20 research outputs found
Ătude des phases en amont des projets d'adoption des technologies RFID pour l'amĂ©lioration des chaĂźnes d'approvisionnement
Problématique et objectifs de recherche -- Les technologies RFID et le réseau EPC -- Cadre conceptuel et contexte d'innovation -- University-based living lab for managing the front-end of innovation : the case of RFID implementation -- The potential of RFID in warehousing activities in a retail industry supply chain -- Key performance indicators for the evaluation of RFID enabled B-TO-B ecommerce applications : the case of fivelayer supply chain
Bridging the gap between RFID/EPC concepts, technological requirements and supply chain e-business processes
Supply chain pressures have caused some firms to reexamine their processes. In doing so, firms are exploring emerging technology such as RFID to enable seamless exchange of information within their supply chain. While RFID promised to ârevolutionizeâ the way business processes are managed today, the impact and benefits of the technology are still unclear and ambiguous concepts such as âintelligent productsâ, âsmart supply chainsâ or âthe internet of thingsâ are still creating confusion within potential adopters. In this paper an attempt is made to (i) clarify the ambiguity surrounding RFID vs. other AIDC and IOS technologies such as the EPC Network (ii) specify the technology readiness & IT related requirements of actual and emerging applications, and (iii) propose a framework to highlight how the technology can be used to support RFID/EPC enabled ecommerce processes and support practitioners and academicians in assessing the impact of RFID on electronic supply chain business processes
IoT Device Security: Challenging âA Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Functionâ
With the exponential increase of Internet of things (IoT) connected devices, important security risks are raised as any device could be used as an attack channel. This preoccupation is particularly important with devices featuring limited processing power and memory capabilities for security purposes. In line with this idea, Xu et al. (2018) proposed a lightweight Radio Frequency Identification (RFID) mutual authentication protocol based on Physical Unclonable Function (PUF)—ensuring mutual tag-reader verification and preventing clone attacks. While Xu et al. claim that their security protocol is efficient to protect RFID systems, we found it still vulnerable to a desynchronization attack and to a secret disclosure attack. Hence, guidelines for the improvements to the protocol are also suggested, for instance by changing the structure of the messages to avoid trivial attacks. In addition, we provide an explicit protocol for which our formal and informal security analysis have found no weaknesses