Security and privacy protection in RFID-enabled supply chain management.

Manmeet Mahinderjit Singh,Xue Li,Zhanhuai Li
DOI: https://doi.org/10.1504/IJRFITA.2011.043738
2011-01-01
Abstract:Radio frequency identification-enabled supply chain systems are in an open system environment, where different organisations have different business workflows and operate on different standards and protocols. This supply-chain environment can only be effective if the partners can trust each other and be collaborative. However, Radio Frequency Identification (RFID) involves growing privacy and security concerns in part because humans cannot sense the radio frequency radiation used to read tags and the tags themselves maintain no history of past readings. Counterfeiting in the form of cloned or fraudulent RFID tags is a consequence of a lack of security measures and trust among the partners when RFID technology is used to automate their business transactions. This paper discusses the ways in which privacy and security protection can be maintained in an open-loop RFID supply chain. A cost-based detection of counterfeit tags using different classifiers is presented. © 2011 Inderscience Enterprises Ltd.
What problem does this paper attempt to address?