Computational model for trust management in RFID supply chains

Trust management in an open RFID system environment is a nontrivial problem, where different organizations have different business workflows and operate on different standards and protocols. Open RFID systems can only be effective if the systems can trust each other and be collaborative. The open system environment is also constantly evolving. So the trust and the collaborations need to be constantly maintained to cope with changes. RFID is becoming a ubiquitous computing technology imposing security and privacy threats. Counterfeiting in supply chain management is an attack with cloned and fraud RFID tags in order to gain illegal benefits. In this paper we will extend our previous work on a trust framework and construct a computational model for the trust management. The trust evaluation is built into the process of transactions of the data exchange and authorization in order to facilitate a better data sharing and access control. An example of wine counterfeiting will be presented and we will show how our computational trust model helps in reducing fraud brand of wines in supply chain management (SCM).

[1]  Vijay Varadharajan,et al.  A Hybrid Trust Model for Enhancing Security in Distributed Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[2]  Mohammad Zulkernine,et al.  A Trust Framework for Pervasive Computing Environments , 2006, IEEE International Conference on Computer Systems and Applications, 2006..

[3]  Yunwei Xin,et al.  A Trust Framework for Pervasive Computing Environments , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[4]  Jian Huang,et al.  An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[5]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Xue Li,et al.  RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.

[7]  Zhibin Zhou,et al.  RFID Keeper: An RFID Data Access Control Mechanism , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[8]  Dong Hoon Lee,et al.  Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.

[9]  S. H. Choi,et al.  An RFID-based Anti-counterfeiting System , 2008 .

[10]  Florian Michahelles,et al.  Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.

[11]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[12]  Mikko Lehtonen,et al.  From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .

[13]  Mike Burmester,et al.  RFID Security : Attacks , Countermeasures and Challenges , 2007 .

[14]  Manmeet Mahinderjit Singh,et al.  Trust Framework for RFID Tracking in Supply Chain Management , 2009, IWRT.

[15]  Dong Seong Kim,et al.  Access Control and Authorization for Security of RFID Multi-Domain Using SAML and XACML , 2006, 2006 International Conference on Computational Intelligence and Security.

[16]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[17]  Damith C. Ranasinghe,et al.  EPC Network Architecture , 2008 .