Achieving high security and efficiency in RFID-tagged supply chains
While RFID technology has greatly facilitated visible supply chain management, designing a secure and efficient RFID-tagged supply chain system is still a challenge. To achieve high security and efficiency at the same time, we categorise RFID-tagged supply chain environments in two security levels and design an RFID-tagged supply chain system accordingly. In the relatively secure environment, our system is set to the weak security mode, and the tagged products can be processed in a highly efficient manner. While in the less secure environment, our system is tuned into the strong security mode so as to maintain a high level of security with its efficiency lower than that in the weak security mode. A set of RFID protocols are designed to enable the duel security modes.
RFID security, supply chain security, visibility, supply chain efficiency, RFID protocols, supply chain management, SCM, radio freqeuency identification, RFID tags, information security
Information Security and Trust
International Journal of Applied Cryptography
CAI, Shaoying; LI, Yingjiu; LI, Tieyan; DENG, Robert H.; and Yao, Haixia.
Achieving high security and efficiency in RFID-tagged supply chains. (2010). International Journal of Applied Cryptography. 2, (2), 3-12. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/632