2014 28th International Conference on Advanced Information Networking and Applications Workshops 2014
DOI: 10.1109/waina.2014.135
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

Abstract: Abstract-In this paper, we point out the use of secret sharing strategies as a promising solution for managing the key distribution and recovery in the Radio Frequency IDentification (RFID)-enabled supply chains. To this end, we designed a new model based on a secret sharing approach to solve the key distribution issue within the supply chains. We further proposed a secret key update protocol incorporating a resynchronisation capability to counter the disruptive effects of location tracking, replay attacks, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 11 publications
(19 reference statements)
0
8
0
Order By: Relevance
“…Radio Frequency Identification (RFID) is a technology that uses radio signals to identify objects [1]. An RFID system consists of a tag, a reader and a backend server [1].…”
Section: Application To Key Distribution For Rfid-enabled Supply Chainsmentioning
confidence: 99%
See 1 more Smart Citation
“…Radio Frequency Identification (RFID) is a technology that uses radio signals to identify objects [1]. An RFID system consists of a tag, a reader and a backend server [1].…”
Section: Application To Key Distribution For Rfid-enabled Supply Chainsmentioning
confidence: 99%
“…Typical applications include inventory control, animal tagging, postal tracking, airline baggage management, access control, and manufacturing processes [17]. RFID tags enable the identification, tracking and verification of products in a supply chain both automatically and in real time [1], hence their use is becoming more prevalent in manufacturing. They have the potential to store information such as batch numbers, date of manufacture, and so on.…”
Section: Application To Key Distribution For Rfid-enabled Supply Chainsmentioning
confidence: 99%
“…To date, many researchers propose a secret-sharing based key distribution in RFID-enabled supply chains. They are classified into (1) which secret sharing scheme is used [3], [6], [7], [9], [10] and (2) secret updating schemes [5], [8], [11], [12].…”
Section: Related Workmentioning
confidence: 99%
“…The first approach is to write encrypted EPCs instead of plaintext one. Though an encryption key must be distributed toward a partner side, many researchers solve this problem by splitting an encryption key into multiple shares with a secret sharing scheme and writing into tags on products [6], [8]- [15]. We briefly introduce the fundamental of a secret sharing scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Alfaro et al propose another approach to securely update the contents of tags by using a proactive (τ, n) secret sharing scheme [13]. Abughazalah et al propose to use two keys, one for cases' tags and the other for products' tags [15]. If the distributor ships tag-attached products, it newly generates the keys for cases, re-encrypts cases' EPCs, and divides the cases' keys with the secret sharing scheme to avoid an attacker from tracking products.…”
Section: Related Workmentioning
confidence: 99%