A novel means to address RFID tag/item separation in supply chains

Abstract Automated identifiers such as barcodes and RFID (Radio-Frequency IDentification) tags help with the quick identification of their associated items. When such an identifier is associated with an item, it is generally assumed that these two entities (the identifier and the tagged item) remain inseparable as long as is necessary. However, unintentional or (dishonest party initiated) intentional tag separation may occur, which necessitates an appropriate response before damage is done. We develop a knowledge-based means with cryptography to identify RFID tag damage and/or separation from its associated object. We also consider related security/privacy aspects of the proposed method.

[1]  Selwyn Piramuthu,et al.  Protocols for RFID tag/reader authentication , 2007, Decis. Support Syst..

[2]  Fan Yu-shun An Approach to Testing Trustworthiness of Web Services , 2008 .

[3]  Xitong Li,et al.  Could Deal Promotion Improve Merchants’ Online Reputations? The Moderating Role of Prior Reviews , 2016, J. Manag. Inf. Syst..

[4]  Selwyn Piramuthu,et al.  RFID in highly perishable food supply chains – Remaining shelf life to supplant expiry date? , 2013 .

[5]  Selwyn Piramuthu,et al.  Preventing ticket-switching of RFID-tagged items in apparel retail stores , 2013, Decis. Support Syst..

[6]  Selwyn Piramuthu,et al.  Effect of ticket-switching on inventory and shelf-space allocation , 2015, Decis. Support Syst..

[7]  Tony Yu-Ju Tu,et al.  Lightweight non-distance-bounding means to address RFID relay attacks , 2017, Decis. Support Syst..

[8]  G. Marrocco,et al.  Sub-Millimeter Displacement Sensing by Passive UHF RFID Antennas , 2014, IEEE Transactions on Antennas and Propagation.

[9]  Selwyn Piramuthu,et al.  Should retail stores also RFID-tag 'cheap' items? , 2014, Eur. J. Oper. Res..

[10]  Victor C. M. Leung,et al.  Multidimensional context-aware social network architecture for mobile crowdsensing , 2014, IEEE Communications Magazine.

[11]  Indranil Bose,et al.  Facing the Challenges of RFID Data Management , 2008, Int. J. Inf. Syst. Supply Chain Manag..

[12]  Selwyn Piramuthu,et al.  Identification shrinkage in inventory management: an RFID-based solution , 2017, Ann. Oper. Res..

[13]  Pascal Urien,et al.  Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks , 2014, Decis. Support Syst..

[14]  Joshua R. Smith,et al.  Battery-free wireless identification and sensing , 2005, IEEE Pervasive Computing.

[15]  Xi Chen,et al.  A framework for context sensitive services: A knowledge discovery based approach , 2009, Decis. Support Syst..

[16]  Tony Yu-Ju Tu,et al.  RFID-enabled item-level retail pricing , 2009, Decis. Support Syst..

[17]  Selwyn Piramuthu,et al.  Effects of ticket-switching on inventory management: Actual vs. information system-based data , 2015, Decis. Support Syst..

[18]  Tony Yu-Ju Tu,et al.  Identifying RFID-embedded objects in pervasive healthcare applications , 2009, Decis. Support Syst..

[19]  Wei Zhou,et al.  RFID and item-level information visibility , 2009, Eur. J. Oper. Res..

[20]  Indranil Bose,et al.  The Green Potential of RFID Projects: A Case-Based Analysis , 2011, IT Professional.

[21]  Jay Singh,et al.  An evaluation of the ability of RFID tags to withstand distribution of fresh produce in the RPC pooling system , 2010 .

[22]  Selwyn Piramuthu,et al.  On sensor-based solutions for simultaneous presence of multiple RFID tags , 2017, Decis. Support Syst..