A privacy-preserving path-checking solution for RFID-Based supply chains

  • Authors:
  • Wei Xin;Huiping Sun;Tao Yang;Zhi Guan;Zhong Chen

  • Affiliations:
  • Institute of Software, EECS, Peking University, Beijing, China,MoE Key Lab of High Confidence Software Technologies (PKU), China,MoE Key Lab of Network and Software Security Assurance (PKU), China;Institute of Software, EECS, Peking University, Beijing, China,MoE Key Lab of High Confidence Software Technologies (PKU), China,MoE Key Lab of Network and Software Security Assurance (PKU), China;Institute of Software, EECS, Peking University, Beijing, China,MoE Key Lab of High Confidence Software Technologies (PKU), China,MoE Key Lab of Network and Software Security Assurance (PKU), China;Institute of Software, EECS, Peking University, Beijing, China,MoE Key Lab of High Confidence Software Technologies (PKU), China,MoE Key Lab of Network and Software Security Assurance (PKU), China;Institute of Software, EECS, Peking University, Beijing, China,MoE Key Lab of High Confidence Software Technologies (PKU), China,MoE Key Lab of Network and Software Security Assurance (PKU), China

  • Venue:
  • ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we focus on designing of path-checking protocols to verify the valid paths in supply chains. By inputting a valid path, the reader at the check point is able to verify whether the tags have passed through the valid path or not. we propose a path-checking solution based on sequential aggregate message authentication codes. For security and privacy considerations, we add mutual authentication into path-checking protocols. In order to save resources, we use SQUASH as message authentication codes which is considered to be suited for RFID systems. Finally, we do some security and privacy analysis.