Abstract
Since the RFID technology has been found couple of decades ago, there was much involvement of this emerging technology in the improvement of supply chain management. As this technology made the industry more reliable and faster to process, yet there were always some technical issues and security threats that emerged from the heavy use of the RFID tags in the SCM, or other industries. Hereby we represent a new protocol based on a new idea that can be used to manage and organize tags as well as the objects attached to them in SCM, to prevent counterfeiting and reduce the security threats taking into consideration the security and privacy concerns that faces the industry today. This new approach will open a new horizon to the supply chain management as well as the RFID systems technology since it will handle multi- tags attached to objects managed in one location as an entity of one in one. We called our approach the MATRYOSHKA approach since it has the same idea of the russian doll, in managing multi-tags as one entity and prevent counterfeiting. We also added extra authentication process based on a mathematical exchange key formation to increase the security during communication to prevent threats and attacks and to provide a secure mutual authentication method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al, T., Al, G.K.D.: A case study in developing the ICT skills for a group of mixed abilities and mixed aged learners at ITEP in Dubai-UAE and possible future RFID implementations. In: Luaran, J.E., Sardi, J., Aziz, A., Alias, N.A. (eds.) Envisioning the Future of Online Learning, pp. 133–146. Springer, Heidelberg (2016)
Chen, X., Cao, T., Guo, Y.: A new scalable RFID delegation protocol. Appl. Math. 8(4), 1917–1924 (2014)
RFID ARENA. Benefits-of-implementing-rfid-in-supply-chain-management (2015). http://www.rdarena.com/2013/11/14/benets-of-implementing-rd-in-supply-chain-management.aspx
AL, G., Ray, B., Chowdhury, M.: RFID tag ownership transfer protocol for a closed loop system. In: 2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI), pp. 575–579, August 2014
Al, G., Ray, B., Chowdhury, M.: Multiple scenarios for a tag ownership transfer protocol for a closed loop system. IJNDC 3(2), 128–136 (2015)
Cooper, M.C., Lambert, D.M., Pagh, J.D.: Supply chain management: more than a new name for logistics. Int. J. Logist. Manag. 8(1), 1–14 (1997)
Keely, L.C., Garcia-Dastugue, S.J., Lambert, D.M., Rogers, D.S.: The supply chain management processes. Int. J. Logist. Manag. 12(2), 13–36 (2001)
Michael, K., McCathie, L.: The pros and cons of RFID in supply chain management. In: International Conference on Mobile Business (ICMB 2005), pp. 623–629. IEEE (2005)
Juels, A.: “Yoking-proofs” for RFID tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 138–143. IEEE (2004)
Bolotnyy, L., Robins, G.: Generalized “yoking-proofs” for a group of RFID tags. In: 2006 Third Annual International Conference on Mobile, Ubiquitous Systems Networking & Services, pp. 1–4. IEEE (2006)
Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable RFID security framework and protocol supporting Internet of Things. Comput. Netw. 67, 89–103 (2014)
Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4), 556–566 (2011)
Molnar, D., Wagner, D.: Privacy, security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM (2004)
Fouladgar, S., Afifi, H.: Scalable privacy protecting scheme through distributed RFID tag identification. In: Proceedings of the Workshop on Applications of Private and Anonymous Communications, p. 3. ACM (2008)
Solanas, A., Domingo-Ferrer, J., Martínez-Ballesté, A., Daza, V.: A distributed architecture for scalable private RFID tag identification. Comput. Netw. 51(9), 2268–2279 (2007)
Stickel, E.: A new method for exchanging secret keys. In: Third International Conference on Information Technology and Applications (ICITA 2005), vol. 2, pp. 426–430. IEEE (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Al., G., Doss, R., Chowdhury, M., Ray, B. (2016). Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2016. Communications in Computer and Information Science, vol 670. Springer, Cham. https://doi.org/10.1007/978-3-319-48021-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-48021-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48020-6
Online ISBN: 978-3-319-48021-3
eBook Packages: Computer ScienceComputer Science (R0)