Skip to main content

Tamper Detection for Ubiquitous RFID-Enabled Supply Chain

  • Conference paper
Computational Intelligence and Security (CIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Included in the following conference series:

Abstract

Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Conference on Computer and Communications Security – CCS, pp. 210–219. ACM Press, New York (2004)

    Google Scholar 

  2. Hennig, J.E., Ladkin, P.B., Siker, B.: Privacy Enhancing Technology Concepts for RFID Technology Scrutinized (2005)

    Google Scholar 

  3. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Claburn, T., Hulme, G.V.: Security Challenge- Security and its high cost appears to be the next hurdle in the widespread adoption of RFID. InformationWeek, http://www.informationweek.com/story/showArticle.jhtml?articleID=52601030 (Accessed on November 15, 2004)

  5. Chung, K.: Relational Check Code. Awaiting US Patent

    Google Scholar 

  6. CAST Inc. AES and SHA-1 Crypto-processor Cores, http://www.cast-inc.com/index.shtml

  7. Gao, X., Xiang, Z., Wang, H., Shen, J., Huang, J., Song, S.: An Approach to Security and Privacy of RFID Systems for Supply Chain. In: Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (2003)

    Google Scholar 

  8. Weis, S.: Security and Privacy in Radio-Frequency Identification Devices. Massachusetts Institute of Technology (2003)

    Google Scholar 

  9. Henrici, D., Müller, P.: Tackling Security and Privacy Issues in Radio Frequency Identification Devices. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 219–224. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Potdar, V., Wu, C., Chang, E. (2005). Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_40

Download citation

  • DOI: https://doi.org/10.1007/11596981_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics