On Mitigating Covert Channels in RFID-Enabled Supply Chains

نویسندگان

  • Kirti Chawla
  • Westley Weimer
چکیده

In a competitive business environment, RFID technology can help a business to optimize its supply chain. However, it may also enable an adversary using covert channels to surreptitiously learn sensitive information about the supply chain of a target business. We argue that the tracking of tags and the compromising of readers can create covert channels in the supply chain and cause detrimental market effects. To mitigate such attacks, we propose a framework that enables a business to monitor its supply chain in a fine-grained manner. We model the supply chain as a network flow graph, select key nodes to verify the tag flow, and actively search for covert channels. We note that optimal checkpoint node selection is NP-Complete, propose node selection and flow verification heuristics with various tradeoffs, and discuss appropriate countermeasures against covert channels detected in the supply chain. These practical methods can be implemented economically using current RFID technology.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Estimating Data Volumes of RFID-enabled Supply Chains

The widespread application of RFID tags in supply chains is said to cause enormous data volume problems and thus unprecedented challenges for systems and infrastructures. In order to unleash the potential of item-level RFID applications, such as data sharing and discovery across company boundaries, an unbiased understanding of emerging data volumes is necessary. However, quantitative data that ...

متن کامل

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our s...

متن کامل

A Solution with Security Concern for RFID-Based Track & Trace Services in EPCglobal-Enabled Supply Chains

1.1 Overview A supply chain represents the flow of materials, information, and finance as they move through supply chain partners such as manufacturers, suppliers, distributors, retailers, and consumers. The track & trace services in supply chains can help improve supply chain visibility and efficiency, and prevent counterfeiting and stealing of products thus enhance security. Track & trace ser...

متن کامل

Understanding data volume problems of RFID-enabled supply chains

Purpose – The widespread application of radio frequency identification (RFID) tags in supply chains is said to cause enormous data volume problems that could render RFID event-driven supply chains unmanageable. An unbiased and quantitative understanding of the characteristics and extent of these data volume problems is necessary to identify and remove adoption barriers. This paper aims to addre...

متن کامل

Enterprise System Design for RFID Enabled Supply Chains from Experience in Two National Projects

Two national demonstrator projects have been developed using global RFID standards to explore the suitability of this pervasive technology to the fast moving consumer goods supply chain. The projects show that RFID technology is still not reliable enough to produce advantages over traditional tracking technologies. This paper reviews the processes and gaps in these experiences, and assesses fut...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009