Skip to main content

In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains

  • Chapter
The Secure Information Society

Abstract

Modern RFID implementations leverage competitive business advantages in processing, tracking, and tracing of fast-moving consumer goods. Current implementations suffer from security threats and privacy issues, because RFID technology was not designed for secured data exchange. In emerging global RFID-aided supply chains the need for open interfaces between business partners can be abused to derive business secrets.

We developed an access control mechanisms based on in-memory technology to protect business secrets in real-time. In contrast to traditional access control mechanisms that support only bivalent access rights, our history-based access control derives concrete access rights by analyzing the complete history as well as enforcing latest possible access rights. In-memory technology is the key-enabler to handle the steady increasing query history while keeping response time latency low.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Barthwell, A. G., Barnes, M. C., Leopold, V. R., & Wichelecki, J. L. (2009). National survey on drug use and health. Arlington: Center for Lawful Access and Abuse Deterrence.

    Google Scholar 

  • Beck, M., & Tews, E. (2008). Practical attacks against WEP and WPA. http://dl.aircrack-ng.org/breakingwepandwpa.pdf. Accessed 31 Oct 2011.

  • Bos, J. V. D. (2009). Globalization of the pharmaceutical supply chain: what are the risks?—The FDA’s difficult task. Society of Actur, 61, 24–26.

    Google Scholar 

  • Bovenschulte, M., Gabriel, P., Gaßner, K., & Seidel, U. (2007). RFID: prospectives for Germany—the state of radio frequency identification-based applications and their outlook in national and international markets.

    Google Scholar 

  • EPCglobal Inc. (2007). EPCIS standard 1.0.1. http://www.gs1.org/gsmp/kc/epcglobal/epcis/epcis_1_0_1-standard-20070921.pdf. Accessed 31 Oct 2011.

  • EPCglobal Inc. (2008a). EPCglobal object name service standard 1.0.1. http://www.gs1.org/gsmp/kc/epcglobal/ons/ons_1_0_1-standard-20080529.pdf. Accessed 31 Oct 2011.

  • EPCglobal Inc. (2008b). EPC radio-frequency identity protocols—class-1 generation-2 UHF RFID protocol for communications at 860 MHz—960 MHz—1.2.0. http://www.gs1.org/docs/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf. Accessed 31 Oct 2011.

  • EPCglobal Inc. (2010). Tag data standards 1.5. http://www.gs1.org/gsmp/kc/epcglobal/tds/tds_1_5-standard-20100818.pdf. Accessed 31 Oct. 2011.

  • EPCglobal Inc. (2011). Discovery services standard. http://www.gs1.org/gsmp/kc/epcglobal/discovery. Accessed 31 Oct 2011.

  • European Commission Taxation and Customs Union (2009). Report on EU Customs En-forcement of IP Rights.

    Google Scholar 

  • Food and Drug Administration (2004). Counterfeit Drug Task Force Report.

    Google Scholar 

  • Food and Drug Administration (2005). Counterfeit Drug Task Force Report.

    Google Scholar 

  • Hossein, B. (2006). Handbook of information security. New York: Wiley.

    Google Scholar 

  • Hwang, H., Jung, G., Sohn, K., & Park, S. (2008). A study on MITM vulnerability in wireless network using 802.1X and EAP. In Proceedings of international conference on information science and security. Washington: IEEE Computer Society.

    Google Scholar 

  • International Chamber of Commerce (2004). The fight against piracy and counterfeiting of intellectual property. http://www.iccwbo.org/home/intellectual_property/fight_against_piracy.pdf. Accessed 31 Oct 2011.

  • International Organization for Standardization (2004–2010). ISO/IEC 18000: information technology—radio frequency identification for item management.

    Google Scholar 

  • IP Crime Group (2009). IP Crime Report 2008–2009.

    Google Scholar 

  • James, M. S., Tittel, E., & Chapple, M. (2008). Certified information systems security professional study guide (4th ed.). New York: Wiley.

    Google Scholar 

  • Jones, E. C., & Chung, C. A. (2007). RFID in logistics: a practical introduction. Boca Raton: CRC Press.

    Book  Google Scholar 

  • Juels, A., Rivest, R. L., & Szydlo, M. (2003). The blocker tag: selective blocking of RFID tags for consumer privacy. In Proceedings of the conference on computer and communications security (pp. 103–111). New York: ACM Press.

    Google Scholar 

  • Koscher, K., Juels, A., Brajkovic, V., & Kohno, T. (2009). EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. In Conference on computer and communication security (pp. 33–42). New York: ACM.

