RFID-based supply chain partner authentication and key agreement

F Kerschbaum, A Sorniotti - Proceedings of the second ACM conference …, 2009 - dl.acm.org
The growing use of RFID in supply chains brings along an indisputable added value from
the business perspective, but raises a number of new interesting security challenges. One of …

Protecting RFID communications in supply chains

Y Li, X Ding - Proceedings of the 2nd ACM symposium on …, 2007 - dl.acm.org
Recent years have seen much growing attention on RFID security. However, little work has
been performed to address the security issues in the context of supply chain management …

Every step you take, i'll be watching you: Practical stepauth-entication of RFID paths

K Bu, Y Li - IEEE Transactions on Information Forensics and …, 2017 - ieeexplore.ieee.org
Path authentication thwarts counterfeits in RFID-based supply chains. Its motivation is that
tagged products taking invalid paths are likely faked and injected by adversaries at certain …

Secure and practical key distribution for RFID-enabled supply chains

T Li, Y Li, G Wang - Security and Privacy in Communication Networks: 7th …, 2012 - Springer
In this paper, we present a fine-grained view of an RFID-enabled supply chain and tackle
the secure key distribution problem on a peer-to-peer base. In our model, we focus on any …

A new framework for privacy of RFID path authentication

S Cai, RH Deng, Y Li, Y Zhao - … , ACNS 2012, Singapore, June 26-29 …, 2012 - Springer
RFID-based path authentication enables supply chain managers to verify the exact path that
a tag has taken. In this paper, we introduce a new oracle Move that models a tag's …

RFID and information security in supply chains

G Kapoor, W Zhou, S Piramuthu - 2008 The 4th International …, 2008 - ieeexplore.ieee.org
Information visibility is of paramount importance for effective and efficient operation of supply
chains. Although not the sole enabling technological source for information visibility in …

Security of an RFID protocol for supply chains

T van Deursen, S Radomirovic - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
We report on the security claims of an RFID authentication protocol by Li and Ding which
was specifically designed for use in supply chains. We show how the protocol's …

ROTIV: RFID ownership transfer with issuer verification

K Elkhiyaoui, EO Blass, R Molva - … , RFIDSec 2011, Amherst, USA, June 26 …, 2012 - Springer
RFID tags travel between partner sites in a supply chain. For privacy reasons, each partner
owns the tags present at his site, ie, the owner is the only entity able to authenticate his tags …

Efficient RFID authentication scheme for supply chain applications

F Bi, Y Mu - 2010 IEEE/IFIP International Conference on …, 2010 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) technology has been widely used in supply chains to
track and manage shipments. By tagging shipments with RFID tags, which can be remotely …

RFID security without extensive cryptography

S Karthikeyan, M Nesterenko - Proceedings of the 3rd ACM workshop …, 2005 - dl.acm.org
A Radio Frequency Identification Device (RFID) allows effective identification of a large
number of tagged objects without physical or visual contact. RFID systems are a promising …