{"title":"供应链中的RFID与信息安全","authors":"G. Kapoor, Wei Zhou, S. Piramuthu","doi":"10.1109/MSN.2008.11","DOIUrl":null,"url":null,"abstract":"Information visibility is of paramount importance for effective and efficient operation of supply chains. Although not the sole enabling technological source for information visibility in supply chains, RFID tags naturally allow for its seamless operationalization. RFID tags are notorious on issues related to security/privacy concerns, and these concerns are magnified in a supply chain context where the ownership of any given tag is passed among disparate organizations throughout its lifetime. We consider this scenario from a cryptographic perspective. We consider the literature in this area, identify vulnerabilities in an existing authentication protocol, and suggest modifications that address these vulnerabilities.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"RFID and Information Security in Supply Chains\",\"authors\":\"G. Kapoor, Wei Zhou, S. Piramuthu\",\"doi\":\"10.1109/MSN.2008.11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information visibility is of paramount importance for effective and efficient operation of supply chains. Although not the sole enabling technological source for information visibility in supply chains, RFID tags naturally allow for its seamless operationalization. RFID tags are notorious on issues related to security/privacy concerns, and these concerns are magnified in a supply chain context where the ownership of any given tag is passed among disparate organizations throughout its lifetime. We consider this scenario from a cryptographic perspective. We consider the literature in this area, identify vulnerabilities in an existing authentication protocol, and suggest modifications that address these vulnerabilities.\",\"PeriodicalId\":135604,\"journal\":{\"name\":\"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MSN.2008.11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN.2008.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information visibility is of paramount importance for effective and efficient operation of supply chains. Although not the sole enabling technological source for information visibility in supply chains, RFID tags naturally allow for its seamless operationalization. RFID tags are notorious on issues related to security/privacy concerns, and these concerns are magnified in a supply chain context where the ownership of any given tag is passed among disparate organizations throughout its lifetime. We consider this scenario from a cryptographic perspective. We consider the literature in this area, identify vulnerabilities in an existing authentication protocol, and suggest modifications that address these vulnerabilities.