Hierarchical RFID tag ownership and transfer in supply chains

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A majority of RFID tag applications are related to tracking and tracing of the RFID-tagged items throughout supply chains. Tracking and tracing require communication with the tag to identify and authenticate the tag. While identification can be readily accomplished in the absence of adversaries, identification and authentication in the presence of adversaries is not a trivial task. This process is exacerbated when the tagged item transfers ownership as it passes through a supply chain. Recent developments in cryptography facilitates accomplishing these in a seamless manner. We consider a specific scenario in supply chains where ownership of RFID-tagged items follow a hierarchical relationship. We present an ownership transfer protocol for this scenario and briefly consider its security properties. The proposed protocol can be used to seamlessly manage hierarchical ownership transfers in supply chains. © 2012 Springer-Verlag Berlin Heidelberg.

Author supplied keywords

Cite

CITATION STYLE

APA

Zhou, W., Yoon, E. J., & Piramuthu, S. (2012). Hierarchical RFID tag ownership and transfer in supply chains. In Lecture Notes in Business Information Processing (Vol. 108 LNBIP, pp. 390–398). Springer Verlag. https://doi.org/10.1007/978-3-642-29873-8_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free