Title: Security and privacy protection in RFID-enabled supply chain management

Authors: Manmeet Mahinderjit Singh; Xue Li; Zhanhuai Li

Addresses: School of Information Technology and Electrical Engineering, University of Queensland, Brisbane 4072, Australia. ' School of Information Technology and Electrical Engineering, University of Queensland, Brisbane 4072, Australia. ' School of Computer Science and Technology, Northwestern Polytechnical University, Shaanxi, China

Abstract: Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and security concerns in part because humans cannot sense the radio frequency radiation used to read tags and the tags themselves maintain no history of past readings. Counterfeiting in the form of cloned or fraudulent RFID tags is a consequence of a lack of security measures and trust among the partners when RFID technology is used to automate their business transactions. This paper discusses the ways in which privacy and security protection can be maintained in an open-loop RFID supply chain. A cost-based detection of counterfeit tags using different classifiers is presented.

Keywords: SCM; supply chain management; privacy protection; security; cloning; radio frequency identification; trust; supply chain collaboration; counterfeit tags; RFID tags.

DOI: 10.1504/IJRFITA.2011.043738

International Journal of Radio Frequency Identification Technology and Applications, 2011 Vol.3 No.4, pp.294 - 318

Available online: 15 Nov 2011 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article