Skip to main content

Varying Levels of RFID Tag Ownership in Supply Chains

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7046))

Abstract

RFID-tagged items in a supply chain experience different types of ownerships, often simultaneously, throughout their lifetime. We consider scenarios related to ownership of RFID tags in a supply chain, specifically the seamless incorporation of third party logistics provider. We develop protocol for authentication of RFID-tagged items under such conditions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  2. Desmedt, Y.: Major Security Problems with the ‘Unforgeable’ (Feige)-Fiat-Shamir Proofs of Identity and How to Overcome Them. In: Proceedings of the Securicom 1988, 6th Worldwide Congress on Computer and Communications Security and Protection, pp. 147–159 (1988)

    Google Scholar 

  3. Hering, J.: The BlueSniper ‘rifle,’ presented at 12th DEFCON, Las Vegas (2004)

    Google Scholar 

  4. Juels, A.: Yoking-Proofs for RFID Tags. In: Proceedings of the First International Workshop on Pervasive Computing and Communication Security (PerSec), pp. 138–143. IEEE Press (2004)

    Google Scholar 

  5. Kfir, Z., Wool, A.: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. In: Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 47–58 (2005)

    Google Scholar 

  6. Piramuthu, S.: RFID Mutual Authentication Protocols. Decision Support Systems 50(2), 387–393 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, W., Yoon, E.J., Piramuthu, S. (2011). Varying Levels of RFID Tag Ownership in Supply Chains. In: Meersman, R., Dillon, T., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2011 Workshops. OTM 2011. Lecture Notes in Computer Science, vol 7046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25126-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25126-9_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25125-2

  • Online ISBN: 978-3-642-25126-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics