Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains

Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.

[1]  Hossam Afifi,et al.  Scalable privacy protecting scheme through distributed RFID tag identification , 2008, AIPACa '08.

[2]  Paolo D'Arco,et al.  An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control , 2011, WISTP.

[3]  Refik Molva,et al.  ROTIV: RFID Ownership Transfer with Issuer Verification , 2010, IACR Cryptol. ePrint Arch..

[4]  Sasa Radomirovic,et al.  Security of an RFID Protocol for Supply Chains , 2008, 2008 IEEE International Conference on e-Business Engineering.

[5]  Serge Vaudenay,et al.  Pathchecker: An RFID application for tracing products in Supply-chains , 2015 .

[6]  Yingjiu Li,et al.  Protecting RFID communications in supply chains , 2007, ASIACCS '07.

[7]  Lingfei Mo,et al.  Dual-reader wireless protocols for dense active RFID identification , 2011, Int. J. Commun. Syst..

[8]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[9]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[10]  George T. Amariucai,et al.  An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID , 2011, RFIDSec.

[11]  Chun-Hee Lee,et al.  Efficient storage scheme and query processing for supply chain management using RFID , 2008, SIGMOD Conference.

[12]  Yanjun Zuo,et al.  RFID-Enabled Logistic Flow Tracing in Supply Chains: Communication, Protocol, and Security , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[13]  Yanjun Zuo,et al.  Survivability Experiment and Attack Characterization for RFID , 2012, IEEE Transactions on Dependable and Secure Computing.

[14]  Chunhua Su,et al.  RFID mutual authentication protocols with universally composable security , 2011 .

[15]  Yanjun Zuo Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[16]  Julien Bringer,et al.  Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function , 2008, SCN.

[17]  Mohammad Dakhilalian,et al.  Cryptanalysis of mCrypton - A lightweight block cipher for security of RFID tags and sensors , 2012, Int. J. Commun. Syst..

[18]  Philippe Oechslin,et al.  Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.

[19]  Kaan Yuksel,et al.  Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications , 2004 .

[20]  Ingrid Verbauwhede,et al.  Hierarchical ECC-Based RFID Authentication Protocol , 2011, RFIDSec.

[21]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  Jinwoo Park,et al.  RFID-based traceability in the supply chain , 2008, Ind. Manag. Data Syst..

[23]  Josep Domingo-Ferrer,et al.  A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation , 2011, RFIDSec.

[24]  Bryan Parno,et al.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.