实现rfid标签供应链的高安全性和高效性

Shaoying Cai, Yingjiu Li, Tieyan Li, R. Deng, Haixia Yao
{"title":"实现rfid标签供应链的高安全性和高效性","authors":"Shaoying Cai, Yingjiu Li, Tieyan Li, R. Deng, Haixia Yao","doi":"10.1504/IJACT.2010.033794","DOIUrl":null,"url":null,"abstract":"While RFID technology has greatly facilitated visible supply chain management, designing a secure and efficient RFID-tagged supply chain system is still a challenge. To achieve high security and efficiency at the same time, we categorise RFID-tagged supply chain environments in two security levels and design an RFID-tagged supply chain system accordingly. In the relatively secure environment, our system is set to the weak security mode, and the tagged products can be processed in a highly efficient manner. While in the less secure environment, our system is tuned into the strong security mode so as to maintain a high level of security with its efficiency lower than that in the weak security mode. A set of RFID protocols are designed to enable the duel security modes.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Achieving high security and efficiency in RFID-tagged supply chains\",\"authors\":\"Shaoying Cai, Yingjiu Li, Tieyan Li, R. Deng, Haixia Yao\",\"doi\":\"10.1504/IJACT.2010.033794\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While RFID technology has greatly facilitated visible supply chain management, designing a secure and efficient RFID-tagged supply chain system is still a challenge. To achieve high security and efficiency at the same time, we categorise RFID-tagged supply chain environments in two security levels and design an RFID-tagged supply chain system accordingly. In the relatively secure environment, our system is set to the weak security mode, and the tagged products can be processed in a highly efficient manner. While in the less secure environment, our system is tuned into the strong security mode so as to maintain a high level of security with its efficiency lower than that in the weak security mode. A set of RFID protocols are designed to enable the duel security modes.\",\"PeriodicalId\":350332,\"journal\":{\"name\":\"Int. J. Appl. Cryptogr.\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Appl. Cryptogr.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJACT.2010.033794\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Appl. Cryptogr.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJACT.2010.033794","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

虽然RFID技术极大地促进了可见供应链管理,但设计一个安全高效的RFID标签供应链系统仍然是一个挑战。为了同时实现高安全性和高效率,我们将rfid标签供应链环境分为两个安全级别,并相应地设计了rfid标签供应链系统。在相对安全的环境下,我们的系统设置为弱安全模式,可以高效地处理标签产品。而在不太安全的环境下,我们的系统调到强安全模式,以保持较高的安全水平,其效率低于弱安全模式。设计了一套RFID协议来实现双重安全模式。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Achieving high security and efficiency in RFID-tagged supply chains
While RFID technology has greatly facilitated visible supply chain management, designing a secure and efficient RFID-tagged supply chain system is still a challenge. To achieve high security and efficiency at the same time, we categorise RFID-tagged supply chain environments in two security levels and design an RFID-tagged supply chain system accordingly. In the relatively secure environment, our system is set to the weak security mode, and the tagged products can be processed in a highly efficient manner. While in the less secure environment, our system is tuned into the strong security mode so as to maintain a high level of security with its efficiency lower than that in the weak security mode. A set of RFID protocols are designed to enable the duel security modes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信