A privacy-preserving path-checking solution for RFID-based supply chains

2Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we focus on designing of path-checking protocols to verify the valid paths in supply chains. By inputting a valid path, the reader at the check point is able to verify whether the tags have passed through the valid path or not. we propose a path-checking solution based on sequential aggregate message authentication codes. For security and privacy considerations, we add mutual authentication into path-checking protocols. In order to save resources, we use SQUASH as message authentication codes which is considered to be suited for RFID systems. Finally, we do some security and privacy analysis. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Xin, W., Sun, H., Yang, T., Guan, Z., & Chen, Z. (2012). A privacy-preserving path-checking solution for RFID-based supply chains. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7618 LNCS, pp. 400–407). Springer Verlag. https://doi.org/10.1007/978-3-642-34129-8_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free