Advertisement

Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems

  • Shaoying Cai
  • Tieyan Li
  • Yingjiu Li
  • Robert H. Deng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5451)

Abstract

While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few research works have been conducted to address these issues simultaneously. In this paper, we observe the different security requirements in RFID-enabled supply chain environments and differentiate the simplified model into two security levels. Accordingly, dual security modes are properly defined in our RFID setting. In the relatively secure environment, our system is set to the weak security mode, the tagged products can be processed in a highly efficient way. When in the strong security mode, our system guarantees a high level of security, while its efficiency is lower than that in the weak security mode. A set of RFID tag/reader protocols to facilitate the duel security modes are presented. Their security, visibility and efficiency are analyzed and compared with the relevant works.

Keywords

Supply Chain Supply Chain Management Handover Process Supply Chain Partner Security Mode 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    EPCglobal Inc., E.P.C. Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.1.0. EPCglobal Standards (October 2007)Google Scholar
  2. 2.
    EPCglobal Inc., Architecture Framework Standard v1.0Google Scholar
  3. 3.
    Liu, E., Kumar, A.: Leveraging information sharing to increase supply chain configurability. In: Twenty-Fourth International Conference on Information Systems, pp. 523–537 (2003)Google Scholar
  4. 4.
    Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293–308. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Bringer, J., Chabanne, H., Emmanuelle, D.: HB + + : a Lightweight Authentication Protocol Secure against Some Attacks. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing – SecPerU 2006, Lyon, France. IEEE Computer Society Press, Los Alamitos (2006)Google Scholar
  7. 7.
    Sarma, S., Weis, S., Engels, D.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: Proc. of RFID Privacy Workshop (2003)Google Scholar
  9. 9.
    Aigner, M., Feldhofer, M.: Secure Symmetric Authentication for RFID Tags. Telecommunication and Mobile Computing (March 2005)Google Scholar
  10. 10.
    Vajda, I., Buttyan, L.: Lightweight authentication protocols for low-cost RFID tags. In: Proc. of UBICOMP 2003 (2003)Google Scholar
  11. 11.
    Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags. In: Proc. of 2nd Workshop on RFID Security (July 2006)Google Scholar
  12. 12.
    Li, Y., Ding, X.: Protecting RFID Communications in Supply Chains. In: ASIACCS 2007: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 234–241. ACM, Singapore (2007)Google Scholar
  13. 13.
    Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to rfid security. In: 17th USENIX Security Symposium, pp. 75–90 (2008)Google Scholar
  14. 14.
    Song, B.: RFID Tag Ownership Transfer. In: Conference on RFID Security (RFIDsec 2008), Budapest, Hungary (July 2008)Google Scholar
  15. 15.
    van Deursen, T., Radomirovic, S.: Attacks on RFID Protocols. Cryptology ePrint Archive: Report 2008/310 (2008)Google Scholar
  16. 16.
    Menascé, D.: Security performance. IEEE Internet Computing 7(03), 84–87 (2003)CrossRefGoogle Scholar
  17. 17.
    Li, X., Zhang, X., Kubricht, S.: Improving memory performance of sorting algorithms. J. Exp. Algorithmics 5, 3 (2000)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Shaoying Cai
    • 1
  • Tieyan Li
    • 2
  • Yingjiu Li
    • 1
  • Robert H. Deng
    • 1
  1. 1.Singapore Management UniversitySingapore
  2. 2.Institute for Infocomm ResearchSingapore

Personalised recommendations