DL-Tags: DLT and Smart Tags for Decentralized, Privacy-Preserving, and Verifiable Supply Chain Management
نویسندگان
چکیده
منابع مشابه
Weak-Unforgeable Tags for Secure Supply Chain Management
Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al. (HOST 2017) propose a new management scheme based on RFID tags (with 2-3K bits NVM) which, if compared to other schemes, is competitive on several performance and security metrics. Its main idea is to have each RFID tag stores its reader events in its own NVM while ...
متن کاملMassively Parallel Identification of Privacy-Preserving Vehicle RFID Tags
This article proposes a massively parallel identification scheme of vehicle RFID tags. These tags use a pseudo-random identifier, which is the output of a hash function fed by a fixed secret key that uniquely identifies the tag and by two random challenges that change on each tag activation. The use of random challenges makes it extremely difficult for someone not knowing the secret key of a ta...
متن کاملSmart RFID Tags
RFID has been identified as one of the cornerstones of the upcoming Internet of Things (IoT) and the focus is moving from conventional RFID towards next generation pervasive networked and interconnected systems. In the future IoT billions of objects are envisioned to report their identity, location, environmental conditions and history over wireless connections. An on-going effort that will sup...
متن کاملDeveloping RFID Database Models for Analysing Moving Tags in Supply Chain Management
The applications of RFID (Radio Frequency Identification) have become more important and diversified in recent years due to the lower cost of RFID tags and smaller tag sizes. One promising area for applying the technology is in Supply Chain Management (SCM) in which the manufacturers need to analyse product and logistic information in order to get the right quantity of products arriving at the ...
متن کاملPrivacy and Security Aspects of RFID Tags
RFID has recently received a lot of attention as an augmentation technology in manufacturing, SCM and retail inventory control. However, widespread deployment of RFID tags may create new threats to security and privacy of individuals and organizations. This paper gives an overview of all types of RFID privacy and security problems and its countermeasures.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2909170