Credential Management for Automatic Identification Solutions in Supply Chain Management

被引:13
作者
Henseler, Marcel [1 ]
Rossberg, Michael [1 ]
Schaefer, Guenter [1 ]
机构
[1] Tech Univ Ilmenau, Telemat & Comp Networks Grp, D-98684 Ilmenau, Thur, Germany
关键词
Access control; architecture; data security; identification; production management;
D O I
10.1109/TII.2008.2009532
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple companies exist, and the usage of one identification device, such as a radio-frequency identification (RFID) tag, per company is infeasible for reasons of costs, space requirements, traceability, and higher collision rate. This paper analyzes the security requirements resulting from the usage of a single tag for multiple companies and proposes a novel system architecture and accompanying cryptographic protocols that address the security objectives entity authentication, controlled access, data confidentiality and integrity, as well as untraceability of RFID tags. The architecture is designed to provide high availability and graceful degradation in case of compromise of system parts. The results of an implementation and simulation study give insights on appropriate data structures for realizing key functionality, and demonstrate the feasibility with off-the-shelf hardware.
引用
收藏
页码:303 / 314
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 14443 ISOIEC
[2]   A scalable and provably secure hash-based RFID protocol [J].
Avoine, G ;
Oechslin, P .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :110-114
[3]   MPEG-21: Goals and achievements [J].
Burnett, I ;
Van de Walle, R ;
Hill, K ;
Bormans, J ;
Pereira, F .
IEEE MULTIMEDIA, 2003, 10 (04) :60-70
[4]   Data Architectures for RFID transactions [J].
Chalasani, Suresh ;
Boppana, Rajendra V. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2007, 3 (03) :246-257
[5]  
DAS R, 2008, IDTECHEX RFID MARKET
[6]  
ENGELS DW, 2005, STANDARDIZATION REQU
[7]  
*EPCGLOBAL INC, 2004, EPCGLOBAL NETW OV DE
[8]  
Ferriaolo David, 1992, P 15 NATL COMP SEC C, P554
[9]  
Gong L., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P234, DOI 10.1109/RISP.1990.63854
[10]  
HENSELER M, 2008, THESIS TU ILMENAU IL