769 research outputs found
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
The simplicity of deployment and perpetual operation of energy harvesting
devices provides a compelling proposition for a new class of edge devices for
the Internet of Things. In particular, Computational Radio Frequency
Identification (CRFID) devices are an emerging class of battery-free,
computational, sensing enhanced devices that harvest all of their energy for
operation. Despite wireless connectivity and powering, secure wireless firmware
updates remains an open challenge for CRFID devices due to: intermittent
powering, limited computational capabilities, and the absence of a supervisory
operating system. We present, for the first time, a secure wireless code
dissemination (SecuCode) mechanism for CRFIDs by entangling a device intrinsic
hardware security primitive Static Random Access Memory Physical Unclonable
Function (SRAM PUF) to a firmware update protocol. The design of SecuCode: i)
overcomes the resource-constrained and intermittently powered nature of the
CRFID devices; ii) is fully compatible with existing communication protocols
employed by CRFID devices in particular, ISO-18000-6C protocol; and ii) is
built upon a standard and industry compliant firmware compilation and update
method realized by extending a recent framework for firmware updates provided
by Texas Instruments. We build an end-to-end SecuCode implementation and
conduct extensive experiments to demonstrate standards compliance, evaluate
performance and security.Comment: Accepted to the IEEE Transactions on Dependable and Secure Computin
Using Radio Frequency Identification Technology In Healthcare
In the healthcare industry, medical treatment can be a matter of life and death, so that any mistakes may cause irreversible consequences. As hospitals have sought to reduce these types of errors, Radio Frequency Identification Technology (RFID) has become a solution in the healthcare industry to address these problems. Since 2005, RFID has generated a lot of interest in healthcare to make simpler the identification process for tracking and managing medical resources to improve their use and to reduce the need for future costs for purchasing duplicate equipment. There are rising concerns linked to the privacy and security issues, when RFID tags are used for tracking items carried by people. A tag by its design will respond to a reader\u27s query without the owner\u27s consent and without the owner even noticing it. When RFID tags contain patients\u27 personal data and medical history, they have to be protected to avoid any leaking of privacy-sensitive information. To address these concerns, we propose an Intelligent RFID System which is a RFID card system that embeds smart tags in insurance cards, medical charts, and medical bracelets to store medical information. Patient data is sent to the insurance providers by way of a clearinghouse that translates the information from the healthcare facility into a format that the insurance company can process. To ensure data protection, an additional security layer was added to secure the communication between the tags and the readers. This security layer will allow only authorized readers to poll tags for the patient\u27s medical tags and prevent unauthorized access to tag data. It will simplify the maintenance and transfer of patient data in a secure, feasible and cost effective way
Secure RFID for Humanitarian Logistics
Extreme events like hurricanes, flooding, earthquakes cause massive disruption to society,
including large death tolls and property damage. In recent years, many events like the Katrina
disaster have shown the importance of efficient disaster management to alleviate the resulting
pain and suffering and to mitigate the consequences of the disaster. Disaster management
includes a large set of activities including the care of the survivors needs, protection of assets
from any further damage and provision of shelter, water, food, and medicines to dislocated
people. The creation of effective disaster supply chain to deliver necessary goods to disaster
relief organizations is an essential.
In this context, this chapter will present the application and benefits of secure RFID to prevent
tampering or replacement of the shipment through RFID security threats.JRC.DG.G.6-Security technology assessmen
Algorithms and cryptographic protocols using elliptic curves
En els darrers anys, la criptografia amb corbes el.lĂptiques ha
adquirit una importĂ ncia creixent, fins a arribar a formar part en
la actualitat de diferents estĂ ndards industrials. Tot i que s'han
dissenyat variants amb corbes el.lĂptiques de criptosistemes
clĂ ssics, com el RSA, el seu mĂ xim interĂšs rau en la seva
aplicaciĂł en criptosistemes basats en el Problema del Logaritme
Discret, com els de tipus ElGamal. En aquest cas, els
criptosistemes el.lĂptics garanteixen la mateixa seguretat que els
construĂŻts sobre el grup multiplicatiu d'un cos finit primer, perĂČ
amb longituds de clau molt menor.
Mostrarem, doncs, les bones propietats d'aquests criptosistemes,
aixĂ com els requeriments bĂ sics per a que una corba
sigui criptogrĂ ficament Ăștil, estretament relacionat amb la seva
cardinalitat. Revisarem alguns mĂštodes que permetin descartar
corbes no criptogrĂ ficament Ăștils, aixĂ com altres que permetin
obtenir corbes bones a partir d'una de donada. Finalment,
descriurem algunes aplicacions, com sĂłn el seu Ășs en Targes
Intel.ligents i sistemes RFID, per concloure amb alguns avenços
recents en aquest camp.The relevance of elliptic curve cryptography has grown in recent
years, and today represents a cornerstone in many industrial
standards. Although elliptic curve variants of classical
cryptosystems such as RSA exist, the full potential of elliptic
curve cryptography is displayed in cryptosystems based on the
Discrete Logarithm Problem, such as ElGamal. For these, elliptic
curve cryptosystems guarantee the same security levels as their
finite field analogues, with the additional advantage of using
significantly smaller key sizes.
In this report we show the positive properties of elliptic curve
cryptosystems, and the requirements a curve must meet to be
useful in this context, closely related to the number of points.
We survey methods to discard cryptographically uninteresting
curves as well as methods to obtain other useful curves from
a given one. We then describe some real world applications
such as Smart Cards and RFID systems and conclude with a
snapshot of recent developments in the field
A wireless method for monitoring medication compliance
There are many devices on the market to help remind patients to take their pills, but most require observation by a caregiver to assure medication compliance. This project demonstrates three modes to detect pill removal from a pillbox: a switch under the pills, a reflective type photointerrupter and a transmissive electric eye photosensor. Each mode exhibited blind spots or other failures to detect pill presence, but by combining modes with complementary characteristics, the accuracy of pill detection is greatly increased.
Two methods of caregiver notification are demonstrated: text messages transmitted via an attached cellular phone, or the status is collected by a PC which provides an audit trail and daily notification if no pills were taken
- âŠ