Skip to main content

Proof of Possession: Using RFID for Large-Scale Authorization Management

  • Conference paper
Constructing Ambient Intelligence (AmI 2007)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 11))

Included in the following conference series:

Abstract

In inter-organizational supply chains, sharing of distributed, item-related information gathered using RFID can enable novel applications. Access control (AC) is needed to selectively disclose information to authorized participants. Given the large amount of data and the number of participants, common AC approaches would require extensive manual efforts. These efforts can be reduced significantly by the ability to prove physical possession of items to other companies. We examine how such Proofs of Possession can be designed. Based on two promising approaches, we introduce the concept of a Possession Service that may become a key factor in addressing the AC challenges in future supply chains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bose, I., Pal, R.: Auto-ID: managing anything, anywhere, anytime in the supply chain. Commun. ACM 48(8), 100–106 (2005)

    Article  Google Scholar 

  2. Delen, D., Hardgrave, B.C., Sharda, R.: RFID for Better Supply-Chain Management through Enhanced Information Visibility. Productions and Operations Management Journal (2007)

    Google Scholar 

  3. Fleisch, E., Mattern, F. (eds.): Das Internet der Dinge: Ubiquitous Computing und RFID in der Praxis, June 2005. Springer, Heidelberg (2005)

    Google Scholar 

  4. Grummt, E., Müller, M., Ackermann, R.: Access Control: Challenges and Approaches in the Internet of Things. In: Proceedings of the IADIS International Conference WWW/Internet 2007, Vila Real, Portuga, October 2007, vol. 2, pp. 89–93. IADIS Press (2007)

    Google Scholar 

  5. Harrison, M., Moran, H., Brusey, J., McFarlane, D.: PML Server Developments. In: White paper, Auto-ID Centre, University of Cambridge, Mill Lane, Cambridge, CB2 1RX, United Kingdom (June 2003)

    Google Scholar 

  6. Ilic, A., Michahelles, F., Fleisch, E.: The Dual Ownership Model: Using Organizational Relationships for Access Control in Safety Supply Chains. In: Advanced Information Networking and Applications Workshops (AINAW 2007), Niagara Falls, Ontario, Canada, May 2007, vol. 2, pp. 459–466 (2007)

    Google Scholar 

  7. Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communication 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  8. Pearson, J.: Securing the Pharmaceutical Supply Chain with RFID and Public-key infrastructure (PKI) Technologies. White Paper RFIDPH01. Texas Instruments Radio Frequency Identification Systems (June 2005)

    Google Scholar 

  9. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. IEEE Pervasive Computing 5(1), 62–69 (2006)

    Article  Google Scholar 

  11. Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network – The Potential of RFID in Anti-Counterfeiting. In: SAC 2005, pp. 1607–1612. ACM Press, New York (2005)

    Chapter  Google Scholar 

  12. Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., Stewart, R., Suen, K.: The EPCglobal Architecture Framework – EPCglobal Final Version of (July 1, 2005), http://www.epcglobalinc.org/standards/Final-epcglobal-arch-20050701.pdf

  13. Wamba, S.F., Lefebvre, L.A., Lefebvre, E.: Enabling Intelligent B-to-B eCommerce Supply Chain Management Using RFID and the EPC Network: A Case Study in the Retail Industry. In: ICEC 2006, pp. 281–288. ACM Press, New York (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Max Mühlhäuser Alois Ferscha Erwin Aitenbichler

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Grummt, E., Ackermann, R. (2008). Proof of Possession: Using RFID for Large-Scale Authorization Management . In: Mühlhäuser, M., Ferscha, A., Aitenbichler, E. (eds) Constructing Ambient Intelligence. AmI 2007. Communications in Computer and Information Science, vol 11. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85379-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85379-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85378-7

  • Online ISBN: 978-3-540-85379-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics