Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems

While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few res...

Full description

Saved in:
Bibliographic Details
Main Authors: CAI, Shaoying, LI, Tieyan, LI, Yingjiu, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/273
https://ink.library.smu.edu.sg/context/sis_research/article/1272/viewcontent/ensuring_dual_security_modes_in_rfid_enabled_supply_chain_systems.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1272
record_format dspace
spelling sg-smu-ink.sis_research-12722019-01-02T08:08:59Z Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems CAI, Shaoying LI, Tieyan LI, Yingjiu DENG, Robert H. While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few research works have been conducted to address these issues simultaneously. In this paper, we observe the different security requirements in RFID-enabled supply chain environments and differentiate the simplified model into two security levels. Accordingly, dual security modes are properly defined in our RFID setting. In the relatively secure environment, our system is set to the weak security mode, the tagged products can be processed in a highly efficient way. When in the strong security mode, our system guarantees a high level of security, while its efficiency is lower than that in the weak security mode. A set of RFID tag/reader protocols to facilitate the duel security modes are presented. Their security, visibility and efficiency are analyzed and compared with the relevant works. 2009-04-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/273 info:doi/10.1007/978-3-642-00843-6_32 https://ink.library.smu.edu.sg/context/sis_research/article/1272/viewcontent/ensuring_dual_security_modes_in_rfid_enabled_supply_chain_systems.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Computer Sciences Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Computer Sciences
Information Security
spellingShingle Computer Sciences
Information Security
CAI, Shaoying
LI, Tieyan
LI, Yingjiu
DENG, Robert H.
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
description While RFID technology has greatly facilitated the supply chain management, designing a secure, visible, and efficient RFID- enabled supply chain system is still a challenge since the three equally important requirements (i.e., security, visibility, and efficiency) may conflict to each other. Few research works have been conducted to address these issues simultaneously. In this paper, we observe the different security requirements in RFID-enabled supply chain environments and differentiate the simplified model into two security levels. Accordingly, dual security modes are properly defined in our RFID setting. In the relatively secure environment, our system is set to the weak security mode, the tagged products can be processed in a highly efficient way. When in the strong security mode, our system guarantees a high level of security, while its efficiency is lower than that in the weak security mode. A set of RFID tag/reader protocols to facilitate the duel security modes are presented. Their security, visibility and efficiency are analyzed and compared with the relevant works.
format text
author CAI, Shaoying
LI, Tieyan
LI, Yingjiu
DENG, Robert H.
author_facet CAI, Shaoying
LI, Tieyan
LI, Yingjiu
DENG, Robert H.
author_sort CAI, Shaoying
title Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
title_short Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
title_full Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
title_fullStr Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
title_full_unstemmed Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
title_sort ensuring dual security modes in rfid-enabled supply chain systems
publisher Institutional Knowledge at Singapore Management University
publishDate 2009
url https://ink.library.smu.edu.sg/sis_research/273
https://ink.library.smu.edu.sg/context/sis_research/article/1272/viewcontent/ensuring_dual_security_modes_in_rfid_enabled_supply_chain_systems.pdf
_version_ 1770570366965514240