4,358 research outputs found

    Security and privacy protection in RFID-enabled supply chain management

    Get PDF
    Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and security concerns in part because humans cannot sense the radio frequency radiation used to read tags and the tags themselves maintain no history of past readings. Counterfeiting in the form of cloned or fraudulent RFID tags is a consequence of a lack of security measures and trust among the partners when RFID technology is used to automate their business transactions. This paper discusses the ways in which privacy and security protection can be maintained in an open-loop RFID supply chain. A cost-based detection of counterfeit tags using different classifiers is presented

    Auto-ID enabled tracking and tracing data sharing over dynamic B2B and B2G relationships

    Get PDF
    RFID 2011 collocated with the 2011 IEEE MTT-S International Microwave Workshop Series on Millimeter Wave Integration Technologies (IMWS 2011)Growing complexity and uncertainty are still the key challenges enterprises are facing in managing and re-engineering their existing supply chains. To tackle these challenges, they are continuing innovating management practices and piloting emerging technologies for achieving supply chain visibility, agility, adaptability and security. Nowadays, subcontracting has already become a common practice in modern logistics industry through partnership establishment between the involved stakeholders for delivering consignments from a consignor to a consignee. Companies involved in international supply chain are piloting various supply chain security and integrity initiatives promoted by customs to establish trusted business-to-customs partnership for facilitating global trade and cutting out avoidable supply chain costs and delays due to governmental regulations compliance and unnecessary customs inspection. While existing Auto-ID enabled tracking and tracing solutions are promising for implementing these practices, they provide few efficient privacy protection mechanisms for stakeholders involved in the international supply chain to communicate logistics data over dynamic business-to-business and business-government relationships. A unified privacy protection mechanism is proposed in this work to fill in this gap. © 2011 IEEE.published_or_final_versio

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    In Things We Trust? Towards trustability in the Internet of Things

    Full text link
    This essay discusses the main privacy, security and trustability issues with the Internet of Things

    Practical Schemes For Privacy & Security Enhanced RFID

    Full text link
    Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we investigate such scenarios, and propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.Comment: 18 page

    Designing Privacy and Security Protection in RFID-enabled Supply Chain

    Get PDF
    RFID is an automatic identification system that uses radio frequency technology in product tags. The technology brings out the greater enhancement to synchronize the logistics flow and information flow. Unfortunately, it also introduces the great concerns on the privacy and security protection, not only on the individual use but also on the supply chain collaboration. This study proposes an on demand access control to protect the information flow in an RFID-enabled supply chain. The design considers the role in a supply chain as well as the media of carrying the information. A case study on garment industry will be provided for validation
    corecore