1,095 research outputs found

    RFID Demystified: Part 3. Company Case Studies.

    Get PDF
    In the previous two parts of RFID Demystified we have discussed the technology, possible benefits and areas of application for with Radio Frequency Identification (RFID) systems. In this final part we review Company Case-Studies of those who have decided to apply the technology within their organisation. It will be seen that considerable benefits are being experienced within some organisations, pilot applications are increasing our learning and providing a foundation for the future success of projects in this area

    Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges

    Get PDF
    Radio frequency identification (RFID) is a modern approach to identify and track several assets at once in a supply chain environment. In many RFID applications, tagged items are frequently transferred from one owner to another. Thus, there is a need for secure ownership transfer (OT) protocols that can perform the transfer while, at the same time, protect the privacy of owners. Several protocols have been proposed in an attempt to fulfill this requirement. In this paper, we provide a comprehensive and systematic review of the RFID OT protocols that appeared over the years of 2005-2018. In addition, we compare these protocols based on the security goals which involve their support of OT properties and their resistance to attacks. From the presented comparison, we draw attention to the open issues in this field and provide suggestions for the direction that future research should follow. Furthermore, we suggest a set of guidelines to be considered in the design of new protocols. To the best of our knowledge, this is the first comprehensive survey that reviews the available OT protocols from the early start up to the current state of the art

    Efficient RFID authentication scheme for supply chain applications

    Get PDF
    Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and manage shipments. By tagging shipments with RFID tags, which can be remotely accessed by RFID readers, shipments can be identified and tracked in a supply chain. Security issues in RFID have been major concerns, since passive RFID tags have very weak computational power to support authentication. Sound authentication between tag and reader remains a challenging problem. In this paper, we provide a novel authentication scheme to protect tags from being tracked and identified by unauthorized readers and protect authorized readers against bogus tags. Our scheme can be applied to supply chain security. It also exhibits an additional feature that a supply chain can be dynamically updated

    Application of Blockchain and Internet of Things to Ensure Tamper-Proof Data Availability for Food Safety

    Get PDF
    Food supply chain plays a vital role in human health and food prices. Food supply chain inefficiencies in terms of unfair competition and lack of regulations directly affect the quality of human life and increase food safety risks. This work merges Hyperledger Fabric, an enterprise-ready blockchain platform with existing conventional infrastructure, to trace a food package from farm to fork using an identity unique for each food package while keeping it uncomplicated. It keeps the records of business transactions that are secured and accessible to stakeholders according to the agreed set of policies and rules without involving any centralized authority. This paper focuses on exploring and building an uncomplicated, low-cost solution to quickly link the existing food industry at different geographical locations in a chain to track and trace the food in the market.Comment: Journal of Food Quality, 202

    The Role of RFID Technology in Supply Chain Risk Management

    Get PDF

    Blockchain-Supported Food Supply Chain Reference Architecture

    Get PDF
    Department of Management EngineeringA food security issue increased rapidly due to numerous food frauds and tragic incidents and overall growth in the scale of food supply chain network in the last years. Since the recent evolution of Blockchain technology, it promises high potential ability to guarantee and trace the originality of products in supply chain network The main purpose of this research work is to build general Blockchain-supported food supply chain reference architecture model along with supplementary guidelines which could be applied in real-life supply chain cases with or without customization or inspire their design of supply chain system. A case driven bottom-up approach is used to create the reference architecture with the help of BOAT framework as a base tool to align the case details. A total of three food supply chain cases were utilized for the development of reference architecture and third case study of Mongolian meat trade supply chain was examined with the proposed solution and finally evaluated by the local experts. I believe this reference framework will help fellow researchers and industry practitioners to use this as a base knowledge without beginning from the scratches because current literature lacks extremely in this field. In overall, I expect this work will contribute to the current literature in the followings: 1. To expand the implementation mechanism of Blockchain solutions in general supply chain cases especially in food supply chain. 2. To provide practical exemplary implementation of real life case scenarios 3. To provide detailed analysis of benefits and weaknesses of using Blockchain in food supply chainope

    The Study on Secure RFID Authentication and Access Control

    Get PDF

    Attacks on RFID Protocols

    Get PDF
    This document consists of a collection of attacks upon RFID protocols and is meant to serve as a quick and easy reference. This document will be updated as new attacks are found. Currently the only attacks on protocols shown are the authors\u27 original attacks with references to similar attacks on other protocols. The main security properties considered are authentication, untraceability, and - for stateful protocols - desynchronization resistance

    Information technology tools and supply chain performance of online retailers in Calabar Metropolis, Cross River State, Nigeria

    Get PDF
    The work examined the impact of information technology (IT) tools on supply chain performance of online retailers in Calabar Metropolis, Cross River State. The study adopted the cross-sectional survey research design and the purposive sampling procedure. Data were analyzed using the multiple regression analysis. The study revealed that information technology (IT) tools have positive influence on supply chain performance of online retailers in Calabar Metropolis. It has been observed that the use of information technology improves supply chain performance as it assists the online retailers in building accumulative knowledge about various supply chain partners (customers, suppliers, distributors, and main channels). The study concluded that supply chain management begins and ends with the customers. And, the sole aim of the integration and collaborations of the supply chain is to effectively and efficiently satisfy customers’ demands and needs, as well as add value to the supply chain activities which would enhance their performance. The study therefore, recommended that online retailers should build an effective supply chain, integrated with information technologies enabled logistic system that can improve supply chain performance and response quickly to unexpected needs of the consumers.Keywords: Information technology, IT tools, supply chain management and supply chain performanc
    corecore