The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) is a kind of the automatic identification technology which identifies an object by radio frequency mode for non-contact bidirectional data communication. It has been applied in many industries such as supply chain management, retail management, logistics management, security supervising, traffic supervising, and so on. This paper firstly introduces the principle...
Supply-chain RFID systems introduce significant privacy issues to consumers, making it necessary to encrypt communications. Because the resources available on tags are very small, it is generally assumed that only symmetric-key cryptography can be used in such systems. Unfortunately, symmetric-key cryptography imposes negative trust issues between the various stake-holders, and risks compromising...
Safety is one of the most important issues of communication systems, especially for wireless communication systems which use insecure wireless channel to communicate with each other. In RFID systems, data transmission between tags and readers or sometimes even data transmission between readers and back-end database uses the wireless channel. There are some risks inherent in RFID systems, such as counterfeit...
The use of RFID tags allows many new approaches to the old problems of supply chain control and product anti-counterfeiting. Many of the schemes suggested to-date do not adequately meet the needs of the supply chain industry. Some require unjustifiable expense or performance and resilience issues, while others face deployment barriers where the party that deploys the technology is not the party the...
In a supply chain network, having up-to-date and prompt information is very crucial for minimizing, the bullwhip effect, inventory cost, out of stocks and time/cost of information sharing. Supply chain management is highly involved and complex process involving collaboration and information sharing between distributed partners. With the advent of RFID and new Internet technologies, supply chain management...
The resolution of emergency crises and natural disasters is heavily dependent, among other things, on efficient supply chain management to bring the necessary material to the first time responders. The supply chain used in the resolution of emergency crises must have capabilities of agility and flexibility to respond to the challenges, which are typical of these scenarios. Emergency crises are often...
Recent years have seen much growing attention on RFID security. However, little work has been performed to address the security issues in the context of supply chain management, which is exactly the major field for RFID applications. In this paper, we take first step toward security and privacy management in such system. We here introduce the formal concept of traceability networks, identify the unique...
Radio frequency identification's use in retail is good for pervasive computing, but raises considerable privacy issues. OpenTag programmable tags address privacy issues while remaining fully compatible with the supply-chain RFID standard.
The paper introduces the structure of the EPC network, analyzes the potential security problems of the EPC network information service (EPCIS). Expatiates the light PKI EPCIS trust model based on PKI, the proposed light PKI trust architecture is much simpler and efficient. Put forward a based on the enterprise trust and collaboration model (ETCM) and the search algorithm of the trust corporate relations...
We report on the security claims of an RFID authentication protocol by Li and Ding which was specifically designed for use in supply chains. We show how the protocol's vulnerabilities can be used to track products, relate incoming and outgoing products, and extort supply chain partners. Starting from a discussion of the relevant security requirements for RFID protocols in supply chains, we proceed...
The following topics are dealt with: context aware and location based services; emerging mobile technologies; mobile business models; mobile commerce in Asia; mobile consumer services; mobile enterprise and workforce; mobile payments and financial services; RFID and mobile supply chain management; mobile healthcare; privacy and security.
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) while simultaneously supporting privacy. In this paper we discuss how RFID can be applied to increase integrity in the pharmaceutical supply chain. A secured pharmaceutical supply chain will increase integrity, improve consumer...
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items as smart labels. A typical scenario of exploiting RFID is supply chain. The RFID based supply chain management yields convenience, efficiency and productivity gains. However, RFID systems create new risks to security and privacy. We briefly present the current solutions to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.