A Cloud-Based Authentication Protocol for RFID Supply Chain Systems

被引:25
作者
Lin, Iuon-Chang [1 ,2 ]
Hsu, Hung-Huei [2 ]
Cheng, Chen-Yang [3 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung, Taiwan
[3] Tunghai Univ, Dept Ind Engn & Enterprise Informat, Taichung, Taiwan
关键词
Cloud computing; Supply chain management; RFID; Security; RANDOM KEY PREDISTRIBUTION; PRE-DISTRIBUTION; SENSOR; SCHEMES;
D O I
10.1007/s10922-014-9329-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID technology is the popular technology in recent years and applies to many automatic identification applications such as supply chain management, thief-prevention and so on. Supply chain system with the help of RFID system reduces the cost in business operation. Different members in the supply chain connect to the same RFID tag for acquiring their own data. Members can protect their secret information not being revealed by internal attacker, and unauthorized member and cloud service provider cannot decrypt the secret information. However, the traditional architecture lacks of data search and scalability. It causes the difficulty in searching a specific object. When one of supply chain member wants to search data of specific tag in database, it will be difficult to locate and search the object. In this paper we proposed a novel cloud-architecture for RFID supply chain system and we also proposed the detail schemes such as authentication, ownership transfer, authority recovery and data sharing. The proposed method comfort to supply chain environment and data sharing phase enhances the efficiency of supply chain. We analyze our method with security and performance.
引用
收藏
页码:978 / 997
页数:20
相关论文
共 26 条
  • [1] [Anonymous], INT J NETW SECUR
  • [2] Bingu┬l MA., 2012, INT J INF SECUR SCI, V1, P32
  • [3] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [4] Blundo C., 1993, ADV CRYPTOLOGY
  • [5] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [6] CRFID: An RFID system with a cloud database as a back-end server
    Chen, Shuai-Min
    Wu, Mu-En
    Sun, Hung-Min
    Wang, King-Hang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 155 - 161
  • [7] Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 391 - 397
  • [8] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [9] Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
  • [10] Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548