ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain

被引:7
|
作者
Yang, Kun [1 ]
Forte, Domenic [1 ]
Tehranipoor, Mark [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res, Elect & Comp Engn Dept, 601 Gale Lemerand Dr,POB 116550, Gainesville, FL 32611 USA
关键词
Radio frequency identification (RFID); Internet of things (IoT); supply chain security; traceability; authentication; AUTHENTICATION; INTERNET; SECURITY; PRIVACY;
D O I
10.1145/3174850
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT), an emerging global network of uniquely identifiable embedded computing devices within the existing Internet infrastructure, is transforming how we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. In addition to facilitated information and service exchange between connected objects, enhanced computing power and analytic capabilities of individual objects, and increased interaction between objects and their environments, the IoT also raises new security and privacy challenges. Hardware trust across the IoT supply chain is the foundation of IoT security and privacy. Two major supply chain issues-disappearance/theft of authentic loT devices and appearance of inauthentic ones-have to be addressed to secure the IoT supply chain and lay the foundation for further security and privacy-defensive measures. Comprehensive solutions that enable IoT device authentication and traceability across the entire supply chain (i.e., during distribution and after being provisioned) need to be established. Existing hardware, software, and network protection methods, however, do not address IoT supply chain issues. To mitigate this shortcoming, we propose an RFID-enabled solution called ReSC that aims at defending the IoT supply chain. By incorporating three techniques-one-to-one mapping between RFID tag identity and control chip identity; unique tag trace, which records tag provenance and history information; and neighborhood attestation of IoT devices-ReSC is resistant to split attacks (i.e., separating tag from product, swapping tags), counterfeit injection, product theft throughout the entire supply chain, device recycling, and illegal network service access (e.g., Internet, cable TV, online games, remote firmware updates). Simulations, theoretical analysis, and experimental results based on a printed circuit board (PCB) prototype demonstrate the effectiveness of ReSC. Finally, we evaluate the security of our proposed scheme against various attacks.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] RFId-enabled Lateral Trans-shipments in the Fashion & Apparel Supply Chain
    Mogre, Riccardo
    Perego, Alessandro
    Tumino, Angela
    [J]. RFID TECHNOLOGY - CONCEPTS, APPLICATIONS, CHALLENGES, PROCEEDINGS, 2009, : 117 - 124
  • [22] Adaptive product tracking in RFID-enabled large-scale supply chain
    Ko, Jong Myoung
    Kwak, Choonjong
    Cho, Youngho
    Kim, Chang Ouk
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (03) : 1583 - 1590
  • [23] A framework for Six-Sigma driven RFID-enabled supply chain systems
    Mehrjerdi, Yahia Zare
    [J]. INTERNATIONAL JOURNAL OF QUALITY & RELIABILITY MANAGEMENT, 2013, 30 (02) : 142 - +
  • [24] On efficient key tag writing in RFID-enabled IoT
    Pengfei ZHANG
    Hao LIU
    Jihong YU
    [J]. Science China(Information Sciences), 2021, 64 (06) : 252 - 254
  • [25] On efficient key tag writing in RFID-enabled IoT
    Pengfei Zhang
    Hao Liu
    Jihong Yu
    [J]. Science China Information Sciences, 2021, 64
  • [26] Fast Discrepancy Identification for RFID-Enabled IoT Networks
    Gu, Caidong
    [J]. IEEE ACCESS, 2018, 6 : 6194 - 6204
  • [27] On efficient key tag writing in RFID-enabled IoT
    Zhang, Pengfei
    Liu, Hao
    Yu, Jihong
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (06)
  • [28] An Investment Evaluation of a RFID-Enabled Meat Supply Chain: A Multi-Criteria Approach
    Mohammed, Ahmed
    Wang, Qian
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON MANUFACTURING AND INDUSTRIAL TECHNOLOGIES, 2016, 70
  • [29] Improving inventory effectiveness in RFID-enabled global supply chain with Grey forecasting model
    Wang, S. -J.
    Wang, W. -L.
    Huang, C. -T.
    Chen, S. -C.
    [J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2011, 20 (03): : 307 - 322
  • [30] Identifying Discrepant Tags in RFID-enabled Supply Chains
    Gu, Caidong
    Gong, Wei
    Nayak, Amiya
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 162 - 173