Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few res...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/273 https://ink.library.smu.edu.sg/context/sis_research/article/1272/viewcontent/ensuring_dual_security_modes_in_rfid_enabled_supply_chain_systems.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1272 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-12722019-01-02T08:08:59Z Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems CAI, Shaoying LI, Tieyan LI, Yingjiu DENG, Robert H. While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few research works have been conducted to address these issues simultaneously. In this paper, we observe the different security requirements in RFID-enabled supply chain environments and differentiate the simplified model into two security levels. Accordingly, dual security modes are properly defined in our RFID setting. In the relatively secure environment, our system is set to the weak security mode, the tagged products can be processed in a highly efficient way. When in the strong security mode, our system guarantees a high level of security, while its efficiency is lower than that in the weak security mode. A set of RFID tag/reader protocols to facilitate the duel security modes are presented. Their security, visibility and efficiency are analyzed and compared with the relevant works. 2009-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/273 info:doi/10.1007/978-3-642-00843-6_32 https://ink.library.smu.edu.sg/context/sis_research/article/1272/viewcontent/ensuring_dual_security_modes_in_rfid_enabled_supply_chain_systems.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Computer Sciences Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Computer Sciences Information Security |
spellingShingle |
Computer Sciences Information Security CAI, Shaoying LI, Tieyan LI, Yingjiu DENG, Robert H. Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems |
description |
While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few research works have been conducted to address these issues simultaneously. In this paper, we observe the different security requirements in RFID-enabled supply chain environments and differentiate the simplified model into two security levels. Accordingly, dual security modes are properly defined in our RFID setting. In the relatively secure environment, our system is set to the weak security mode, the tagged products can be processed in a highly efficient way. When in the strong security mode, our system guarantees a high level of security, while its efficiency is lower than that in the weak security mode. A set of RFID tag/reader protocols to facilitate the duel security modes are presented. Their security, visibility and efficiency are analyzed and compared with the relevant works. |
format |
text |
author |
CAI, Shaoying LI, Tieyan LI, Yingjiu DENG, Robert H. |
author_facet |
CAI, Shaoying LI, Tieyan LI, Yingjiu DENG, Robert H. |
author_sort |
CAI, Shaoying |
title |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems |
title_short |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems |
title_full |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems |
title_fullStr |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems |
title_full_unstemmed |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems |
title_sort |
ensuring dual security modes in rfid-enabled supply chain systems |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2009 |
url |
https://ink.library.smu.edu.sg/sis_research/273 https://ink.library.smu.edu.sg/context/sis_research/article/1272/viewcontent/ensuring_dual_security_modes_in_rfid_enabled_supply_chain_systems.pdf |
_version_ |
1770570366965514240 |