M. Schapranow, A. Zeier, F. Leupold, Tobias Schubotz
{"title":"保护EPCglobal对象名称服务-防伪的隐私增强","authors":"M. Schapranow, A. Zeier, F. Leupold, Tobias Schubotz","doi":"10.1109/ISMS.2011.57","DOIUrl":null,"url":null,"abstract":"In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the good's path in the supply chain. The path is reconstructed by querying corresponding event data from distributed repositories. The object name service performs lookups of relevant event repositories in EPCglobal networks. Attacking the lookup process can be used to break privacy of inquirers, e.g. to derive product and user profiles. We share details about our security enhancement prototypes to protect the privacy of querying parties. Our developed enhancements are designed for easy integration into existing network infrastructures without major efforts.","PeriodicalId":193599,"journal":{"name":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Securing EPCglobal Object Name Service - Privacy Enhancements for Anti-counterfeiting\",\"authors\":\"M. Schapranow, A. Zeier, F. Leupold, Tobias Schubotz\",\"doi\":\"10.1109/ISMS.2011.57\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the good's path in the supply chain. The path is reconstructed by querying corresponding event data from distributed repositories. The object name service performs lookups of relevant event repositories in EPCglobal networks. Attacking the lookup process can be used to break privacy of inquirers, e.g. to derive product and user profiles. We share details about our security enhancement prototypes to protect the privacy of querying parties. Our developed enhancements are designed for easy integration into existing network infrastructures without major efforts.\",\"PeriodicalId\":193599,\"journal\":{\"name\":\"2011 Second International Conference on Intelligent Systems, Modelling and Simulation\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-01-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Second International Conference on Intelligent Systems, Modelling and Simulation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISMS.2011.57\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Second International Conference on Intelligent Systems, Modelling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMS.2011.57","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing EPCglobal Object Name Service - Privacy Enhancements for Anti-counterfeiting
In RFID-aided supply chains captured location-based event data is stored in distributed repositories. Performing anti-counterfeiting involves checks on the good's path in the supply chain. The path is reconstructed by querying corresponding event data from distributed repositories. The object name service performs lookups of relevant event repositories in EPCglobal networks. Attacking the lookup process can be used to break privacy of inquirers, e.g. to derive product and user profiles. We share details about our security enhancement prototypes to protect the privacy of querying parties. Our developed enhancements are designed for easy integration into existing network infrastructures without major efforts.