Improving RFID traceability systems with verifiable quality

被引:31
作者
Azuara, Guillermo [1 ]
Luis Tornos, Jose [1 ]
Luis Salazar, Jose [1 ]
机构
[1] Univ Zaragoza, Dept Commun & Elect Engn, Zaragoza, Spain
关键词
Counterfeiting; Radio frequency identification; Tracking; Traceability; Supply chain management; Food manufacturing processes; Cryptography; Spanish cured ham; CHAIN; TECHNOLOGIES; FRAMEWORK; IMPACT;
D O I
10.1108/02635571211210022
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain. Design/methodology/approach First, the authors put forward a secure traceability system with a cryptographic operator that improves efficiency, saves costs and is adaptable to all types of supply chains. Second, the authors implement the system in a food manufacturing company, show the compatibility of the system with the initial production chain and demonstrate its improvement. Findings The authors have economically and technologically improved the detection of faked goods in the supply chain by means of a cheap and scalable system based on RFID. Research limitations/implications The system has been tested in a manufacturing point of the supply chain, not in the supply chain as a whole. As traceability is additive in character, the results can be generalized and applied to each part of the supply chain. Practical implications A prototype has been built and implemented for a food manufacturing company. It meets all the specifications required for detection of fakes in manufactured products. Originality/value Unlike other existing products used to detect fakes through traceability, this system identifies fakes and potential counterfeits, significantly reducing the cost of security management. Another important difference is that verification can be performed by a third party not involved in the system, without loss of security.
引用
收藏
页码:340 / 359
页数:20
相关论文
共 49 条
  • [31] Auto ID systems and intelligent manufacturing control
    McFarlane, D
    Sarma, S
    Chirn, JL
    Wong, CY
    Ashton, K
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2003, 16 (04) : 365 - 376
  • [32] RFID: the big player in the libraries of the future
    Mehrjerdi, Yahia Zare
    [J]. ELECTRONIC LIBRARY, 2011, 29 (01) : 36 - 51
  • [33] Menezes A.J., 1994, ELLIPTIC CURVE PUBLI
  • [34] Classifying RFID attacks and defenses
    Mitrokotsa, Aikaterini
    Rieback, Melanie R.
    Tanenbaum, Andrew S.
    [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 491 - 505
  • [35] DISTRIBUTED DATABASE-SYSTEMS - WHERE ARE WE NOW
    OZSU, MT
    VALDURIEZ, P
    [J]. COMPUTER, 1991, 24 (08) : 68 - 78
  • [36] Perceptions of RFID technology: a cross-national study
    Park, Kwang So
    Koh, Chang E.
    Nam, Kyungdoo 'Ted'
    [J]. INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2010, 110 (5-6) : 682 - 700
  • [37] Integrating wireless sensor networks and the internet: a security analysis
    Roman, Rodrigo
    Lopez, Javier
    [J]. INTERNET RESEARCH, 2009, 19 (02) : 246 - 259
  • [38] A literature review on the impact of RFID technologies on supply chain management
    Sarac, Aysegul
    Absi, Nabil
    Dauzere-Peres, Stephane
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2010, 128 (01) : 77 - 95
  • [39] Food fraud - a current issue but an old problem
    Shears, Peter
    [J]. BRITISH FOOD JOURNAL, 2010, 112 (2-3): : 198 - 213
  • [40] Scalable RFID security protocols supporting tag ownership transfer
    Song, Boyeon
    Mitchell, Chris J.
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (04) : 556 - 566