Trust in RFID-enabled supply-chain management

被引:11
作者
Mahinderjit-Singh M. [1 ]
Li X. [1 ]
机构
[1] School of Information Technology and Electrical Engineering, University of Queensland
关键词
Authentication; Radio frequency identification; RFID; SCM; Security; Supply-chain management; Trust;
D O I
10.1504/IJSN.2010.032208
中图分类号
学科分类号
摘要
RFID-enabled supply-chain systems are in an open-system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. Besides that, counterfeiting is a challenging issue in RFID Supply-Chain Management (SCM). On the basis of the analysis of traditional trust framework in SCM, this paper proposes a seven-layer RFID trust framework. An example of integration of our trust framework with SCM systems is presented. Taxonomy of cloning threats and solutions is also presented. Copyright © 2010 Inderscience Enterprises Ltd.
引用
收藏
页码:96 / 105
页数:9
相关论文
共 31 条
[1]  
Batina L., Guajardo J., Kerins T., Mentens N., Tuyls P., Verbauwhede I., Public-key cryptography for RFID-tags, Proc. 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), pp. 217-222, (2007)
[2]  
Bolotnyy L., Robins G., Physically unclonable function-based security and privacy in RFID systems, Pervasive Computing and Communications, PerCom '07, 5th Annual IEEE International Conference, pp. 211-220, (2007)
[3]  
Bono S., Green M., Stubblefield A., Juels A., Rubin A., Szydlo M., Security analysis of a cryptographicallyenabled RFID device, 14th USENIX Security Symposium, pp. 1-16, (2005)
[4]  
Choi S.H., Poon C.H., An RFID-based anti-counterfeiting system, IAENG International Journal of Computer Science (IJCS), 35, 1, pp. 1-12, (2008)
[5]  
Dimitriou T., A lightweight RFID protocol to protect against traceability and cloning attacks, Proceedings of SecureComm'05, pp. 59-66, (2005)
[6]  
Halamka J., Juels A., Stubblefield A., Westhues J., Security implications of VeriChipTM cloning, Journal of the American Medical Informatics Association, 13, 6, pp. 601-607, (2006)
[7]  
Hossain M., Prybutok V., Consumer acceptance of RFID technology: An exploratory study, IEEE Transactions on Engineering Management, 55, 2, pp. 316-328, (2008)
[8]  
Johnston R.G., An anticounterfeiting strategy using numeric tokens, International Journal of Pharmaceutical Medicine, 19, 3, pp. 163-171, (2005)
[9]  
Juels A., Strengthening EPC tags against cloning, Proc. 4th ACM Workshop on Wireless Security, pp. 67-76, (2005)
[10]  
Juels A., RFID security and privacy: A research survey, IEEE Journal on Selected Areas in Communications, 24, 2, pp. 381-394, (2006)