Secure and Practical Key Distribution for RFID-Enabled Supply Chains
نویسندگان
چکیده
In this paper, we present a fine-grained view of an RFIDenabled supply chain and tackle the secure key distribution problem on a peer-to-peer base. In our model, we focus on any pair of consecutive parties along a supply chain, who agreed on a transaction and based on which, certain RFID-tagged goods are to be transferred by a third party from one party to the other as in common supply chain practice. Under a strong adversary model, we identify and define the security requirements with those parties during the delivery process. To meet the security goal, we first propose a resilient secret sharing (RSS) scheme for key distribution among the three parties and formally prove its security against privacy and robustness adversaries. In our construction, the shared (and recovered) secrets can further be utilized properly on providing other desirable security properties such as tag authenticity, accessibility and privacy protection. Compared with existing approaches, our work is more resilient, secure and provides richer features in supply chain practice. Moreover, we discuss the parameterization issues and show the flexibility on applying our work in real-world deployments.
منابع مشابه
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our s...
متن کاملRFID Security and Privacy
Our major contribution in this field is to clarify the differences between two RFID privacy notions: one based on the indistinguishability of two tags (denoted as ind-privacy), and the other based on the unpredictability of the output of a protocol (denoted as unp-privacy). It is proven that ind-privacy is weaker than unp-privacy. Moreover, the minimal (necessary and sufficient) condition on ...
متن کاملUnidirectional Key Distribution Across Time and Space with Applications to RFID Security
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) Key sharing across space, i.e., across simultaneously emitted values that may follow different data paths and (2) Key sharing across time, i.e., in temporally staggered emissions. Our constructions are of general inter...
متن کاملSecTTS: A secure track & trace system for RFID-enabled supply chains
Due to the highly sensitive business information communicated within RFID-enabled supply chain networks, there is an urgent need for a secure and effective track & trace system. In this paper, we aim to design and implement a secure track & trace system (SecTTS) based on the EPCglobal network where the EPC Discovery Services (EPCDSs) is the most important component. In SecTTS, the EPCDS is desi...
متن کاملUnderstanding data volume problems of RFID-enabled supply chains
Purpose – The widespread application of radio frequency identification (RFID) tags in supply chains is said to cause enormous data volume problems that could render RFID event-driven supply chains unmanageable. An unbiased and quantitative understanding of the characteristics and extent of these data volume problems is necessary to identify and remove adoption barriers. This paper aims to addre...
متن کامل