Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains

Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains

Yanjun Zuo
Copyright: © 2013 |Volume: 4 |Issue: 4 |Pages: 18
ISSN: 1947-9158|EISSN: 1947-9166|EISBN13: 9781466635456|DOI: 10.4018/ijhcr.2013100105
Cite Article Cite Article

MLA

Zuo, Yanjun. "Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains." IJHCR vol.4, no.4 2013: pp.72-89. http://doi.org/10.4018/ijhcr.2013100105

APA

Zuo, Y. (2013). Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains. International Journal of Handheld Computing Research (IJHCR), 4(4), 72-89. http://doi.org/10.4018/ijhcr.2013100105

Chicago

Zuo, Yanjun. "Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains," International Journal of Handheld Computing Research (IJHCR) 4, no.4: 72-89. http://doi.org/10.4018/ijhcr.2013100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Radio Frequency Identification (RFID) is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server – there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.