Security Issues of RFID Technology in Supply Chain Management

Article Preview

Abstract:

RFID can be used to automate and thus streamline identification processes, which means that more checkpoints along the supply chain can be established at decreased costs. Additionally, the technology can provide further benefits which make it superior to the currently widespread automatic identification (Auto-ID) technology of the barcode. However, there are still some security issues in the current RFID technology, which has initially been developed decades ago. In this paper, one RFID protocol for supply chain management RFID protocols has been proposed, and will greatly solve the security issues of the Auto-ID process.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 490-495)

Pages:

2470-2474

Citation:

Online since:

March 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Günthner, W. A., Boppert, J. & Rinza, T. (2005). RFID – Potenziale und Grenzen für die SC-Optimierung. Jahrbuch der Logistik, 2005, 255-259.

Google Scholar

[2] S. Li, J.K. Visich, B.M. Khumawala, and C. Zhang. Radio frequency identication technology: Applications, technical challenges and strategies. Sensor Review, 26.

DOI: 10.1108/02602280610675474

Google Scholar

[3] K. Michael and L. McCathie. The pros and cons of RFID in supply chain management. International Conference on Mobile Business, pages 623-629, (2005).

DOI: 10.1109/icmb.2005.103

Google Scholar

[4] W.J. Stevenson. Operations Management. McGraw-Hill Companies, (2007).

Google Scholar

[5] Y. M. Lee, F. Cheng, and Y. T. Leung. A quantitative view on how RFID will improve a supply chain. Technical report, IBM Research Report, (2005).

Google Scholar

[6] Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications,. Lectures Notes in Computer Science 2523. Berlin: Springer-Verlag, 2003, 454-469.

Google Scholar

[7] Sarma S E, Weis S A, Engels D W. Radio-frequency identification: Secure risks and challenges,. RSA Laboratories Cryptobytes, 2003, 6(1): 2-9.

Google Scholar

[8] Chien H Y, Chen C H. Mutual authentication protocol for RFID conforming to EPC Class1 Generation2 standards,. Computer Standards & Interfaces, Volume 29, Issue 2, February 2006, 254-259.

DOI: 10.1016/j.csi.2006.04.004

Google Scholar

[9] Duc D N, Park J, Lee H. Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning,. Symposium on Cryptography and Information Security, (2006).

Google Scholar

[10] Karthikeyan S, Nesterenko M. RFID security without extensive cryptography,. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, 63-67.

DOI: 10.1145/1102219.1102229

Google Scholar