An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels

被引:8
作者
Burmester, Mike [1 ]
Munilla, Jorge [2 ]
Ortiz, Andres [2 ]
Caballero-Gil, Pino [3 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32304 USA
[2] Univ Malaga, Escuela Tecn Super Ingn Telecomunicac, Malaga 29070, Spain
[3] Univ La Laguna, Fac Ciencias, Dept Ingn Informat & Sistemas, Tenerife 38271, Spain
来源
SENSORS | 2017年 / 17卷 / 07期
基金
美国国家科学基金会;
关键词
RFID; grouping proof; ownership transfer; supply chain; secrecy capacity; GROUPING-PROOFS; TAGS; PROTOCOL; KEY;
D O I
10.3390/s17071562
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of simulatenous presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.
引用
收藏
页数:20
相关论文
共 49 条
  • [1] [Anonymous], 2005, ARCH CITESEER
  • [2] [Anonymous], 2011, INT J NETW SECUR, DOI DOI 10.6633/IJNS.201107.13(1).05
  • [3] Avoine G, 2006, LECT NOTES COMPUT SC, V3897, P291
  • [4] Ben Mabrouk N, 2015, IEEE INT CONF RFID, P121, DOI 10.1109/RFID.2015.7113082
  • [5] Burmester M., 2013, CHAPTER RFID GROUPIN, P89
  • [6] Burmester M., DISTRIBUTED GROUP AU
  • [7] Burmester M, 2008, LECT NOTES COMPUT SC, V5189, P176, DOI 10.1007/978-3-540-85893-5_13
  • [8] Resilient Grouping Proofs with Missing Tag Identification
    Burmester, Mike
    Munilla, Jorge
    [J]. UBIQUITOUS COMPUTING AND AMBIENT INTELLIGENCE, UCAMI 2016, PT II, 2016, 10070 : 544 - 555
  • [9] Performance Analysis of LDPC-Based RFID Group Coding
    Burmester, Mike
    Munilla, Jorge
    [J]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2017, 14 (01) : 398 - 402
  • [10] Tag Memory-Erasure Tradeoff of RFID Grouping Codes
    Burmester, Mike
    Munilla, Jorge
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (06) : 1144 - 1147