By Topic

RFID and Information Security in Supply Chains

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Gaurav Kapoor ; Dept. of ISOM, Univ. of Florida, FL ; Wei Zhou ; Selwyn Piramuthu

Information visibility is of paramount importance for effective and efficient operation of supply chains. Although not the sole enabling technological source for information visibility in supply chains, RFID tags naturally allow for its seamless operationalization. RFID tags are notorious on issues related to security/privacy concerns, and these concerns are magnified in a supply chain context where the ownership of any given tag is passed among disparate organizations throughout its lifetime. We consider this scenario from a cryptographic perspective. We consider the literature in this area, identify vulnerabilities in an existing authentication protocol, and suggest modifications that address these vulnerabilities.

Published in:

Mobile Ad-hoc and Sensor Networks, 2008. MSN 2008. The 4th International Conference on

Date of Conference:

10-12 Dec. 2008