738 research outputs found

    The value of RFID for RTI management

    Get PDF
    Returnable transport items (RTIs) are key elements for enabling a smooth flow of goods throughout supply chains. Despite their importance, RTIs can be prone to high loss and breakage rates. Today's RTI management processes are rather inefficient and are based on estimates about when, where and how RTIs are utilised. This limited visibility inevitably causes the involved parties to feel less responsible for the proper management of RTIs. As a consequence, inefficiencies created by a single party can result in a significant cost burden for the whole supply chain. The goal of this paper is therefore to explore the impact of increased asset visibility on the RTI management process. We describe a solution based on Radio Frequency Identification (RFID) technology and quantify its financial impact from each individual stakeholder's perspective. Our findings suggest that RFID can provide a powerful means to counter inefficiencies in the RTI management process and improve the overall effectiveness of the RTI supply chain networ

    Efficient and Low-Cost RFID Authentication Schemes

    Get PDF
    Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme. Reader authentication is also necessary to thwart any illegal attempt to read the tags. With an objective to design a secure and low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its target security properties, it is susceptible to timing attacks, where the timestamp to be sent by the reader to the tag can be freely selected by an adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a tag can become inoperative after exceeding its pre-stored threshold timestamp value. In this paper, we propose two mutual RFID authentication protocols that aim to improve YA-TRAP* by preventing timing attack, and by providing reader authentication. Also, a tag is allowed to refresh its pre-stored threshold value in our protocols, so that it does not become inoperative after exceeding the threshold. Our protocols also achieve other security properties like forward security, resistance against cloning, replay, and tracking attacks. Moreover, the computation and communication costs are kept as low as possible for the tags. It is important to keep the communication cost as low as possible when many tags are authenticated in batch-mode. By introducing aggregate function for the reader-to-server communication, the communication cost is reduced. We also discuss different possible applications of our protocols. Our protocols thus capture more security properties and more efficiency than YA-TRAP*. Finally, we show that our protocols can be implemented using the current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201

    Potential effects of RFID technology on internal RTIs' supply chain performance : a case study of "Swire Oilfield Services"

    Get PDF
    Confidential until 23 May 202

    ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things

    Full text link
    RFID systems are among the major infrastructures of the Internet of Things, which follow ISO and EPC standards. In addition, ISO standard constitutes the main layers of supply chain, and many RFID systems benefit from ISO standard for different purposes. In this paper, we tried to introduce addressing systems based on ISO standards, through which the range of things connected to the Internet of Things will grow. Our proposed methods are addressing methods which can be applied to both ISO and EPC standards. The proposed methods are simple, hierarchical, and low cost implementation. In addition, the presented methods enhance interoperability among RFIDs, and also enjoys a high scalability, since it well covers all of EPC schemes and ISO supply chain standards. Further, by benefiting from a new algorithm for long EPCs known as selection algorithm, they can significantly facilitate and accelerate the operation of address mapping.Comment: arXiv admin note: text overlap with arXiv:1807.0217

    A new framework for the management of returnable "containers" within open supply networks

    No full text
    International audienceNew logistics models – physical internet, pooling, control towers, re-usable containers management – require an item-level traceability of physical shipping units that is independent of the partners involved in the supply chains. Current information systems architectures match this need by interfacing heter-ogeneous systems with each other. Such architecture can't meet the challenges brought by new and shared logistics models. We demonstrate here how the re-cent EPCglobal® standards and related technologies are settled in a multi-firm open network, applied to the management of reusable pallets, taken here as de-monstrators of Open Tracing Containers (OTC). Material and methods for cap-turing data and structuring information are proposed and implemented in the Fast Moving Consumer Goods flows. Results illustrate the reach of that "Intra-net of things" prototype, leading to interoperable logistic services, throughout various levels: from identifier tag level up to the piloting of each partner's lo-gistics networks. We highlight limits and perspectives in terms of technical track and trace solutions and assets management in this environment

    Component detection with on-board UHF RFID reader for Industrie 4.0 capable Returnable Transit Items

    Get PDF
    Industrie 4.0, Cyber-Physical Systems and Smart Manufacturing are all terms used to describe a vision of how intelligent products, processes and services can provide connectivity and real time information based technologies to improve manufacturing. This can be realised by embedding intelligence at the product and operational level to provide predictive, risk preventative and high performing manufacturing systems. The work outlined in this paper details how a Returnable Transit Item (RTI) can become an integral part of the Industrie 4.0 vision as an intelligent container that can interact with components, machines and other manufacturing services

    Meat Slaughter and Processing Plants’ Traceability Levels Evidence From Iowa

    Get PDF
    In the United States (U.S.), there is no uniform traceability regulation across food sector. Food and Drug Administration (FDA) implemented one-step back and one-step forward traceability over the industries under its jurisdiction. U.S. Department of Agriculture (USDA), which oversees meat, poultry and egg production, requires some record keeping as part of food safety regulation. Particularly, a two-part-system has developed; live animal traceability and meat traceability with slaughter and processing plants in between. This paper studies the question of whether (and if so how) meat plants’ traceability levels vary with respect to the following factors; product specific (credence versus experience and search attributes, branded versus commodity meat, being exporter), organizational (spot market versus contracting), food safety related, and plant specific (a quality assurance system in place, number of sources, size, capital-labor ratio, etc.).traceability, food safety, quality assurances, animal ID, RFID,

    MANAGING THE COMPLEXITY OF LARGE-SCALE RFID ROLLOUT PROJECTS IN LOGISTICS

    Get PDF
    The adoption and diffusion of RFID in logistics falls short behind the optimistic expectations shaped years ago. The complexity of large-scale RFID rollout projects is a barrier for widespread adoption and diffusion of RFID. Current RFID specific project management frameworks address the implementation of isolated RFID projects but provide very limited guidance on how to manage large-scale RFID rollouts. This paper provides substantiated insights on fuzzy front-end activities in the early phase of RFID rollout projects at a large automotive manufacturer. Our findings indicate that indivisibility as the underlying source of complexity is one of the principal factors for hesitant adoption and diffusion of RFID in automotive logistics. We propose fuzzy front-end approaches to address identified complexity issues and ramp up RFID implementation in a diverse cross-company and multi-project environment

    Estimating Data Volumes of RFID-enabled Supply Chains

    Get PDF
    The widespread application of RFID tags in supply chains is said to cause enormous data volume problems and thus unprecedented challenges for systems and infrastructures. In order to unleash the potential of item-level RFID applications, such as data sharing and discovery across company boundaries, an unbiased understanding of emerging data volumes is necessary. However, quantitative data that provides factual argument is still scarce. Therefore, we present a simulation study based on a real-world scenario that reveals quantitative characteristics of the data volumes problem in an RFID-enabled supply chain and discuss its implications. Our results suggest that data volumes will be much lower than currently anticipated, but still bear significant challenges for researchers and developers of RFID infrastructures
    • …
    corecore