作者: Serge Vaudenay , Khaled Ouafi
DOI:
关键词: Computer security 、 Denial-of-service attack 、 Supply chain 、 Tracing 、 Path (graph theory) 、 Computer science 、 Cloning (programming) 、 Order (business)
摘要: In this paper, we present an application of RFIDs for supply-chain management. our application, consider two types readers. On one part, have readers that will mark tags at given points. After that, these can be checked by another type to tell whether a tag has followed the correct path in chain. We formalize notion and define adequate adversaries. Morever, derive requirements order meet security against counterfeiting, cloning, impersonation denial service attacks.