Pathchecker: An RFID application for tracing products in Supply-chains

作者: Serge Vaudenay , Khaled Ouafi

DOI:

关键词: Computer securityDenial-of-service attackSupply chainTracingPath (graph theory)Computer scienceCloning (programming)Order (business)

摘要: In this paper, we present an application of RFIDs for supply-chain management. our application, consider two types readers. On one part, have readers that will mark tags at given points. After that, these can be checked by another type to tell whether a tag has followed the correct path in chain. We formalize notion and define adequate adversaries. Morever, derive requirements order meet security against counterfeiting, cloning, impersonation denial service attacks.

参考文章(5)
Ari Juels, Ravikanth Pappu, Bryan Parno, None, Unidirectional key distribution across time and space with applications to RFID security usenix security symposium. pp. 75- 90 ,(2008)
Martin Feldhofer, Christian Rechberger, A case against currently used hash functions in RFID protocols international conference on move to meaningful internet systems. pp. 372- 381 ,(2006) , 10.1007/11915034_61
Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matt J. B. Robshaw, Yannick Seurin, Hash Functions and RFID Tags: Mind the Gap cryptographic hardware and embedded systems. ,vol. 5154, pp. 283- 299 ,(2008) , 10.1007/978-3-540-85053-3_18
Serge Vaudenay, On privacy models for RFID international conference on the theory and application of cryptology and information security. pp. 68- 87 ,(2007) , 10.1007/978-3-540-76900-2_5