Authors: Manmeet Mahinderjit Singh; Xue Li; Zhanhuai Li
Addresses: School of Information Technology and Electrical Engineering, University of Queensland, Brisbane 4072, Australia. ' School of Information Technology and Electrical Engineering, University of Queensland, Brisbane 4072, Australia. ' School of Computer Science and Technology, Northwestern Polytechnical University, Shaanxi, China
Abstract: Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and security concerns in part because humans cannot sense the radio frequency radiation used to read tags and the tags themselves maintain no history of past readings. Counterfeiting in the form of cloned or fraudulent RFID tags is a consequence of a lack of security measures and trust among the partners when RFID technology is used to automate their business transactions. This paper discusses the ways in which privacy and security protection can be maintained in an open-loop RFID supply chain. A cost-based detection of counterfeit tags using different classifiers is presented.
Keywords: SCM; supply chain management; privacy protection; security; cloning; radio frequency identification; trust; supply chain collaboration; counterfeit tags; RFID tags.
International Journal of Radio Frequency Identification Technology and Applications, 2011 Vol.3 No.4, pp.294 - 318
Available online: 15 Nov 2011 *Full-text access for editors Access for subscribers Purchase this article Comment on this article