21 research outputs found

    A Proposed Cross Platform Privacy and Security Framework for Supply Chain Information Sharing

    Get PDF
    Information sharing has become eminent to supply chain management, as it allows supply chain partners to collaborate more closely. However, currently supply chain partners are often on disjoint information platforms, which prevent them from effectively sharing critical supply chain information. One of the main barriers of information sharing is revealing confidential information to unintended parties and thus the disclosure of privacy. Therefore the information sharing needs and characteristics of a supply chain has been analyzed and subsequently a cross platform privacy and security framework to allow safe information sharing has been proposed

    Security of RFID Protocols - A Case Study

    Get PDF
    AbstractIn the context of Dolev-Yao style analysis of security protocols, we investigate the security claims of a recently proposed RFID authentication protocol. We exhibit a flaw which has gone unnoticed in RFID protocol literature and present the resulting attacks on authentication, untraceability, and desynchronization resistance. We analyze and discuss the authors' proofs of security. References to other vulnerable protocols are given

    Auto-ID enabled tracking and tracing data sharing over dynamic B2B and B2G relationships

    Get PDF
    RFID 2011 collocated with the 2011 IEEE MTT-S International Microwave Workshop Series on Millimeter Wave Integration Technologies (IMWS 2011)Growing complexity and uncertainty are still the key challenges enterprises are facing in managing and re-engineering their existing supply chains. To tackle these challenges, they are continuing innovating management practices and piloting emerging technologies for achieving supply chain visibility, agility, adaptability and security. Nowadays, subcontracting has already become a common practice in modern logistics industry through partnership establishment between the involved stakeholders for delivering consignments from a consignor to a consignee. Companies involved in international supply chain are piloting various supply chain security and integrity initiatives promoted by customs to establish trusted business-to-customs partnership for facilitating global trade and cutting out avoidable supply chain costs and delays due to governmental regulations compliance and unnecessary customs inspection. While existing Auto-ID enabled tracking and tracing solutions are promising for implementing these practices, they provide few efficient privacy protection mechanisms for stakeholders involved in the international supply chain to communicate logistics data over dynamic business-to-business and business-government relationships. A unified privacy protection mechanism is proposed in this work to fill in this gap. © 2011 IEEE.published_or_final_versio

    Secure RFID for Humanitarian Logistics

    Get PDF
    Extreme events like hurricanes, flooding, earthquakes cause massive disruption to society, including large death tolls and property damage. In recent years, many events like the Katrina disaster have shown the importance of efficient disaster management to alleviate the resulting pain and suffering and to mitigate the consequences of the disaster. Disaster management includes a large set of activities including the care of the survivors needs, protection of assets from any further damage and provision of shelter, water, food, and medicines to dislocated people. The creation of effective disaster supply chain to deliver necessary goods to disaster relief organizations is an essential. In this context, this chapter will present the application and benefits of secure RFID to prevent tampering or replacement of the shipment through RFID security threats.JRC.DG.G.6-Security technology assessmen

    INTEND AND ACCOMPLISHMENT OF PROTECTED INFRASTRUCTURE IN DISSEMINATED RFID SYSTEMS

    Get PDF
    Privacy protection is the primary concern when RFID applications are deployed in our daily lives. Due to passive tags that are computationally weak, the non-encryption-based simulation protocols have been recently developed, in which wireless jamming is used. However, the existing private tag access protocols without sharing secrets depends on impractical assumptions hence difficult to deploy. To tackle this issue we redesign RFID architecture by dividing RFID reader into an RF activator and Trusted Shield Device (TSD). Then we proposed new coding scheme namely Random Flipping Random Jamming (RFRJ), to protect the tags contents. Analysis and simulation results validate our distributed architecture with the RFRJ coding scheme, which protects tag’s privacy against various adversaries like encoding collision, random guessing attack, correlation attack, eavesdropping, and ghost and leech attack

    Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems

    Get PDF
    Singapore A*Star SER

    Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

    Get PDF
    Part 12: Authentication and DelegationInternational audienceIn this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our solution is secure, privacy-preserving, and practical. It leverages on the standard EPCglobal network to share information about paths and parties in path authentication. Our solution can be implemented on standard EPC class 1 generation 2 tags with only 720 bits storage and no computational capability
    corecore