RFID and Information Security in Supply Chains

作者: Gaurav Kapoor , Wei Zhou , Selwyn Piramuthu

DOI: 10.1109/MSN.2008.11

关键词:

摘要: Information visibility is of paramount importance for effective and efficient operation supply chains. Although not the sole enabling technological source information in chains, RFID tags naturally allow its seamless operationalization. are notorious on issues related to security/privacy concerns, these concerns magnified a chain context where ownership any given tag passed among disparate organizations throughout lifetime. We consider this scenario from cryptographic perspective. literature area, identify vulnerabilities an existing authentication protocol, suggest modifications that address vulnerabilities.

参考文章(5)
Jason K Phillips, Anthony D Miyazaki, Diane M Phillips, TWENTY YEARS OF JBL: AN ANALYSIS OF PUBLISHED RESEARCH Journal of Business Logistics. ,vol. 20, pp. 1- ,(1999)
Andres Angulo, Heather Nachtmann, Matthew A. Waller, SUPPLY CHAIN INFORMATION SHARING IN A VENDOR MANAGED INVENTORY PARTNERSHIP Journal of Business Logistics. ,vol. 25, pp. 101- 120 ,(2004) , 10.1002/J.2158-1592.2004.TB00171.X
Yingjiu Li, Xuhua Ding, Protecting RFID communications in supply chains Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 234- 241 ,(2007) , 10.1145/1229285.1229318
S. Piramuthu, Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems systems man and cybernetics. ,vol. 38, pp. 360- 376 ,(2008) , 10.1109/TSMCC.2007.913918
A. Juels, "Yoking-proofs" for RFID tags IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second. pp. 138- 143 ,(2004) , 10.1109/PERCOMW.2004.1276920