Tayyaba Tariq;Mohammad S. Obaidat;Wen-Chung Kuo;Khalid Mahmood;Muhammad Faizan Ayub;Mohammed J.F. Alenazi
{"title":"A Blockchain-Assisted Authentication Protocol for RFID-Enabled Supply Chain Management System","authors":"Tayyaba Tariq;Mohammad S. Obaidat;Wen-Chung Kuo;Khalid Mahmood;Muhammad Faizan Ayub;Mohammed J.F. Alenazi","doi":"10.1109/TNSE.2025.3556736","DOIUrl":null,"url":null,"abstract":"In the dynamic domain of supply chain management, integrating Radio-Frequency Identification (RFID) technology with blockchain technology represents a significant leap forward. This integration has created a blockchain-assisted RFID-enabled Supply Chain Management System (SCMS). With its ability to utilize electromagnetic fields to identify and track tags attached to objects, RFID technology has revolutionized product management and tracking within supply chains. SCMS transmits tracking and product management information through public communication channels. However, SCMS’s communication on these channels is vulnerable to various security attacks and privacy challenges. Numerous authentication protocols have recently been proposed to tackle these security and privacy challenges. Unfortunately, most protocols are susceptible to different security attacks, such as tag or reader impersonation, denial of service, physical cloning, desynchronization attacks, etc. Therefore, we have proposed an authentication protocol for an RFID-enabled SCMS that also leverages blockchain technology. The integration of blockchain technology ensures data integrity, immutability and transparency across each department involved in SCMS. In the proposed protocol, we also employ a Physically Unclonable Function (PUF) to secure SCMS against physical cloning attacks. We validate the security of the proposed protocol through both informal and formal analysis. The informal analysis confirms that our protocol significantly enhances security and efficiency. Moreover, a performance analysis of the proposed protocol against various competing existing protocols shows its superior performance. Notably, the proposed protocol substantially reduces computational and communication costs by 24.38% and 8.03%, respectively, which underscores its enhanced performance and resource efficiency.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"3108-3117"},"PeriodicalIF":6.7000,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10946860/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
In the dynamic domain of supply chain management, integrating Radio-Frequency Identification (RFID) technology with blockchain technology represents a significant leap forward. This integration has created a blockchain-assisted RFID-enabled Supply Chain Management System (SCMS). With its ability to utilize electromagnetic fields to identify and track tags attached to objects, RFID technology has revolutionized product management and tracking within supply chains. SCMS transmits tracking and product management information through public communication channels. However, SCMS’s communication on these channels is vulnerable to various security attacks and privacy challenges. Numerous authentication protocols have recently been proposed to tackle these security and privacy challenges. Unfortunately, most protocols are susceptible to different security attacks, such as tag or reader impersonation, denial of service, physical cloning, desynchronization attacks, etc. Therefore, we have proposed an authentication protocol for an RFID-enabled SCMS that also leverages blockchain technology. The integration of blockchain technology ensures data integrity, immutability and transparency across each department involved in SCMS. In the proposed protocol, we also employ a Physically Unclonable Function (PUF) to secure SCMS against physical cloning attacks. We validate the security of the proposed protocol through both informal and formal analysis. The informal analysis confirms that our protocol significantly enhances security and efficiency. Moreover, a performance analysis of the proposed protocol against various competing existing protocols shows its superior performance. Notably, the proposed protocol substantially reduces computational and communication costs by 24.38% and 8.03%, respectively, which underscores its enhanced performance and resource efficiency.
期刊介绍:
The proposed journal, called the IEEE Transactions on Network Science and Engineering (TNSE), is committed to timely publishing of peer-reviewed technical articles that deal with the theory and applications of network science and the interconnections among the elements in a system that form a network. In particular, the IEEE Transactions on Network Science and Engineering publishes articles on understanding, prediction, and control of structures and behaviors of networks at the fundamental level. The types of networks covered include physical or engineered networks, information networks, biological networks, semantic networks, economic networks, social networks, and ecological networks. Aimed at discovering common principles that govern network structures, network functionalities and behaviors of networks, the journal seeks articles on understanding, prediction, and control of structures and behaviors of networks. Another trans-disciplinary focus of the IEEE Transactions on Network Science and Engineering is the interactions between and co-evolution of different genres of networks.