An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels
نویسندگان
چکیده
منابع مشابه
An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels †
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these ...
متن کاملRFID Ownership Transfer with Positive Secrecy Capacity Channels
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement t...
متن کاملSome Unresolved Concerns & Future Directions for Resilient RFID Smart Structures in the Supply Chain
Smart structures are highly interconnected adaptive systems that are coordinated by cyber systems to optimize specific system objectives. To capture realistic IoT scenarios we must employ threat models that allow untrusted behavior and address system vulnerabilities, exploits and attack vectors. Resilience is defined in terms of stability, resistance to damage and self-healing. In this paper we...
متن کاملAn Improved Ownership Transfer for RFID Protocol
The ownership transfer problems occur during using the RFID tag. In view of the problems of the RFID tag ownership transfer protocol, such as security defects and high computational cost, an improved lightweight RFID tag ownership transfer protocol is proposed in this paper. The improved protocol does not depend on the trusted third party, so that the improved protocol has a wider application s...
متن کاملRFID Tag Ownership Transfer
In some applications, the bearer of a radio frequency identification (RFID) tag might change, with corresponding changes required in the RFID system infrastructure. We survey the security requirements for RFID tag ownership transfer, and propose novel authentication protocols for tag ownership and authorisation transfer. The proposed protocols satisfy most of the requirements that we present, a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2017
ISSN: 1424-8220
DOI: 10.3390/s17071562