Context-aware web services for security control and privacy preservation in an RFID supply chain

被引:0
作者
机构
[1] School of Information Technology and Electrical Engineering, University of Queensland
[2] School of Computer Science and Technology, Northwestern Polytechnical University
来源
Mahinderjit-Singh, M. (mkmsingh@itee.uq.edu.au) | 1600年 / Inderscience Enterprises Ltd., Switzerland卷 / 12期
关键词
Context-awareness; Radio frequency identification; RFID; SCM; Security and privacy; Supply chain management; Web services;
D O I
10.1504/IJITM.2013.051629
中图分类号
学科分类号
摘要
Automation and optimisation of supply-chain activities are made possible by radio frequency identification (RFID) technology. RFID supply chain performance can be enhanced by integrating RFID functions into the web service paradigm. However, the use of RFID involves growing privacy and security concerns, in part because the lack of RFID tag capacity places the whole supply-chain loop at risk of security such as product counterfeiting. In this paper, we tackle the security and privacy challenges in RFID by using context-aware web service technology. By employing a seven-layer trust framework, we design the functionalities to comply with web service architecture. In order to address the security and privacy problems, we also use the context parameters such as location and time to model the situations of RFID tags. A complete case of RFID-enabled supply chain in an EPCglobal network using context-aware web services is provided to tackle the RFID security and privacy challenges. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:39 / 66
页数:27
相关论文
共 49 条
[41]  
Staake T., Extending the EPC network: The potential of RFID in anti-counterfeiting, Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 1607-1612, (2005)
[42]  
Thiesse F., Floerkemier C., Harrison M., Michahellas F., Roduner C., Technology, standards, and real-world deployments of the EPC network, Internet Computing, IEEE, 13, 2, pp. 36-43, (2009)
[43]  
Truong H.L., Dustdar S., A survey on context-aware systems, Journal of Ad-Hoc and Ubiquitous Computing, 5, 1, pp. 5-31, (2007)
[44]  
Expanding Value of Supply Chain, (2008)
[45]  
EPC Network Architecture, (2004)
[46]  
Wang C.H., Li T., Feng T., Context-aware environment-role-based access control model for web services, International Conference on Multimedia and Ubiquitous Engineering, pp. 288-293, (2008)
[47]  
Yang G., Jarvenpaa S.L., Trust and radio frequency identification (RFID) adoption within an alliance, Proc. of the 38th Hawaii International Conference on System Sciences, (2005)
[48]  
Yao W., Chu C.H., Li Z., Mullen T., Leveraging complex event processing for RFID applications: A case study in hospitals, 39th National Conference of Decision Sciences Institute, pp. 4341-4346, (2008)
[49]  
Zamani Z., Bayat M., Moeini A., Motevalian A., Context-aware payment for supply chain: Software architecture and formal verification, Proceedings of the World Congress on Engineering 2008, pp. 211-216, (2008)