738 research outputs found
The value of RFID for RTI management
Returnable transport items (RTIs) are key elements for enabling a smooth flow of goods throughout supply chains. Despite their importance, RTIs can be prone to high loss and breakage rates. Today's RTI management processes are rather inefficient and are based on estimates about when, where and how RTIs are utilised. This limited visibility inevitably causes the involved parties to feel less responsible for the proper management of RTIs. As a consequence, inefficiencies created by a single party can result in a significant cost burden for the whole supply chain. The goal of this paper is therefore to explore the impact of increased asset visibility on the RTI management process. We describe a solution based on Radio Frequency Identification (RFID) technology and quantify its financial impact from each individual stakeholder's perspective. Our findings suggest that RFID can provide a powerful means to counter inefficiencies in the RTI management process and improve the overall effectiveness of the RTI supply chain networ
Efficient and Low-Cost RFID Authentication Schemes
Security in passive resource-constrained Radio Frequency Identification
(RFID) tags is of much interest nowadays. Resistance against illegal tracking,
cloning, timing, and replay attacks are necessary for a secure RFID
authentication scheme. Reader authentication is also necessary to thwart any
illegal attempt to read the tags. With an objective to design a secure and
low-cost RFID authentication protocol, Gene Tsudik proposed a timestamp-based
protocol using symmetric keys, named YA-TRAP*. Although YA-TRAP* achieves its
target security properties, it is susceptible to timing attacks, where the
timestamp to be sent by the reader to the tag can be freely selected by an
adversary. Moreover, in YA-TRAP*, reader authentication is not provided, and a
tag can become inoperative after exceeding its pre-stored threshold timestamp
value. In this paper, we propose two mutual RFID authentication protocols that
aim to improve YA-TRAP* by preventing timing attack, and by providing reader
authentication. Also, a tag is allowed to refresh its pre-stored threshold
value in our protocols, so that it does not become inoperative after exceeding
the threshold. Our protocols also achieve other security properties like
forward security, resistance against cloning, replay, and tracking attacks.
Moreover, the computation and communication costs are kept as low as possible
for the tags. It is important to keep the communication cost as low as possible
when many tags are authenticated in batch-mode. By introducing aggregate
function for the reader-to-server communication, the communication cost is
reduced. We also discuss different possible applications of our protocols. Our
protocols thus capture more security properties and more efficiency than
YA-TRAP*. Finally, we show that our protocols can be implemented using the
current standard low-cost RFID infrastructures.Comment: 21 pages, Journal of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications (JoWUA), Vol 2, No 3, pp. 4-25, 201
Potential effects of RFID technology on internal RTIs' supply chain performance : a case study of "Swire Oilfield Services"
Confidential until 23 May 202
ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things
RFID systems are among the major infrastructures of the Internet of Things,
which follow ISO and EPC standards. In addition, ISO standard constitutes the
main layers of supply chain, and many RFID systems benefit from ISO standard
for different purposes. In this paper, we tried to introduce addressing systems
based on ISO standards, through which the range of things connected to the
Internet of Things will grow. Our proposed methods are addressing methods which
can be applied to both ISO and EPC standards. The proposed methods are simple,
hierarchical, and low cost implementation. In addition, the presented methods
enhance interoperability among RFIDs, and also enjoys a high scalability, since
it well covers all of EPC schemes and ISO supply chain standards. Further, by
benefiting from a new algorithm for long EPCs known as selection algorithm,
they can significantly facilitate and accelerate the operation of address
mapping.Comment: arXiv admin note: text overlap with arXiv:1807.0217
A new framework for the management of returnable "containers" within open supply networks
International audienceNew logistics models – physical internet, pooling, control towers, re-usable containers management – require an item-level traceability of physical shipping units that is independent of the partners involved in the supply chains. Current information systems architectures match this need by interfacing heter-ogeneous systems with each other. Such architecture can't meet the challenges brought by new and shared logistics models. We demonstrate here how the re-cent EPCglobal® standards and related technologies are settled in a multi-firm open network, applied to the management of reusable pallets, taken here as de-monstrators of Open Tracing Containers (OTC). Material and methods for cap-turing data and structuring information are proposed and implemented in the Fast Moving Consumer Goods flows. Results illustrate the reach of that "Intra-net of things" prototype, leading to interoperable logistic services, throughout various levels: from identifier tag level up to the piloting of each partner's lo-gistics networks. We highlight limits and perspectives in terms of technical track and trace solutions and assets management in this environment
Component detection with on-board UHF RFID reader for Industrie 4.0 capable Returnable Transit Items
Industrie 4.0, Cyber-Physical Systems and Smart Manufacturing are all terms used to describe a vision of how intelligent products, processes and services can provide connectivity and real time information based technologies to improve manufacturing. This can be realised by embedding intelligence at the product and operational level to provide predictive, risk preventative and high performing manufacturing systems. The work outlined in this paper details how a Returnable Transit Item (RTI) can become an integral part of the Industrie 4.0 vision as an intelligent container that can interact with components, machines and other manufacturing services
Meat Slaughter and Processing Plants’ Traceability Levels Evidence From Iowa
In the United States (U.S.), there is no uniform traceability regulation across food sector. Food and Drug Administration (FDA) implemented one-step back and one-step forward traceability over the industries under its jurisdiction. U.S. Department of Agriculture (USDA), which oversees meat, poultry and egg production, requires some record keeping as part of food safety regulation. Particularly, a two-part-system has developed; live animal traceability and meat traceability with slaughter and processing plants in between. This paper studies the question of whether (and if so how) meat plants’ traceability levels vary with respect to the following factors; product specific (credence versus experience and search attributes, branded versus commodity meat, being exporter), organizational (spot market versus contracting), food safety related, and plant specific (a quality assurance system in place, number of sources, size, capital-labor ratio, etc.).traceability, food safety, quality assurances, animal ID, RFID,
MANAGING THE COMPLEXITY OF LARGE-SCALE RFID ROLLOUT PROJECTS IN LOGISTICS
The adoption and diffusion of RFID in logistics falls short behind the optimistic expectations shaped years ago. The complexity of large-scale RFID rollout projects is a barrier for widespread adoption and diffusion of RFID. Current RFID specific project management frameworks address the implementation of isolated RFID projects but provide very limited guidance on how to manage large-scale RFID rollouts. This paper provides substantiated insights on fuzzy front-end activities in the early phase of RFID rollout projects at a large automotive manufacturer. Our findings indicate that indivisibility as the underlying source of complexity is one of the principal factors for hesitant adoption and diffusion of RFID in automotive logistics. We propose fuzzy front-end approaches to address identified complexity issues and ramp up RFID implementation in a diverse cross-company and multi-project environment
Estimating Data Volumes of RFID-enabled Supply Chains
The widespread application of RFID tags in supply chains is said to cause enormous data volume problems and thus unprecedented challenges for systems and infrastructures. In order to unleash the potential of item-level RFID applications, such as data sharing and discovery across company boundaries, an unbiased understanding of emerging data volumes is necessary. However, quantitative data that provides factual argument is still scarce. Therefore, we present a simulation study based on a real-world scenario that reveals quantitative characteristics of the data volumes problem in an RFID-enabled supply chain and discuss its implications. Our results suggest that data volumes will be much lower than currently anticipated, but still bear significant challenges for researchers and developers of RFID infrastructures
- …