Security and privacy protection in RFID-enabled supply chain management
نویسندگان
چکیده
Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and security concerns in part because humans cannot sense the radio frequency radiation used to read tags and the tags themselves maintain no history of past readings. Counterfeiting in the form of cloned or fraudulent RFID tags is a consequence of a lack of security measures and trust among the partners when RFID technology is used to automate their business transactions. This paper discusses the ways in which privacy and security protection can be maintained in an open-loop RFID supply chain. A cost-based detection of counterfeit tags using different classifiers is presented.
منابع مشابه
Context-aware web services for security control and privacy preservation in an RFID supply chain
Automation and optimisation of supply-chain activities are made possible by radio frequency identification (RFID) technology. RFID supply chain performance can be enhanced by integrating RFID functions into the web service paradigm. However, the use of RFID involves growing privacy and security concerns, in part because the lack of RFID tag capacity places the whole supply-chain loop at risk of...
متن کاملKEY DIMENSIONS OF EFFECTIVE FACTORS IN RFID TECHNOLOGY DEVELOPMENT IN THE SUPPLY CHAIN OF IRAN’S AUTO-INDUSTRY
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملKEY DIMENSIONS OF EFFECTIVE FACTORS IN RFID TECHNOLOGY DEVELOPMENT IN THE SUPPLY CHAIN OF IRAN’S AUTO-INDUSTRY
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
متن کاملRFID Enabled Supply-chain: Harvesting the Opportunities
Implementation of Radio Frequency Identification (RFID) technology stands to save WalMart $750 million dollars per year. The retail giant has mandated that its top 100 suppliers begin using RFID by 2005. It is believed that other retailers will follow Wal-Mart’s lead. RFID holds the promise for a more efficient supply-chain, however, the industry struggles to comply with the cost and logistics ...
متن کاملSecure and Practical Key Distribution for RFID-Enabled Supply Chains
In this paper, we present a fine-grained view of an RFIDenabled supply chain and tackle the secure key distribution problem on a peer-to-peer base. In our model, we focus on any pair of consecutive parties along a supply chain, who agreed on a transaction and based on which, certain RFID-tagged goods are to be transferred by a third party from one party to the other as in common supply chain pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJRFITA
دوره 3 شماره
صفحات -
تاریخ انتشار 2011