Publication Type

Conference Proceeding Article

Version

submittedVersion

Publication Date

4-2009

Abstract

While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few research works have been conducted to address these issues simultaneously. In this paper, we observe the different security requirements in RFID-enabled supply chain environments and differentiate the simplified model into two security levels. Accordingly, dual security modes are properly defined in our RFID setting. In the relatively secure environment, our system is set to the weak security mode, the tagged products can be processed in a highly efficient way. When in the strong security mode, our system guarantees a high level of security, while its efficiency is lower than that in the weak security mode. A set of RFID tag/reader protocols to facilitate the duel security modes are presented. Their security, visibility and efficiency are analyzed and compared with the relevant works.

Discipline

Computer Sciences | Information Security

Research Areas

Cybersecurity

Publication

Information Security and Trust: 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15: Proceedings

First Page

372

Last Page

383

ISBN

9783642008436

Identifier

10.1007/978-3-642-00843-6_32

Publisher

Springer

City or Country

Berlin

Copyright Owner and License

Authors

Additional URL

https://doi.org/10.1007/978-3-642-00843-6_32

Share

COinS