Skip to main content

Secure Product Tracking in Supply Chain

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7763))

Abstract

In this paper, we propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors’ privacy. Our solution is based on generating identifiers of the actors and their activities using AND Anti collusion codes. The identifiers are encrypted using homomorphic encryption to ensure security against adversaries, and to be able to compress the collected identifiers. In this work, wireless sensor nodes are not required to perform complex computation, which makes our solution feasible.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blass, E., Elkhiyaoui, K., Molva, R.: Tracker: security and privacy for RFID-based supply chains. In: 18th Annual Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, February 6-9 (2011) ISBN: 1-891562-32-0

    Google Scholar 

  2. Chawla, K., Robins, G., Weimer, W.: On Mitigating Covert Channels in RFID-Enabled Supply Chains. In: RFIDSec Asia, Singapore (2010)

    Google Scholar 

  3. Francillon, A., Castelluccia, C.: Tinyrng: A cryptographic random number generator for wireless sensors network nodes. In: 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, WiOpt 2007, pp. 1–7. IEEE (2007)

    Google Scholar 

  4. Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks—revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Gupta, R., Das, S.R.: Tracking moving targets in a smart sensor network. In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, pp. 3035–3039. IEEE (2003)

    Google Scholar 

  6. Hempstead, M., Lyons, M.J., Brooks, D., Wei, G.Y.: Survey of hardware systems for wireless sensor networks. Journal of Low Power Electronics, 11–20 (2008)

    Google Scholar 

  7. http://www.atmel.com/Images/doc2467.pdf (last access: June 01, 2012)

  8. http://www.xbow.com/ (last access: June 01, 2012)

  9. Kerschbaum, F., Deitos, R.J.: Security against the business partner. In: Proceedings of the 2008 ACM Workshop on Secure Web Services, pp. 1–10. ACM (2008)

    Google Scholar 

  10. Lee, S.J., Jung, S.H.: A survey of watermarking techniques applied to multimedia. In: Proceedings of the IEEE International Symposium on Industrial Electronics, ISIE 2001, vol. 1, pp. 272–277. IEEE (2001)

    Google Scholar 

  11. Ouafi, K., Vaudenay, S.: Pathchecker: An RFID Application for Tracing Products in Supply-Chains. In: International Conference on RFID Security. Citeseer (2009)

    Google Scholar 

  12. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

  13. Pattipati, K.R., Deb, S., Bar-Shalom, Y., Washburn Jr., R.B.: A new relaxation algorithm and passive sensor data association. IEEE Transactions on Automatic Control, 198–213 (1992)

    Google Scholar 

  14. Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization (1979)

    Google Scholar 

  15. ShuiHua, H., Chu, C.H.: Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking. In: 2008 IEEE International Conference on RFID, pp. 111–117. IEEE (2008)

    Google Scholar 

  16. Son, J.-H., Lee, J.-S., Seo, S.-W.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359–382 (2010)

    Article  Google Scholar 

  17. Sorniotti, A., Molva, R., Gomez, L.: Efficient access control for wireless sensor data. Ad Hoc & Sensor Wireless Networks, 325–336 (2009)

    Google Scholar 

  18. TAGSYS. RFID luxury goods solutions (2012)

    Google Scholar 

  19. Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51(4), 1069–1087 (2003)

    Article  MathSciNet  Google Scholar 

  20. VERAYO. Unclonable-RFIDs (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khalfaoui, M., Molva, R., Gomez, L. (2013). Secure Product Tracking in Supply Chain. In: Kutyłowski, M., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2012. Lecture Notes in Computer Science, vol 7763. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38519-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38519-3_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38518-6

  • Online ISBN: 978-3-642-38519-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics