RFID-enabled supply chain detection using clustering algorithms

Radio frequencies refer to the electromagnetic energy that we transmit the identification information from tags to its reader. Radio Frequency Identification (RFID) transmits the data without line of sight. RFID tags are small, wireless devices that help identify item automatically and indicating unique serial number for each item. However, counterfeiting in supply chain management likes cloned and fraud RFID tag bring the impact to the organization and social when attackers want to gain illegal benefits. Organizationsarelosing a lot of money and trust from userswhen counterfeiting occurred. Furthermore, RFID data nature characteristics faces the issues likes RFID just carry simple information, in-flood of data, inaccuracy data from RFID readers and difficulties to track spatial and place. We propose to use clustering algorithms in order to detect counterfeit in supply chain management. We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. Based on evaluation that have done, we found that Farthest First is the best algorithm for 1000 (small data) and 10000 (bigger data). However, the values of false negative in data still quite high and it is dangerous if RFID scanner misread the cloned or fraud tags become genuine tags. Hence, we applied cost algorithms to reduce false negative values.

[1]  M. Singh RFID-enabled Supply Chain Simulator for Counterfeiting Attack Detection , 2014 .

[2]  Diego Klabjan,et al.  Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[3]  Diego Klabjan,et al.  Warehousing and Mining Massive RFID Data Sets , 2006, ADMA.

[4]  B. Efron The Efficiency of Cox's Likelihood Function for Censored Data , 1977 .

[5]  Ian Witten,et al.  Data Mining , 2000 .

[6]  J. Townsend Theoretical analysis of an alphabetic confusion matrix , 1971 .

[7]  Yahia Zare Mehrjerdi,et al.  RFID‐enabled supply chain systems with computer simulation , 2009 .

[8]  Jacky Hartnett,et al.  Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .

[9]  Xue Li,et al.  Counterfeiting Detection in RFID-enabled Supply Chain , 2013, IOT 2013.

[10]  Xue Li,et al.  RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.

[11]  A. Rubinov,et al.  Unsupervised and supervised data classification via nonsmooth and global optimization , 2003 .

[12]  Xue Li,et al.  A Cost-based Model for Risk Management in RFID-Enabled Supply Chain Applications , 2011 .

[13]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[14]  Charles Elkan,et al.  Expectation Maximization Algorithm , 2010, Encyclopedia of Machine Learning.

[15]  Jian Huang,et al.  An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[16]  ChiaCheng Chao,et al.  Determining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005 , 2007 .

[17]  Katina Michael,et al.  The pros and cons of RFID in supply chain management , 2005, International Conference on Mobile Business (ICMB'05).

[18]  Elgar Fleisch,et al.  Probabilistic Approach for Location-Based Authentication , 2007 .

[19]  Manmeet Mahinderjit Singh,et al.  Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.

[20]  Manmeet Mahinderjit Singh,et al.  Security and privacy protection in RFID-enabled supply chain management , 2011, Int. J. Radio Freq. Identif. Technol. Appl..

[21]  Narendra Sharma,et al.  Comparison the various clustering algorithms of weka tools , 2012 .