ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain

被引:7
|
作者
Yang, Kun [1 ]
Forte, Domenic [1 ]
Tehranipoor, Mark [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res, Elect & Comp Engn Dept, 601 Gale Lemerand Dr,POB 116550, Gainesville, FL 32611 USA
关键词
Radio frequency identification (RFID); Internet of things (IoT); supply chain security; traceability; authentication; AUTHENTICATION; INTERNET; SECURITY; PRIVACY;
D O I
10.1145/3174850
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to facilitated information and service exchange between connected objects, enhanced computing power and analytic capabilities of individual objects, and increased interaction between objects and their environments, the IoT also raises new security and privacy challenges. Hardware trust across the IoT supply chain is the foundation of IoT security and privacy. Two major supply chain issues-disappearance/theft of authentic loT devices and appearance of inauthentic ones-have to be addressed to secure the IoT supply chain and lay the foundation for further security and privacy-defensive measures. Comprehensive solutions that enable IoT device authentication and traceability across the entire supply chain (i.e., during distribution and after being provisioned) need to be established. Existing hardware, software, and network protection methods, however, do not address IoT supply chain issues. To mitigate this shortcoming, we propose an RFID-enabled solution called ReSC that aims at defending the IoT supply chain. By incorporating three techniques-one-to-one mapping between RFID tag identity and control chip identity; unique tag trace, which records tag provenance and history information; and neighborhood attestation of IoT devices-ReSC is resistant to split attacks (i.e., separating tag from product, swapping tags), counterfeit injection, product theft throughout the entire supply chain, device recycling, and illegal network service access (e.g., Internet, cable TV, online games, remote firmware updates). Simulations, theoretical analysis, and experimental results based on a printed circuit board (PCB) prototype demonstrate the effectiveness of ReSC. Finally, we evaluate the security of our proposed scheme against various attacks.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices
    Yang, Kun
    Forte, Domenic
    Tehranipoor, Mark
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2015, 2015, 9440 : 32 - 49
  • [2] ENHANCING SECURITY OF RFID-ENABLED IOT SUPPLY CHAIN
    Turksonmez, Halit
    Ozcanhan, Mehmet Hilal
    [J]. MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2023, 36 (03)
  • [3] RFID-enabled traceability in the food supply chain
    Kelepouris, Thomas
    Pramatari, Katerina
    Doukidis, Georgios
    [J]. INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2007, 107 (1-2) : 183 - 200
  • [4] Trust in RFID-enabled supply-chain management
    Mahinderjit-Singh, Manmeet
    Li, Xue
    [J]. International Journal of Security and Networks, 2010, 5 (2-3) : 96 - 105
  • [5] Batch Clone Detection in RFID-Enabled Supply Chain
    Shi, Jie
    Kywe, Su Mon
    Li, Yingjiu
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID), 2014, : 118 - 125
  • [6] Tamper detection for ubiquitous RFID-enabled supply chain
    Potdar, V
    Wu, C
    Chang, E
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 273 - 278
  • [7] RFID-enabled supply chain systems with computer simulation
    Mehijerdi, Yahia Zare
    [J]. ASSEMBLY AUTOMATION, 2009, 29 (02) : 174 - 183
  • [8] Effective Tracking and Tracing in RFID-enabled Supply Chain Networks
    Fu, Ge
    Shen, Shijun
    Zhao, Li
    Liu, Qian
    Li, Wenda
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2310 - 2315
  • [9] RFID-enabled business intelligence modules for supply chain optimisation
    Bottani, Eleonora
    Bertolini, Massimo
    Montanari, Roberto
    Volpi, Andrea
    [J]. INTERNATIONAL JOURNAL OF RF TECHNOLOGIES-RESEARCH AND APPLICATIONS, 2009, 1 (04) : 253 - 278
  • [10] RFID-enabled Supply Chain Process Redesign using Simulation
    Karagiannaki, Angeliki
    Pramatari, Katerina
    [J]. IWRT 2010: RFID TECHNOLOGY - CONCEPTS, APPLICATIONS, CHALLENGES, 2010, : 79 - 90