Hierarchical RFID Tag Ownership and Transfer in Supply Chains

A majority of RFID tag applications are related to tracking and tracing of the RFID-tagged items throughout supply chains. Tracking and tracing require communication with the tag to identify and authenticate the tag. While identification can be readily accomplished in the absence of adversaries, identification and authentication in the presence of adversaries is not a trivial task. This process is exacerbated when the tagged item transfers ownership as it passes through a supply chain. Recent developments in cryptography facilitates accomplishing these in a seamless manner. We consider a specific scenario in supply chains where ownership of RFID-tagged items follow a hierarchical relationship. We present an ownership transfer protocol for this scenario and briefly consider its security properties. The proposed protocol can be used to seamlessly manage hierarchical ownership transfers in supply chains.

[1]  Tor Helleseth,et al.  Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.

[2]  Selwyn Piramuthu,et al.  Adaptive knowledge-based system for health care applications with RFID-generated information , 2011, Decis. Support Syst..

[3]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[4]  Selwyn Piramuthu,et al.  Single RFID Tag Ownership Transfer Protocols , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[5]  Selwyn Piramuthu,et al.  Multi-tag and multi-owner RFID ownership transfer in supply chains , 2011, Decis. Support Syst..

[6]  Selwyn Piramuthu,et al.  RFID mutual authentication protocols , 2011, Decis. Support Syst..

[7]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[8]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.