    Google Scholar 

  • Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., & Schimmler, M. (2006). Breaking ciphers with COPACOBANA—a cost-optimized parallel code breaker. In Cryptographic hardware and embedded systems (pp. 101–118). Heidelberg: Springer.

    Chapter  Google Scholar 

  • Mehuron, W. (1999). Data encryption standard. Technical report, National Institute of Standards and Technology.

    Google Scholar 

  • Menezes, A. J., Vanstone, S. A., & van Oorschot, P. C. (1996). Handbook of applied cryptography. Boca Raton: CRC Press.

    Book  Google Scholar 

  • Müller, J., Pöpke, C., Urbat, M., Zeier, A., & Plattner, H. (2009a). A simulation of the pharmaceutical supply chain to provide realistic test data. In Proceedings of the international conference on advances in system simulation (pp. 44–49).

    Chapter  Google Scholar 

  • Müller, J., Schapranow, M.-P., Helmich, M., Enderlein, S., & Zeier, A. (2009b). RFID middleware as a service—enabling small and medium-sized enterprises to participate in the EPC network. In International conference on industry engineering and engineering management 2, Beijing: IEEE Computer Society.

    Google Scholar 

  • Plattner, H., & Zeier, A. (2011). In-memory data management. Berlin: Springer.

    Book  Google Scholar 

  • Russell, D., & Gangemi, G. T. (1991). Computer security basics. Sebastopol: O’Reilly & Associates Inc.

    Google Scholar 

  • Schapranow, M.-P., Kühne, R., & Zeier, A. (2010a). Enabling real-time charging for smart grid infrastructures using in-memory databases. In 1st IEEE LCN workshop on smart grid networking infrastructure.

    Google Scholar 

  • Schapranow, M. P., Zeier, A., & Plattner, H. (2010b). A dynamic mutual RFID authentication model preventing unauthorized third party access. Melbourne: IEEE Press.

    Google Scholar 

  • Schapranow, M.-P., Zeier, A., & Plattner, H. (2011). A formal model for enabling RFID in pharmaceutical supply chains. In 44th Hawaii international conference on system sciences.

    Google Scholar 

  • Schlitter, N., Kähne, F., Schilz, S. T., & Mattke, H. (2007). Potentials and problems of RFID-based cooperations in supply chains. In Innovative logistics management: competitive advantages through new processes and services (3rd ed.). Berlin: Erich Schmidt Verlag GmbH & Co.

    Google Scholar 

  • Shukla, N., & Sangal, T. (2009). Generic drug industry in India: the counterfeit spin. Intellect Property Rights, 14, 236–240.

    Google Scholar 

  • Staake, T., Thiesse, F., & Fleisch, E. (2005). Extending the EPC network: the potential of RFID in anti-counterfeiting. In Symposium on applied computing, New York: ACM.

    Google Scholar 

  • Stallings, W. (2005). Cryptography and network security (4th ed.). Upper Saddle River: Prentice Hall.

    Google Scholar 

  • U.S. Pharmaceuticals Pfizer INC (2006). Anti-counterfeit drug initiative workshop and vendor display. http://www.fda.gov/OHRMS/DOCKETS/dockets/05n0510/05N-0510-EC21-Attach-1.pdf. Accessed 31 Oct 2011.

  • Wendt, S. (1991). Nichtphysikalische grundlagen der informationstechnik. Interpretierte formalismen. Berlin: Springer.

    Book  Google Scholar 

  • Werlinger, R., Hawkey, K., Muldner, K., Jaferian, P., & Beznosov, K. (2008). The challenges of using an intrusion detection system: is it worth the effort? In Proceedings of the 4th symposium on usable privacy and security (pp. 107–118). New York: ACM.

    Chapter  Google Scholar 

  • White, G., Prabhakar, G., Abdrazak, A., & Gardiner, G. (2007). A comparison of barcoding and RFID technologies in practice. Journal of information, information technology and organizations, 2.

    Google Scholar 

  • World Health Organization (2009). Warning on purchase of antivirals without a prescription, including via the Internet. http://www.who.int/medicines/publications/drugalerts/Alert_122_Antivirals.pdf. Accessed 31 Oct 2011.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthieu-P. Schapranow .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Schapranow, MP., Plattner, H. (2013). In-Memory Technology Enables History-Based Access Control for RFID-Aided Supply Chains. In: Krüger, J., Nickolay, B., Gaycken, S. (eds) The Secure Information Society. Springer, London. https://doi.org/10.1007/978-1-4471-4763-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4763-3_9

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4762-6

  • Online ISBN: 978-1-4471-4763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics