Context-aware web services for security control and privacy preservation in an RFID supply chain

被引:0
作者
机构
[1] School of Information Technology and Electrical Engineering, University of Queensland
[2] School of Computer Science and Technology, Northwestern Polytechnical University
来源
Mahinderjit-Singh, M. (mkmsingh@itee.uq.edu.au) | 1600年 / Inderscience Enterprises Ltd., Switzerland卷 / 12期
关键词
Context-awareness; Radio frequency identification; RFID; SCM; Security and privacy; Supply chain management; Web services;
D O I
10.1504/IJITM.2013.051629
中图分类号
学科分类号
摘要
Automation and optimisation of supply-chain activities are made possible by radio frequency identification (RFID) technology. RFID supply chain performance can be enhanced by integrating RFID functions into the web service paradigm. However, the use of RFID involves growing privacy and security concerns, in part because the lack of RFID tag capacity places the whole supply-chain loop at risk of security such as product counterfeiting. In this paper, we tackle the security and privacy challenges in RFID by using context-aware web service technology. By employing a seven-layer trust framework, we design the functionalities to comply with web service architecture. In order to address the security and privacy problems, we also use the context parameters such as location and time to model the situations of RFID tags. A complete case of RFID-enabled supply chain in an EPCglobal network using context-aware web services is provided to tackle the RFID security and privacy challenges. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:39 / 66
页数:27
相关论文
共 49 条
  • [1] Alkhateeb F., Al Maghayreh E., Aljawarneh S., A multi agent-based system for securing university campus: Design and architecture, 2010 International Conference on Intelligent Systems, Modelling and Simulation, pp. 75-79, (2010)
  • [2] Amoroso E., Kwapniewski R., A selection criteria for intrusion detection systems, Computer Security Applications Conference, Proceedings, 14th Annual, 7-11 Dec 1998, pp. 280-288, (1998)
  • [3] Ayoade J., Roadmap to solving security and privacy concerns in RFID systems, Computer Law and Security Report, 23, 6, pp. 555-561, (2007)
  • [4] Aziz Z., Anumba C.J., Ruikar D., Carrillo P.M., Bouchlaghem D.N., Semantic web based services for intelligent mobile construction collaboration, ITcon, 9, Special Issue Mobile Computing in Construction, pp. 367-379, (2003)
  • [5] Bai Y., Kobayashi H., Intrusion detection systems: Technology and development, Advanced Information Networking and Applications, AINA 2003, 17th International Conference, pp. 710-715, (2003)
  • [6] Batina L., Guajardo J., Kerins T., Mentens N., Tuyls P., Verbauwhede I., Public-key cryptography for RFID-tags, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 217-222, (2007)
  • [7] Beer W., Christian V., Modeling context-aware behavior by interpreted ECA rules, Proceedings of the International Conference on Parallel and Distributed Computing (EUROPAR'03), pp. 26-29, (2003)
  • [8] Bolotnyy L., Robins G., Physically unclonable function-based security and privacy in RFID systems, 2007 Fifth Annual IEEE International Conference on Pervasive Computing and Communications, pp. 211-220, (2007)
  • [9] Burmester M., Medeiros B., RFID security: Attacks, countermeasures and challenges', the 5th RFID Academic Convocation, The RFID Journal Conference, (2007)
  • [10] Choi S.H., Poon C.H., An RFID-based anti-counterfeiting system, IAENG International Journal of Computer Science, 35, 1, pp. 1-12, (2008)