{"title":"供应链中安全物料流追踪与验证的RFID方案研究","authors":"Yanjun Zuo","doi":"10.4018/ijhcr.2013100105","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.","PeriodicalId":265963,"journal":{"name":"Int. J. Handheld Comput. Res.","volume":"181 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains\",\"authors\":\"Yanjun Zuo\",\"doi\":\"10.4018/ijhcr.2013100105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.\",\"PeriodicalId\":265963,\"journal\":{\"name\":\"Int. J. Handheld Comput. Res.\",\"volume\":\"181 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Handheld Comput. Res.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijhcr.2013100105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Handheld Comput. Res.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijhcr.2013100105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Toward an RFID Scheme for Secure Material Flow Tracing and Verification in Supply Chains
Radio Frequency Identification RFID is an important wireless communication and pervasive computing technique used for automatic item identification and data capture. In this paper, we present a scheme for securely tracing material flow in supply chains using the inherent RFID authentication and data logging capability. The scheme provides not only an overall path tracing and verification through the entire supply chain, but also the product identification within the scope of a supply chain partner. RFID tags and readers are deployed to ensure that only authorized supply chain partners can identify the tagged items in a secure and private way. The authors develop tag-reader authentication protocols to ensure the authenticity of RFID tags and readers. Their approach avoids the single point failure of the supply chain server-there is no need for each supply chain partner to communicate with the server for every material flow. Therefore, it minimizes the risks caused by system interruptions due to network failures or server unavailability.