Security and privacy protection in RFID-enabled supply chain management

Manmeet Mahinderjit Singh, Xue Li, Zhanhuai Li
2011 International Journal of Radio Frequency Identification Technology and Applications  
Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and security concerns in part because humans cannot sense the radio frequency radiation used to read tags
more » ... d the tags themselves maintain no history of past readings. Counterfeiting in the form of cloned or fraudulent RFID tags is a consequence of a lack of security measures and trust among the partners when RFID technology is used to automate their business transactions. This paper discusses the ways in which privacy and security protection can be maintained in an open-loop RFID supply chain. A cost-based detection of counterfeit tags using different classifiers is presented.
doi:10.1504/ijrfita.2011.043738 fatcat:tjajycerknecnltqly64md6a6u