Weak-Unforgeable Tags for Secure Supply Chain Management

نویسندگان

  • Marten van Dijk
  • Chenglu Jin
  • Hoda Maleki
  • Phuong Ha Nguyen
  • Reza Rahaeimehr
چکیده

Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al. (HOST 2017) propose a new management scheme based on RFID tags (with 2-3K bits NVM) which, if compared to other schemes, is competitive on several performance and security metrics. Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag’s identity to each event such that an adversary is not able to impersonate the tag’s identity on another duplicate tag, a function with a weak form of unforgeability is needed. In this paper, we formally define this security property, present three constructions (MULTIPLY-ADD, ADD-XOR, and S-BoxCBC) having this security property, and show how to bound the probability of successful impersonation in concrete parameter settings. Finally, we compare our constructions with the light-weight hash function PHOTON used by Maleki et al. in terms of security and circuit area needed. We conclude that our ADD-XOR and S-Box-CBC constructions have approximately 1/4−1/3 of PHOTON’s total circuit area (this also includes the control circuitry besides PHOTON) while maintaining an appropriate security level which takes care of economically motivated adversaries.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Balanced evaluation of suppliers performance by applying a hybrid DEMATEL-DEA approach in presence of undesirable factors

One of the most complicated decision making problems for managers in supply chain is the evaluation of supply chain performance which can be done in different ways. Though several studies have been developed on supply chain performance evaluation based on balanced scorecard (BSC), a few studies focused on relationships among four perspectives of BSC. This paper focuses on these relationships, e...

متن کامل

Cost Efficiency of Closed–Loop Supply Chain in the Presence of Dual-Role and Undesirable Factors

Supply chain management is essential for the success of firms and customer satisfaction. In addition, a suitable performance evaluation system is vital to the effective management of the supply chain. Due to the importance of cost management in the supply chain, an approach based on Data Envelopment Analysis (DEA) is proposed in the current study for evaluating the cost efficiency of closed-loo...

متن کامل

Impact of Position and Orientation of RFID Tags on Real Time Asset Tracking in a Supply Chain

We studied the characteristics of four commercially available RFID tags such as their orientation on an asset and their position in a three dimensional real world environment to obtain comprehensive data to substantiate a baseline for the use of RFID technology in a diverse supply chain management setting. Using RFID tags manufactured by four different vendors and a GHz Transverse Electromagnet...

متن کامل

Secure collaboration in design and supply chain management

Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between the manufacturing companies and their partners by sharing a large amount of information. In the meantime, since some of the partners are also potential competitors, protection of confidential information, particularly intellectual property...

متن کامل

USING FREE DISPOSAL HULL MODELS IN SUPPLY CHAIN MANAGEMENT

To help improve customer satisfaction management (CRM), greater emphasis is given to the aspect of quality in the supply chain. And improve supply chain performance through integrated business management and strategic partnerships. On the other hand, strategic supply chain management decisions are made at a company level that determine benefits and efficiencies of the supply chain and effective...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017