Distributed Group Authentication for RFID Supply Management

نویسندگان

  • Mike Burmester
  • Jorge Munilla
چکیده

We investigate an application of Radio Frequency Identification (RFID) referred to in the literature as group scanning, in which an RFID reader device interrogates several RFID tags to establish “simultaneous” presence of a group of tags. Our goal is to study the group scanning problem in strong adversarial settings and show how group scanning can be used in distributed applications for supply chain management. We present a security framework for group scanning and give a formal description of the attending security requirements. Our model is based on the Universal Composability framework and supports re-usability (through modularity of security guarantees). We propose two novel protocols that realize group scanning in this security model, based on off-the-shelf components such as low-cost (highly optimized) pseudorandom functions, and show how these can be integrated into RFID supply-chain management systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our s...

متن کامل

Rfid Technology in Supply Chain Management: State of the Art and Perspectives

This paper provides a state of the art on RFID technology in Supply chain management. It presents technical characteristics of existing RFID systems, a guideline for RFID deployment, and some applications in Supply chains. The paper summarizes the advantages of RFID technology for inventory control and introduces some challenging problems and perspectives dealing with, in particular, privacy an...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Identifying the Factors of Cost Issues in Development of Radio Frequency Identification Technology in Supply Chain Management

RFID has lots of potential benefits for supply chain management; that`s why it has attracted many industry practitioners all around the world, especially in recent years. RFID is one of the key solutions that information technology has provided for industry. The main issue in implementing and also developing this unique technology in the supply chain management of every industry appears to be t...

متن کامل

PAP: A privacy and authentication protocol for passive RFID tags

Passive Radio Frequency Identification (RFID) tags, due to their ability to uniquely identify every individual item and low cost, are well suited for supply chain management and are expected to replace barcodes in the near future. However, unlike barcodes, these tags have a longer range in which they are allowed to be scanned, subjecting them to unauthorized scanning by malicious readers and to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013