Abstract
In this paper, we propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors’ privacy. Our solution is based on generating identifiers of the actors and their activities using AND Anti collusion codes. The identifiers are encrypted using homomorphic encryption to ensure security against adversaries, and to be able to compress the collected identifiers. In this work, wireless sensor nodes are not required to perform complex computation, which makes our solution feasible.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Blass, E., Elkhiyaoui, K., Molva, R.: Tracker: security and privacy for RFID-based supply chains. In: 18th Annual Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, February 6-9 (2011) ISBN: 1-891562-32-0
Chawla, K., Robins, G., Weimer, W.: On Mitigating Covert Channels in RFID-Enabled Supply Chains. In: RFIDSec Asia, Singapore (2010)
Francillon, A., Castelluccia, C.: Tinyrng: A cryptographic random number generator for wireless sensors network nodes. In: 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, WiOpt 2007, pp. 1–7. IEEE (2007)
Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks—revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)
Gupta, R., Das, S.R.: Tracking moving targets in a smart sensor network. In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, pp. 3035–3039. IEEE (2003)
Hempstead, M., Lyons, M.J., Brooks, D., Wei, G.Y.: Survey of hardware systems for wireless sensor networks. Journal of Low Power Electronics, 11–20 (2008)
http://www.atmel.com/Images/doc2467.pdf (last access: June 01, 2012)
http://www.xbow.com/ (last access: June 01, 2012)
Kerschbaum, F., Deitos, R.J.: Security against the business partner. In: Proceedings of the 2008 ACM Workshop on Secure Web Services, pp. 1–10. ACM (2008)
Lee, S.J., Jung, S.H.: A survey of watermarking techniques applied to multimedia. In: Proceedings of the IEEE International Symposium on Industrial Electronics, ISIE 2001, vol. 1, pp. 272–277. IEEE (2001)
Ouafi, K., Vaudenay, S.: Pathchecker: An RFID Application for Tracing Products in Supply-Chains. In: International Conference on RFID Security. Citeseer (2009)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Pattipati, K.R., Deb, S., Bar-Shalom, Y., Washburn Jr., R.B.: A new relaxation algorithm and passive sensor data association. IEEE Transactions on Automatic Control, 198–213 (1992)
Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization (1979)
ShuiHua, H., Chu, C.H.: Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking. In: 2008 IEEE International Conference on RFID, pp. 111–117. IEEE (2008)
Son, J.-H., Lee, J.-S., Seo, S.-W.: Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wirel. Pers. Commun. 52(2), 359–382 (2010)
Sorniotti, A., Molva, R., Gomez, L.: Efficient access control for wireless sensor data. Ad Hoc & Sensor Wireless Networks, 325–336 (2009)
TAGSYS. RFID luxury goods solutions (2012)
Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing 51(4), 1069–1087 (2003)
VERAYO. Unclonable-RFIDs (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khalfaoui, M., Molva, R., Gomez, L. (2013). Secure Product Tracking in Supply Chain. In: Kutyłowski, M., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2012. Lecture Notes in Computer Science, vol 7763. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38519-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-38519-3_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38518-6
Online ISBN: 978-3-642-38519-3
eBook Packages: Computer ScienceComputer Science (R0)