RFID-enabled Supply Chain Simulator for Counterfeiting Attack Detection

نویسنده

  • Manmeet Mahinderjit Singh
چکیده

Article history: Received 25 January 2014 Received in revised form 12 March 2014 Accepted 14 April 2014 Available online 25 April 2014

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our s...

متن کامل

Security and privacy protection in RFID-enabled supply chain management

Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and s...

متن کامل

RFID-enabled Supply Chain Collaboration Services in a Networked Retail Business Environment

Since the early 1990s, there has been a growing understanding that supply chain management should be built around information sharing and collaboration among supply chain partners. The emergence of RFID technology is expected to revolutionize many of the collaborative supply chain processes and to empower new collaboration scenarios, such as anti-counterfeiting, product recall and reverse logis...

متن کامل

A Solution with Security Concern for RFID-Based Track & Trace Services in EPCglobal-Enabled Supply Chains

1.1 Overview A supply chain represents the flow of materials, information, and finance as they move through supply chain partners such as manufacturers, suppliers, distributors, retailers, and consumers. The track & trace services in supply chains can help improve supply chain visibility and efficiency, and prevent counterfeiting and stealing of products thus enhance security. Track & trace ser...

متن کامل

Context-aware web services for security control and privacy preservation in an RFID supply chain

Automation and optimisation of supply-chain activities are made possible by radio frequency identification (RFID) technology. RFID supply chain performance can be enhanced by integrating RFID functions into the web service paradigm. However, the use of RFID involves growing privacy and security concerns, in part because the lack of RFID tag capacity places the whole supply-chain loop at risk of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014