Advertisement

Logistics Exceptions Monitoring for Anti-counterfeiting in RFID-Enabled Supply Chains

  • Xiaoming YaoEmail author
  • Xiaoyi Zhou
  • Jixin Ma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 887)

Abstract

In recent years, the radio frequency identification (RFID) technology has been used as a promising tool for anti-counterfeiting in RFID-enabled supply chains due to its track-and-trace abilities of contactless object identification with the unique electronic product code (EPC). While this system does improve its performance in many ways, uncertainties of daily operations might bring about one or more logistics exceptions, which would further trigger other dependent exceptions. These exceptions could be well organized and exploited by adversaries to fool the system for counterfeiting while related reports are unfortunately very few. In this paper, we presented our results focusing on the inter-dependencies between those logistics exceptions and the detecting intelligence in a resource-centric view. A cause-effect relational diagram is first developed to explicitly express the relations among those logistics exceptions by incorporating the taxonomy of exceptions and resource-based theory, and then an improved intelligent exception monitoring system is designed to achieve the goal of autonomous, flexible, collaborative and reliable logistics services. Finally, a case study of two typical logistics exceptions indicates that our proposed cause-effect diagram outperforms the extant approaches in the understanding of group logistics exceptions, which enables the designed monitoring system to perform well for anti-counterfeiting.

Keywords

RFID-enabled supply chains Relational diagram Anti-counterfeiting Logistics exceptions Exceptions monitoring 

Notes

Acknowledgment

This work is supported by Natural Science Foundation of China under the grant No. 61462023.

References

  1. 1.
    Yao, X., Zhou, X., Ma, J.: Object event visibility for anti-counterfeiting in RFID-enabled product supply chains. In: Proceedings of the Science and Information Conference, London, UK, pp. 141–150, 28–30 July 2015Google Scholar
  2. 2.
    Musa, A., Gunasekaran, A., Yusuf, Y.: Supply chain product visibility: methods, systems and impacts. Expert Syst. Appl. 41, 176–194 (2014)CrossRefGoogle Scholar
  3. 3.
    Schapranow, M., Muller, J., Zeier, A., Plattner, H.: Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chain. Pers. Ubiquit. Comput. 16, 271–289 (2012)CrossRefGoogle Scholar
  4. 4.
    Wemmerlöv, U.: A taxonomy for service processes and its implications for system design. Int. J. Serv. Ind. Manag. 1(3), 20–40 (1990)CrossRefGoogle Scholar
  5. 5.
    Svensson, G.: A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows. Int. J. Phys. Distrib. Logist. Manag. 32(2), 110–134 (2002)CrossRefGoogle Scholar
  6. 6.
    Russell, N., Aalst, W., Hofstede, A.: Workflow exception patterns. In: Dubois, E., Pohl, K. (eds.) CAiSE, Berlin, pp. 288–302 (2006)Google Scholar
  7. 7.
    Ozkohen, A., Yolum, P.: Predicting exceptions in agent-based supply chains. In: Engineering Societies in the Agents World, pp. 168–183 (2006)CrossRefGoogle Scholar
  8. 8.
    Wang, M., Wang, H., Kit, K., Xu, D.: Knowledge-based exception handling in securities transactions. In: Proceedings of 37th Hawaii International Conference on Information System Sciences, Hawaii, 30074a, vol. 3 (2004)Google Scholar
  9. 9.
    Xu, D., Wijesooriya, C., Wang, Y., Beydoun, G.: Outbound logistics exception monitoring: a multi-perspective ontologies’ approach with intelligent agents. Expert Syst. Appl. 38, 13604–13611 (2011)Google Scholar
  10. 10.
    Yang, L., Peng, P., Dang, F., Wang, C., Li, X., Liu, Y.: Anti-counterfeiting via federated RFID tags’ fingerprints and geometric relationships. In: Proceedings of 34th IEEE Conference on Computer Communications (INFOCOM), Hong Kong, pp. 1966–1974, 26 April–1 May 2015Google Scholar
  11. 11.
    Wang, L., Ting, J., Ip, W.: Design of supply-chain pedigree interactive dynamic explore (SPIDER) for food safety and implementation of hazard analysis and critical control points (HACCPs). Comput. Electron. Agric. 90, 14–23 (2013)CrossRefGoogle Scholar
  12. 12.
    Masciari, E.: SMART: stream monitoring enterprise activities by RFID tags. Inf. Sci. 195, 25–44 (2012)CrossRefGoogle Scholar
  13. 13.
    Noy, N., Klein, M.: Ontology evolution: not the same as schema evolution. Knowl. Inf. Syst. 6(4), 428–440 (2004)CrossRefGoogle Scholar
  14. 14.
    Ahmada, S., Lavin, A., Purdya, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134–147 (2017)CrossRefGoogle Scholar
  15. 15.
    Kwok, S., Tsang, A., Ting, J., Lee, W., Cheung, B.: An intelligent RFID-based electronic anti-counterfeit system (InRECS) for the manufacturing industry. In: Proceedings of the 17th International Federation of Automatic Control (IFAC) World Congress, Seoul, Korea, pp. 5482–5487, 6–11 July 2008CrossRefGoogle Scholar
  16. 16.
    Cheung, H., Choi, S.: Implementation issues in RFID-based anti-counterfeiting systems. Comput. Ind. 62, 708–718 (2011)CrossRefGoogle Scholar
  17. 17.
    Barney, J.: Firm resources and sustained competitive advantage. J. Manag. 17(1), 99–121 (1991)Google Scholar
  18. 18.
    Chi, J., Sun, L.: IT and competitive advantage: a study from micro perspective. Modern Econ. 6(3), 404–410 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Information Science and TechnologyHainan UniversityHaikouChina
  2. 2.Department of Computing and Information SystemsUniversity of GreenwichLondonUK

Personalised recommendations