An approach to security and privacy of RFID system for supply chain

Grace Xingxin Gao, Zhe Xiang, Hao Wang, Jun Shen, Jian Huang, Song Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Radio Frequency Identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items as smart labels. A typical scenario of exploiting RFID is supply chain. The RFID based supply chain management yields convenience, efficiency and productivity gains. However, RFID systems create new risks to security and privacy. This paper briefly presents the current solutions to RFID security and privacy. A new approach is then proposed, which exploits randomized read access control and thus prevents hostile tracking and man-in-the-middle attack. In addition, compared with current schemes that achieve the similar security level, the proposed approach dramatically decreases the computation load. Another benefit is that it is suitable for RFID systems with a large number of tags.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, CEC-East 2004
EditorsK.-J. Lin, T. Li
Pages164-168
Number of pages5
StatePublished - Dec 1 2004
Externally publishedYes
EventProceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, CEC-East 2004 - Beijing, China
Duration: Sep 13 2004Sep 15 2004

Publication series

NameProceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, CEC-East 2004

Other

OtherProceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, CEC-East 2004
CountryChina
CityBeijing
Period9/13/049/15/04

    Fingerprint

Keywords

  • Privacy
  • RFID
  • Security

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Gao, G. X., Xiang, Z., Wang, H., Shen, J., Huang, J., & Song, S. (2004). An approach to security and privacy of RFID system for supply chain. In K-J. Lin, & T. Li (Eds.), Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, CEC-East 2004 (pp. 164-168). (Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, CEC-East 2004).