Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

被引:0
|
作者
Cai, Shaoying [1 ]
Li, Yingjiu [1 ]
Zhao, Yunlei [2 ]
机构
[1] Singapore Management Univ, Singapore 178902, Singapore
[2] Fudan Univ, Shanghai 201203, Peoples R China
关键词
MINIMALIST CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our solution is secure, privacy-preserving, and practical. It leverages on the standard EPCglobal network to share information about paths and parties in path authentication. Our solution can be implemented on standard EPC class 1 generation 2 tags with only 720 bits storage and no computational capability.
引用
收藏
页码:501 / 512
页数:12
相关论文
共 50 条
  • [1] A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains
    Xie, Xin
    Liu, Xiulong
    Guo, Song
    Qi, Heng
    Li, Keqiu
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [2] Efficient Distributed Query Processing in Large RFID-enabled Supply Chains
    Liu, Jia
    Xiao, Bin
    Bu, Kai
    Chen, Lijun
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 163 - 171
  • [3] Identifying Discrepant Tags in RFID-enabled Supply Chains
    Gu, Caidong
    Gong, Wei
    Nayak, Amiya
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 162 - 173
  • [4] Semantic access control model for RFID-enabled supply chains
    Li, Zang
    Chu, Chao-Hsien
    Yao, Wen
    [J]. Cryptology and Information Security Series, 2010, 4 : 95 - 108
  • [5] Understanding data volume problems of RFID-enabled supply chains
    Ilic, Alexander
    Groessbauer, Andrea
    Michahelles, Florian
    Fleisch, Elgar
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2010, 16 (06) : 904 - 916
  • [6] RFID-ENABLED TRACEABILITY SYSTEM FOR PERISHABLE FOOD SUPPLY CHAINS
    Zhu, Lijing
    Lee, Chulung
    [J]. INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, 2018, 25 (01): : 54 - 66
  • [7] Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains
    Abughazalah, Sarah
    Markantonakis, Kostantinos
    Mayes, Keith
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 871 - 878
  • [8] Tamper detection in RFID-enabled supply chains using fragile watermarking
    ShuiHua Han
    Chu, Chao-Hsien
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, : 111 - +
  • [9] Security and Privacy for Data Mining of RFID-Enabled Product Supply Chains
    Yao, Xiaoming
    Du, Wencai
    Zhou, Xiaoyi
    Ma, Jixin
    [J]. PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1037 - 1046
  • [10] SecTTS: A secure track & trace system for RFID-enabled supply chains
    Shi, Jie
    Li, Yingjiu
    He, Wei
    Sim, Darren
    [J]. COMPUTERS IN INDUSTRY, 2012, 63 (06) : 574 - 585