PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Protecting RFID communications in supply chains
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
On Existence Proofs for Multiple RFID Tags
PERSER '06 Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services
Provably Secure Grouping-Proofs for RFID Tags
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Security of an RFID Protocol for Supply Chains
ICEBE '08 Proceedings of the 2008 IEEE International Conference on e-Business Engineering
RFID and Information Security in Supply Chains
MSN '08 Proceedings of the 2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Select-Response Grouping Proof for RFID Tags
ACIIDS '09 Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Application of RFID tags had provided a great convenience in supply chain systems. In this paper, an improved version of Cai et al. protocol which was specifically designed for supply chains application is proposed. The Cai et al. RFID system architecture is modified that includes a batch identifier and a path configuration features in order to accommodate multi-batch operation requirements in supply chain systems. Other important requirements in supply chain systems which had been found in relevant articles are also summarized. In addition, requirements of mutual authentication, missing tag identification, and multi-batch operation ability are investigated. We summarize the vulnerabilities of former protocol and propose a new protocol, which employs an RFID verification scheme, for supply chain systems. Two protocols are presented which included the tags reading protocol with mutual authentication between tags and reader/partner, and the updating protocol (renewing the related secrets). We also modified the handover process and made it more reasonable. The proposed protocol satisfies most of the requirements of supply chain systems and allows multi-batch operation of products. Other merits of our solutions are: collision-free, missing tag identification, and high efficiency. Hence, the overall performance and security of supply chain systems are improved.