20 research outputs found

    Étude des phases en amont des projets d'adoption des technologies RFID pour l'amĂ©lioration des chaĂźnes d'approvisionnement

    Get PDF
    Problématique et objectifs de recherche -- Les technologies RFID et le réseau EPC -- Cadre conceptuel et contexte d'innovation -- University-based living lab for managing the front-end of innovation : the case of RFID implementation -- The potential of RFID in warehousing activities in a retail industry supply chain -- Key performance indicators for the evaluation of RFID enabled B-TO-B ecommerce applications : the case of fivelayer supply chain

    Bridging the gap between RFID/EPC concepts, technological requirements and supply chain e-business processes.

    No full text

    Bridging the gap between RFID/EPC concepts, technological requirements and supply chain e-business processes

    No full text
    Supply chain pressures have caused some firms to reexamine their processes. In doing so, firms are exploring emerging technology such as RFID to enable seamless exchange of information within their supply chain. While RFID promised to “revolutionize” the way business processes are managed today, the impact and benefits of the technology are still unclear and ambiguous concepts such as “intelligent products”, “smart supply chains” or “the internet of things” are still creating confusion within potential adopters. In this paper an attempt is made to (i) clarify the ambiguity surrounding RFID vs. other AIDC and IOS technologies such as the EPC Network (ii) specify the technology readiness & IT related requirements of actual and emerging applications, and (iii) propose a framework to highlight how the technology can be used to support RFID/EPC enabled ecommerce processes and support practitioners and academicians in assessing the impact of RFID on electronic supply chain business processes

    IoT Device Security: Challenging “A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function”

    No full text
    With the exponential increase of Internet of things (IoT) connected devices, important security risks are raised as any device could be used as an attack channel. This preoccupation is particularly important with devices featuring limited processing power and memory capabilities for security purposes. In line with this idea, Xu et al. (2018) proposed a lightweight Radio Frequency Identification (RFID) mutual authentication protocol based on Physical Unclonable Function (PUF)—ensuring mutual tag-reader verification and preventing clone attacks. While Xu et al. claim that their security protocol is efficient to protect RFID systems, we found it still vulnerable to a desynchronization attack and to a secret disclosure attack. Hence, guidelines for the improvements to the protocol are also suggested, for instance by changing the structure of the messages to avoid trivial attacks. In addition, we provide an explicit protocol for which our formal and informal security analysis have found no weaknesses
    corecore