Font Size: a A A

Building secure and practical RFID-enabled supply chain systems

Posted on:2015-12-31Degree:Ph.DType:Thesis
University:Hong Kong University of Science and Technology (Hong Kong)Candidate:Qi, SaiyuFull Text:PDF
GTID:2478390017496569Subject:Computer Science
Abstract/Summary:
Radio Frequency Identification (RFID) technique is the adoption of radio waves tostore and capture information stored on tags attached to items. RFID technique has beenexpected to improve supply chain visibility and found to be effective in various supplychain operations. However, the deployment of RFID in a supply chain also raises privacyand security requirements, which if not well resolved, may hinder its broad applicability.Indeed, RFID tags usually lack protection mechanism due to cost consideration and canbe associated to sensitive product data. In this thesis, we analyze the applicability of RFID technique in three critical supplychain operations including batch recall, anti-counterfeiting and product data sharing withessential concern on the security aspect. We devise a series of RFID-enabled security andprivacy mechanisms for the three operations to guarantee the concerned security requirements. Specifically, We design a distributed secure batch recall protocol to recall batchesof problematic products from a large number of customers which guarantees functionality,security and efficiency requirements simultaneously. We present a bidirectional efficiency-privacy transferable authentication protocol for supply chain participants to authenticateRFID tags, that support adjustable balance between authentication privacy and authentication efficiency. We propose a security-enhanced variant of RFID-enabled Third-partySupply chain (RTS) system for the three involved supply chain participants to transferbatches of tagged products, with two security guarantees, namely batch privacy and batchnon-repudiation, for the tag carried data. We devise a scalable security system for sharingsensitive product data among supply chain participants through a service provider, thatsupport item-level data access control and revocation.
Keywords/Search Tags:Supply chain, RFID, Product data, Rfid-enabled
Related items