify each item, it was impossible to determine how many were read. The conventional technologies and RFID also scored 100-percent detection success in scenarios four (item placed under a hat), five (ten tagged items held by a tester running through the portal) and seven (one tagged item in a bag of untagged items).

In the second shoplifting scenario – a tagged shoe worn by a tester walking through the portal – the RFID system was 95-percent successful. Hardgrave said this result demonstrated a weakness with the RFID system in that it did not read all tags at the foot level. Scenario three, a tag placed on the collar of a shirt worn under an untagged jacket, also exhibited a weakness. Hardgrave attributed this finding to the tag’s proximity to the tester’s body, which likely absorbed radio-frequency energy and thus compromised the system’s ability to read tags. Likewise, in the sixth scenario – tagged socks held in a tester’s hand and tucked under the opposite arm – the RFID system did not perform as well as the conventional surveillance technologies. Again, the human body acting as a shield had a stronger effect on readability of RFID tags.

“Body proximity had an adverse effect on read rates,” Hardgrave said. “That is something we will investigate further. In general, though, RFID fared well. Clothing and cloth material did not significantly interfere, and moving the tags though the portal at different heights did not significantly affect success, either. To see that speed of movement did not cause decreased performance was very encouraging. Overall, RFID performed adequately enough to warrant further investigation.”

Provided by University of Arkansas

Explore further: Using video games to model real life outbreaks

Related Stories

Justices won't hear Google appeal in dispute with Oracle

26 minutes ago

The Supreme Court is staying out of a long-running legal battle between technology giants Oracle and Google over copyright protection for a computer program that powers most of the world's smartphones and computer tablets.

'Cause unknown' in SpaceX rocket blast

39 minutes ago

SpaceX came up empty Monday in its search to figure out why an unmanned Falcon 9 rocket exploded minutes after blasting off from a NASA launchpad with a load of space-bound cargo.

Recommended for you

Using video games to model real life outbreaks

13 hours ago

Those of you who know me know that I'm a video game nerd. And comic book nerd. And just nerdy nerd in general. So when I read an article that used World of Warcraft to model disease outbreaks, I jumped on ...

Railroad official asks digital map makers to mark crossings

Jun 29, 2015

The federal agency that oversees railroads has asked digital mapping companies to alert drivers as they approach track crossings in the hope that visual and audio cues will lead to greater awareness of potential dangers.

Learning early about late flights

Jun 25, 2015

A new study published in the Articles in Advance section of Transportation Science, a journal of the Institute for Operations Research and the Management Sciences (INFORMS), improves how air traffic managers cope with unexpe ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

menkaur
not rated yet Sep 11, 2008
as i know, rfids a vulnerabile to hacker atacks... you won't detect them if they are deactivated...

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.