Tamper detection in RFID-enabled supply chains using fragile watermarking

被引:0
|
作者
ShuiHua Han [1 ,2 ]
Chu, Chao-Hsien [3 ]
机构
[1] Xiamen Univ, Sch Management, Fujian, Peoples R China
[2] Penn State Univ, University Pk, PA USA
[3] Penn State Univ, Coll Informat Sci Technol, RFID Lab, University Pk, PA 16802 USA
来源
2008 IEEE INTERNATIONAL CONFERENCE ON RFID | 2008年
关键词
RFID-enabled supply chains; tamper detection; fragile watermarking;
D O I
10.1109/RFID.2008.4519341
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
While mainstream RFID research has been focused on solving privacy issues, security in general and data tampering in specific is still an open question. This paper analyzes potential security threats especially data tampering in RFID-enabled supply chains and proposes solutions how these threats might be addressed using fragile watermarking technologies. We first survey RFID system and its security problems, and then explain the importance of fragile watermarking schemes for RFID systems and possible applications using fragile watermarking to detect and locate any modification in RFID systems. Finally we suggest possible solutions using fragile watermarking for RFID-enabled supply chain.
引用
收藏
页码:111 / +
页数:2
相关论文
共 50 条
  • [1] Tamper detection for ubiquitous RFID-enabled supply chain
    Potdar, V
    Wu, C
    Chang, E
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 273 - 278
  • [2] Tamper detection in RFID tags using fragile watermarking
    Potdar, Vidyasagar
    Chang, Elizabeth
    2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, 2006, : 3026 - +
  • [3] Fragile Watermarking for Tamper Detection in RFID Tag using Arnold Transform
    Patil, Kishor T.
    Patil, Deepali K.
    Narayankhedkar, Santosh K.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [4] Identifying Discrepant Tags in RFID-enabled Supply Chains
    Gu, Caidong
    Gong, Wei
    Nayak, Amiya
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 162 - 173
  • [5] RFID-Enabled Supply Chain Detection Using Clustering Algorithms
    FarahinAzahar, Teh
    Mahinderjit-Singh, Manmeet
    Hassan, Rohail
    ACM IMCOM 2015, PROCEEDINGS, 2015,
  • [6] A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains
    Xie, Xin
    Liu, Xiulong
    Guo, Song
    Qi, Heng
    Li, Keqiu
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [7] Semantic access control model for RFID-enabled supply chains
    Li Z.
    Chu C.-H.
    Yao W.
    Cryptology and Information Security Series, 2010, 4 : 95 - 108
  • [8] Understanding data volume problems of RFID-enabled supply chains
    Ilic, Alexander
    Groessbauer, Andrea
    Michahelles, Florian
    Fleisch, Elgar
    BUSINESS PROCESS MANAGEMENT JOURNAL, 2010, 16 (06) : 904 - 916
  • [9] Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
    Cai, Shaoying
    Li, Yingjiu
    Zhao, Yunlei
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 501 - 512
  • [10] Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains
    Abughazalah, Sarah
    Markantonakis, Kostantinos
    Mayes, Keith
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 871 - 878